Mock Version: 1.1.41 ENTER do(['bash', '--login', '-c', 'rpmbuild -bs --target armv7hl --nodeps builddir/build/SPECS/nss.spec'], False, '/var/lib/mock/c71511-1-armhfp-d1bbba3befee292f06a1198d5d788ee2b6e3e76c/root/', None, 0, True, False, 993, 135, None, False, {'LANG': 'en_US.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'HOSTNAME': 'mock', 'PROMPT_COMMAND': 'echo -n ""', 'HOME': '/builddir', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin'}, logger=) Executing command: ['bash', '--login', '-c', 'rpmbuild -bs --target armv7hl --nodeps builddir/build/SPECS/nss.spec'] with env {'LANG': 'en_US.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'HOSTNAME': 'mock', 'PROMPT_COMMAND': 'echo -n ""', 'HOME': '/builddir', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin'} Building target platforms: armv7hl Building for target armv7hl Wrote: /builddir/build/SRPMS/nss-3.19.1-19.el7.src.rpm Child return code was: 0 LEAVE do --> ENTER do(['bash', '--login', '-c', 'rpmbuild -bb --target armv7hl --nodeps builddir/build/SPECS/nss.spec'], False, '/var/lib/mock/c71511-1-armhfp-d1bbba3befee292f06a1198d5d788ee2b6e3e76c/root/', None, 0, True, False, 993, 135, None, False, {'LANG': 'en_US.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'HOSTNAME': 'mock', 'PROMPT_COMMAND': 'echo -n ""', 'HOME': '/builddir', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin'}, logger=) Executing command: ['bash', '--login', '-c', 'rpmbuild -bb --target armv7hl --nodeps builddir/build/SPECS/nss.spec'] with env {'LANG': 'en_US.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'HOSTNAME': 'mock', 'PROMPT_COMMAND': 'echo -n ""', 'HOME': '/builddir', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin'} Building target platforms: armv7hl Building for target armv7hl Executing(%prep): /bin/sh -e /var/tmp/rpm-tmp.0Egj9y + umask 022 + cd /builddir/build/BUILD + cd /builddir/build/BUILD + rm -rf nss-3.19.1 + /usr/bin/gzip -dc /builddir/build/SOURCES/nss-3.19.1.tar.gz + /usr/bin/tar -xf - + STATUS=0 + '[' 0 -ne 0 ']' + cd nss-3.19.1 + /usr/bin/chmod -Rf a+rX,u+w,g-w,o-w . + /usr/bin/cp /builddir/build/SOURCES/PayPalEE.cert -f ./nss/tests/libpkix/certs + /usr/bin/cp /builddir/build/SOURCES/TestCA.ca.cert -f ./nss/tests/libpkix/certs + /usr/bin/cp /builddir/build/SOURCES/TestUser50.cert -f ./nss/tests/libpkix/certs + /usr/bin/cp /builddir/build/SOURCES/TestUser51.cert -f ./nss/tests/libpkix/certs + /usr/bin/cp /builddir/build/SOURCES/PayPalRootCA.cert -f ./nss/tests/libpkix/certs + /usr/bin/cp /builddir/build/SOURCES/PayPalICA.cert -f ./nss/tests/libpkix/certs + cd /builddir/build/BUILD + cd nss-3.19.1 + /usr/bin/bzip2 -dc /builddir/build/SOURCES/nss-pem-20140125.tar.bz2 + /usr/bin/tar -xf - + STATUS=0 + '[' 0 -ne 0 ']' + /usr/bin/chmod -Rf a+rX,u+w,g-w,o-w . Patch #2 (add-relro-linker-option.patch): + echo 'Patch #2 (add-relro-linker-option.patch):' + /usr/bin/cat /builddir/build/SOURCES/add-relro-linker-option.patch + /usr/bin/patch -p0 -b --suffix .relro --fuzz=0 patching file nss/coreconf/Linux.mk Hunk #1 succeeded at 176 (offset 2 lines). Patch #3 (renegotiate-transitional.patch): + echo 'Patch #3 (renegotiate-transitional.patch):' + /usr/bin/cat /builddir/build/SOURCES/renegotiate-transitional.patch + /usr/bin/patch -p0 -b --suffix .transitional --fuzz=0 patching file nss/lib/ssl/sslsock.c Hunk #1 succeeded at 74 (offset -75 lines). Patch #6 (nss-enable-pem.patch): + echo 'Patch #6 (nss-enable-pem.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-enable-pem.patch + /usr/bin/patch -p0 -b --suffix .libpem --fuzz=0 patching file nss/lib/ckfw/manifest.mn Patch #16 (nss-539183.patch): + echo 'Patch #16 (nss-539183.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-539183.patch + /usr/bin/patch -p0 -b --suffix .539183 --fuzz=0 patching file nss/cmd/httpserv/httpserv.c Hunk #1 succeeded at 938 (offset 277 lines). patching file nss/cmd/selfserv/selfserv.c ~/build/BUILD/nss-3.19.1/nss ~/build/BUILD/nss-3.19.1 Patch #18 (nss-646045.patch): + pushd nss + echo 'Patch #18 (nss-646045.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-646045.patch + /usr/bin/patch -p1 -b --suffix .646045 --fuzz=0 patching file tests/dbtests/dbtests.sh ~/build/BUILD/nss-3.19.1 Patch #25 (nsspem-use-system-freebl.patch): + popd + echo 'Patch #25 (nsspem-use-system-freebl.patch):' + /usr/bin/cat /builddir/build/SOURCES/nsspem-use-system-freebl.patch + /usr/bin/patch -p0 -b --suffix .systemfreebl --fuzz=0 patching file nss/lib/ckfw/pem/config.mk patching file nss/lib/ckfw/pem/Makefile patching file nss/lib/ckfw/pem/manifest.mn Patch #40 (nss-3.14.0.0-disble-ocsp-test.patch): + echo 'Patch #40 (nss-3.14.0.0-disble-ocsp-test.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.14.0.0-disble-ocsp-test.patch + /usr/bin/patch -p0 -b --suffix .noocsptest --fuzz=0 patching file nss/tests/chains/scenarios/scenarios Hunk #1 succeeded at 18 (offset -32 lines). Patch #47 (utilwrap-include-templates.patch): + echo 'Patch #47 (utilwrap-include-templates.patch):' + /usr/bin/cat /builddir/build/SOURCES/utilwrap-include-templates.patch + /usr/bin/patch -p0 -b --suffix .templates --fuzz=0 patching file nss/lib/nss/config.mk Patch #49 (nss-skip-bltest-and-fipstest.patch): + echo 'Patch #49 (nss-skip-bltest-and-fipstest.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-skip-bltest-and-fipstest.patch + /usr/bin/patch -p0 -b --suffix .skipthem --fuzz=0 patching file nss/cmd/Makefile Patch #50 (iquote.patch): + echo 'Patch #50 (iquote.patch):' + /usr/bin/cat /builddir/build/SOURCES/iquote.patch + /usr/bin/patch -p0 -b --suffix .iquote --fuzz=0 patching file ./nss/cmd/bltest/Makefile patching file ./nss/cmd/certutil/Makefile patching file ./nss/cmd/httpserv/Makefile patching file ./nss/cmd/lib/Makefile patching file ./nss/cmd/modutil/Makefile patching file ./nss/cmd/selfserv/Makefile patching file ./nss/cmd/ssltap/Makefile patching file ./nss/cmd/strsclnt/Makefile patching file ./nss/cmd/tstclnt/Makefile patching file ./nss/cmd/vfyserv/Makefile patching file ./nss/coreconf/location.mk patching file ./nss/lib/certhigh/Makefile patching file ./nss/lib/cryptohi/Makefile patching file ./nss/lib/libpkix/pkix/checker/Makefile patching file ./nss/lib/nss/Makefile patching file ./nss/lib/ssl/Makefile ~/build/BUILD/nss-3.19.1/nss ~/build/BUILD/nss-3.19.1 Patch #52 (Bug-1001841-disable-sslv2-libssl.patch): + pushd nss + echo 'Patch #52 (Bug-1001841-disable-sslv2-libssl.patch):' + /usr/bin/cat /builddir/build/SOURCES/Bug-1001841-disable-sslv2-libssl.patch + /usr/bin/patch -p1 -b --suffix .disableSSL2libssl --fuzz=0 patching file lib/ssl/config.mk patching file lib/ssl/sslsock.c Patch #53 (Bug-1001841-disable-sslv2-tests.patch): + echo 'Patch #53 (Bug-1001841-disable-sslv2-tests.patch):' + /usr/bin/cat /builddir/build/SOURCES/Bug-1001841-disable-sslv2-tests.patch + /usr/bin/patch -p1 -b --suffix .disableSSL2tests --fuzz=0 patching file tests/ssl/ssl.sh ~/build/BUILD/nss-3.19.1 Patch #55 (enable-fips-when-system-is-in-fips-mode.patch): + popd + echo 'Patch #55 (enable-fips-when-system-is-in-fips-mode.patch):' + /usr/bin/cat /builddir/build/SOURCES/enable-fips-when-system-is-in-fips-mode.patch + /usr/bin/patch -p0 -b --suffix .852023 --fuzz=0 patching file nss/lib/pk11wrap/pk11pars.c patching file nss/lib/pk11wrap/pk11util.c patching file nss/lib/pk11wrap/secmodi.h Hunk #1 succeeded at 113 (offset -3 lines). Patch #56 (p-ignore-setpolicy.patch): + echo 'Patch #56 (p-ignore-setpolicy.patch):' + /usr/bin/cat /builddir/build/SOURCES/p-ignore-setpolicy.patch + /usr/bin/patch -p0 -b --suffix .1026677 --fuzz=0 patching file ./nss/lib/ssl/sslsock.c Hunk #1 succeeded at 1348 (offset 33 lines). Patch #99 (ssl-server-min-key-sizes.patch): + echo 'Patch #99 (ssl-server-min-key-sizes.patch):' + /usr/bin/cat /builddir/build/SOURCES/ssl-server-min-key-sizes.patch + /usr/bin/patch -p0 -b --suffix .min_key_sizes --fuzz=0 patching file nss/lib/ssl/ssl3con.c patching file nss/lib/ssl/sslimpl.h ~/build/BUILD/nss-3.19.1/nss ~/build/BUILD/nss-3.19.1 Patch #101 (dhe-sha384-dss-support.patch): + pushd nss + echo 'Patch #101 (dhe-sha384-dss-support.patch):' + /usr/bin/cat /builddir/build/SOURCES/dhe-sha384-dss-support.patch + /usr/bin/patch -p1 -b --suffix .dhe_and_sha384 --fuzz=0 patching file cmd/certutil/keystuff.c patching file cmd/selfserv/selfserv.c patching file cmd/tstclnt/tstclnt.c patching file lib/ssl/dhe-param.c patching file lib/ssl/ssl3con.c patching file lib/ssl/ssl3ecc.c patching file lib/ssl/ssl3ext.c patching file lib/ssl/ssl.def patching file lib/ssl/sslenum.c patching file lib/ssl/ssl.h patching file lib/ssl/sslimpl.h patching file lib/ssl/sslinfo.c patching file lib/ssl/sslproto.h patching file lib/ssl/sslsecur.c patching file lib/ssl/sslsock.c patching file lib/ssl/sslt.h patching file tests/cert/cert.sh patching file tests/ssl/sslcov.txt patching file tests/ssl/ssl.sh patching file tests/ssl/sslstress.txt Patch #102 (prfnonsha256.patch): + echo 'Patch #102 (prfnonsha256.patch):' + /usr/bin/cat /builddir/build/SOURCES/prfnonsha256.patch + /usr/bin/patch -p1 -b --suffix .prfnonsha256 --fuzz=0 patching file lib/ssl/ssl3con.c Patch #103 (sha384-client-verify.patch): + echo 'Patch #103 (sha384-client-verify.patch):' + /usr/bin/cat /builddir/build/SOURCES/sha384-client-verify.patch + /usr/bin/patch -p1 -b --suffix .sha384_client_verify --fuzz=0 patching file cmd/strsclnt/strsclnt.c patching file lib/ssl/ssl3con.c patching file lib/ssl/ssl3prot.h patching file tests/ssl/ssl.sh patching file tests/ssl/sslcov.txt ~/build/BUILD/nss-3.19.1 Patch #104 (fix-disable-sslv2-tests.patch): + popd + echo 'Patch #104 (fix-disable-sslv2-tests.patch):' + /usr/bin/cat /builddir/build/SOURCES/fix-disable-sslv2-tests.patch + /usr/bin/patch -p0 -b --suffix .fix_skipping --fuzz=0 patching file ./nss/tests/ssl/ssl.sh Patch #105 (fix-disable-sslv2-libssl.patch): + echo 'Patch #105 (fix-disable-sslv2-libssl.patch):' + /usr/bin/cat /builddir/build/SOURCES/fix-disable-sslv2-libssl.patch + /usr/bin/patch -p0 -b --suffix .null_ciphers --fuzz=0 patching file ./nss/lib/ssl/sslsock.c Patch #106 (additional-cipher-suites-enabled-by-default.patch): + echo 'Patch #106 (additional-cipher-suites-enabled-by-default.patch):' + /usr/bin/cat /builddir/build/SOURCES/additional-cipher-suites-enabled-by-default.patch + /usr/bin/patch -p0 -b --suffix .1245627 --fuzz=0 patching file ./nss/lib/ssl/ssl3con.c patching file ./nss/lib/ssl/sslenum.c Patch #107 (sslinfo-fix-info.patch): + echo 'Patch #107 (sslinfo-fix-info.patch):' + /usr/bin/cat /builddir/build/SOURCES/sslinfo-fix-info.patch + /usr/bin/patch -p0 -b --suffix .fix_info --fuzz=0 patching file ./nss/lib/ssl/sslinfo.c Patch #108 (fix-min-library-version-in-SSLVersionRange.patch): + echo 'Patch #108 (fix-min-library-version-in-SSLVersionRange.patch):' + /usr/bin/cat /builddir/build/SOURCES/fix-min-library-version-in-SSLVersionRange.patch + /usr/bin/patch -p0 -b --suffix .1171318 --fuzz=0 patching file ./nss/lib/ssl/sslsock.c Patch #109 (enable-ecdsa-ciphers-by-default.patch): + echo 'Patch #109 (enable-ecdsa-ciphers-by-default.patch):' + /usr/bin/cat /builddir/build/SOURCES/enable-ecdsa-ciphers-by-default.patch + /usr/bin/patch -p0 -b --suffix .enable_ecdsa --fuzz=0 patching file ./nss/lib/ssl/ssl3con.c Patch #110 (reorder-cipher-suites.patch): + echo 'Patch #110 (reorder-cipher-suites.patch):' + /usr/bin/cat /builddir/build/SOURCES/reorder-cipher-suites.patch + /usr/bin/patch -p0 -b --suffix .order --fuzz=0 patching file ./nss/lib/ssl/ssl3con.c patching file ./nss/lib/ssl/sslenum.c Patch #111 (ocsp_stapling_sslauth_sni_tests_client_side_fixes.patch): + echo 'Patch #111 (ocsp_stapling_sslauth_sni_tests_client_side_fixes.patch):' + /usr/bin/cat /builddir/build/SOURCES/ocsp_stapling_sslauth_sni_tests_client_side_fixes.patch + /usr/bin/patch -p0 -b --suffix .ocsp_sni --fuzz=0 patching file ./nss/tests/ssl/sslauth.txt patching file ./nss/tests/ssl/ssl.sh ~/build/BUILD/nss-3.19.1/nss ~/build/BUILD/nss-3.19.1 Patch #112 (rh1238290.patch): + pushd nss + echo 'Patch #112 (rh1238290.patch):' + /usr/bin/cat /builddir/build/SOURCES/rh1238290.patch + /usr/bin/patch -p1 -b --suffix .1238290 --fuzz=0 patching file lib/cryptohi/seckey.c Patch #113 (cve-2015-7575-minimal.patch): + echo 'Patch #113 (cve-2015-7575-minimal.patch):' + /usr/bin/cat /builddir/build/SOURCES/cve-2015-7575-minimal.patch + /usr/bin/patch -p1 -b --suffix .cve-2015-7575 --fuzz=0 patching file lib/ssl/ssl3con.c Hunk #1 succeeded at 4452 (offset 107 lines). ~/build/BUILD/nss-3.19.1 + popd + pemNeedsFromSoftoken='lowkeyi lowkeyti softoken softoknt' + for file in '${pemNeedsFromSoftoken}' + /usr/bin/cp ./nss/lib/softoken/lowkeyi.h ./nss/lib/ckfw/pem/ + for file in '${pemNeedsFromSoftoken}' + /usr/bin/cp ./nss/lib/softoken/lowkeyti.h ./nss/lib/ckfw/pem/ + for file in '${pemNeedsFromSoftoken}' + /usr/bin/cp ./nss/lib/softoken/softoken.h ./nss/lib/ckfw/pem/ + for file in '${pemNeedsFromSoftoken}' + /usr/bin/cp ./nss/lib/softoken/softoknt.h ./nss/lib/ckfw/pem/ + /usr/bin/cp ./nss/lib/softoken/lowkeyi.h ./nss/cmd/rsaperf + /usr/bin/cp ./nss/lib/softoken/lowkeyti.h ./nss/cmd/rsaperf + /usr/bin/rm -rf ./nss/lib/freebl + /usr/bin/rm -rf ./nss/lib/softoken + /usr/bin/rm -rf ./nss/lib/util + /usr/bin/rm -rf ./nss/cmd/bltest + /usr/bin/rm -rf ./nss/cmd/fipstest + /usr/bin/rm -rf ./nss/cmd/rsaperf_low ~/build/BUILD/nss-3.19.1/nss/tests/ssl ~/build/BUILD/nss-3.19.1 + pushd nss/tests/ssl + cat sslcov.txt + sed -r 's/^([^#].*EXPORT|^[^#].*SSL2)/#disabled \1/' + cat sslstress.txt + sed -r 's/^([^#].*EXPORT|^[^#].*SSL2)/#disabled \1/' ~/build/BUILD/nss-3.19.1 + popd + exit 0 Executing(%build): /bin/sh -e /var/tmp/rpm-tmp.uhii9C + umask 022 + cd /builddir/build/BUILD + cd nss-3.19.1 + export NSS_NO_SSL2=1 + NSS_NO_SSL2=1 + NSS_NO_PKCS11_BYPASS=1 + export NSS_NO_PKCS11_BYPASS + FREEBL_NO_DEPEND=1 + export FREEBL_NO_DEPEND + BUILD_OPT=1 + export BUILD_OPT + XCFLAGS='-O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard' + export XCFLAGS + PKG_CONFIG_ALLOW_SYSTEM_LIBS=1 + PKG_CONFIG_ALLOW_SYSTEM_CFLAGS=1 + export PKG_CONFIG_ALLOW_SYSTEM_LIBS + export PKG_CONFIG_ALLOW_SYSTEM_CFLAGS ++ /usr/bin/pkg-config --cflags-only-I nspr ++ sed s/-I// + NSPR_INCLUDE_DIR='/usr/include/nspr4 ' + NSPR_LIB_DIR=/usr/lib + export NSPR_INCLUDE_DIR + export NSPR_LIB_DIR ++ /usr/bin/pkg-config --cflags-only-I nss-util ++ sed s/-I// + export 'NSSUTIL_INCLUDE_DIR=/usr/include/nss3 -I/usr/include/nspr4 ' + NSSUTIL_INCLUDE_DIR='/usr/include/nss3 -I/usr/include/nspr4 ' + export NSSUTIL_LIB_DIR=/usr/lib + NSSUTIL_LIB_DIR=/usr/lib ++ /usr/bin/pkg-config --cflags-only-I nss-softokn ++ sed s/-I// + export 'FREEBL_INCLUDE_DIR=/usr/include/nss3 -I/usr/include/nspr4 ' + FREEBL_INCLUDE_DIR='/usr/include/nss3 -I/usr/include/nspr4 ' + export FREEBL_LIB_DIR=/usr/lib + FREEBL_LIB_DIR=/usr/lib + export USE_SYSTEM_FREEBL=1 + USE_SYSTEM_FREEBL=1 + export NSS_USE_SYSTEM_FREEBL=1 + NSS_USE_SYSTEM_FREEBL=1 ++ /usr/bin/pkg-config --libs nss-softokn + export 'FREEBL_LIBS=-L/usr/lib -lfreebl3 -lnssdbm3 -lsoftokn3 -lnssutil3 -lplds4 -lplc4 -lnspr4 -lpthread -ldl ' + FREEBL_LIBS='-L/usr/lib -lfreebl3 -lnssdbm3 -lsoftokn3 -lnssutil3 -lplds4 -lplc4 -lnspr4 -lpthread -ldl ' + export SOFTOKEN_LIB_DIR=/usr/lib + SOFTOKEN_LIB_DIR=/usr/lib + export USE_SYSTEM_NSSUTIL=1 + USE_SYSTEM_NSSUTIL=1 + export USE_SYSTEM_SOFTOKEN=1 + USE_SYSTEM_SOFTOKEN=1 + export NSS_BUILD_WITHOUT_SOFTOKEN=1 + NSS_BUILD_WITHOUT_SOFTOKEN=1 + NSS_USE_SYSTEM_SQLITE=1 + export NSS_USE_SYSTEM_SQLITE + export IN_TREE_FREEBL_HEADERS_FIRST=1 + IN_TREE_FREEBL_HEADERS_FIRST=1 + NSS_ENABLE_ECC=1 + export NSS_ENABLE_ECC + NSS_ECC_MORE_THAN_SUITE_B=1 + export NSS_ECC_MORE_THAN_SUITE_B + export NSS_BLTEST_NOT_AVAILABLE=1 + NSS_BLTEST_NOT_AVAILABLE=1 + /usr/bin/make -C ./nss/coreconf make: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/coreconf' cd nsinstall; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/coreconf/nsinstall' make[1]: Nothing to be done for `export'. make[1]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/coreconf/nsinstall' cd nsinstall; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/coreconf/nsinstall' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nsinstall.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pathsub.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pathsub.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pathsub.o -Wl,-z,relro -lpthread -ldl -lc true -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[1]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/coreconf/nsinstall' make: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/coreconf' + /usr/bin/make -C ./nss/lib/dbm make: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm' cd include; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm/include' Creating ../../../../dist/public/dbm ../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cdefs.h mcom_db.h ncompat.h winfile.h ../../../../dist/public/dbm Creating ../../../../dist/private/dbm ../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 hsearch.h page.h extern.h queue.h hash.h mpool.h search.h ../../../../dist/private/dbm make[1]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm/include' cd src; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm/src' make[1]: Nothing to be done for `export'. make[1]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm/src' cd include; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm/include' make[1]: Nothing to be done for `libs'. make[1]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm/include' cd src; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm/src' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/db.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard db.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/h_bigkey.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard h_bigkey.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/h_func.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard h_func.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/h_log2.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard h_log2.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/h_page.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard h_page.c h_page.c: In function 'new_lseek': h_page.c:165:15: warning: ignoring return value of 'write', declared with attribute warn_unused_result [-Wunused-result] write(fd, (char*)&buffer, (size_t)(1024 > len ? len : 1024)); ^ h_page.c: In function 'overflow_page': h_page.c:1002:4: warning: ignoring return value of 'write', declared with attribute warn_unused_result [-Wunused-result] (void)write(STDERR_FILENO, OVMSG, sizeof(OVMSG) - 1); ^ h_page.c:1017:4: warning: ignoring return value of 'write', declared with attribute warn_unused_result [-Wunused-result] (void)write(STDERR_FILENO, OVMSG, sizeof(OVMSG) - 1); ^ h_page.c:1043:5: warning: ignoring return value of 'write', declared with attribute warn_unused_result [-Wunused-result] (void)write(STDERR_FILENO, OVMSG, ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/hash.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard hash.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/hash_buf.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard hash_buf.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/mktemp.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard mktemp.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/dirent.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dirent.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libdbm.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libdbm.a Linux3.19_arm_glibc_PTH_OPT.OBJ/db.o Linux3.19_arm_glibc_PTH_OPT.OBJ/h_bigkey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/h_func.o Linux3.19_arm_glibc_PTH_OPT.OBJ/h_log2.o Linux3.19_arm_glibc_PTH_OPT.OBJ/h_page.o Linux3.19_arm_glibc_PTH_OPT.OBJ/hash.o Linux3.19_arm_glibc_PTH_OPT.OBJ/hash_buf.o Linux3.19_arm_glibc_PTH_OPT.OBJ/mktemp.o Linux3.19_arm_glibc_PTH_OPT.OBJ/dirent.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libdbm.a ../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libdbm.a ../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[1]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm/src' make: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm' + /usr/bin/make -C ./nss make: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss' cd coreconf; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/coreconf' cd nsinstall; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/coreconf/nsinstall' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/coreconf/nsinstall' cd nsinstall; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/coreconf/nsinstall' true -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/coreconf/nsinstall' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/coreconf' cd lib; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib' cd dbm; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm' cd include; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm/include' ../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cdefs.h mcom_db.h ncompat.h winfile.h ../../../../dist/public/dbm ../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 hsearch.h page.h extern.h queue.h hash.h mpool.h search.h ../../../../dist/private/dbm make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm/include' cd src; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm/src' make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm/src' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm' cd base; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/base' Creating ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssbaset.h nssbase.h ../../../dist/public/nss Creating ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 baset.h base.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/base' cd dev; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dev' ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ckhelper.h devm.h devtm.h devt.h dev.h nssdevt.h nssdev.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dev' cd pki; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/pki' ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pki.h pkit.h nsspkit.h nsspki.h pkistore.h pki3hack.h pkitm.h pkim.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/pki' cd libpkix; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix' cd include; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/include' ../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../dist/private/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/include' cd pkix; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/certsel' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/crlsel' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/checker' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/params' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/results' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/store' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/top' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/util' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/util' cd certsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/certsel' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/crlsel' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/checker' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/params' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/results' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/store' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/top' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/util' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/util' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/system' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/module' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/module' cd pki; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/system' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/module' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/module' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss' cd include; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/include' ../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../dist/private/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/include' cd pkix; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/certsel' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/crlsel' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/checker' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/params' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/results' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/store' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/top' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/util' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/util' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/system' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/module' ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/module' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss' There are no private exports. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix' cd certdb; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/certdb' ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cert.h certt.h certdb.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 genname.h xconst.h certxutl.h certi.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/certdb' cd certhigh; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/certhigh' ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocsp.h ocspt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocspti.h ocspi.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/certhigh' cd pk11wrap; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/pk11wrap' ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmod.h secmodt.h secpkcs5.h pk11func.h pk11pub.h pk11priv.h pk11sdr.h pk11pqg.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmodi.h dev3hack.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/pk11wrap' cd cryptohi; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/cryptohi' ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cryptohi.h cryptoht.h key.h keyhi.h keyt.h keythi.h sechash.h ../../../dist/public/nss There are no private exports. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/cryptohi' cd nss; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/nss' ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nss.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssrenam.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/nss' cd ssl; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ssl' ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ssl.h sslt.h sslerr.h sslproto.h preenc.h ../../../dist/public/nss There are no private exports. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ssl' cd pkcs12; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/pkcs12' ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkcs12t.h pkcs12.h p12plcy.h p12.h p12t.h ../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/pkcs12' cd pkcs7; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/pkcs7' ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmime.h secpkcs7.h pkcs7t.h ../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/pkcs7' cd smime; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/smime' ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cms.h cmst.h smime.h cmsreclist.h ../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/smime' cd crmf; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/crmf' ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmf.h crmft.h cmmf.h cmmft.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmfi.h crmfit.h cmmfi.h cmmfit.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/crmf' cd jar; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/jar' ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 jar.h jar-ds.h jarfile.h ../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/jar' cd ckfw; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ckfw' cd builtins; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ckfw/builtins' ../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckbi.h ../../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ckfw/builtins' cd pem; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ckfw/pem' ../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nsspem.h ../../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ckfw/pem' ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssck.api nssckepv.h nssckft.h nssckfw.h nssckfwc.h nssckfwt.h nssckg.h nssckmdt.h nssckt.h ../../../dist/public/nss cd builtins; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ckfw/builtins' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ckfw/builtins' cd pem; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ckfw/pem' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ckfw/pem' ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ck.h ckfw.h ckfwm.h ckfwtm.h ckmd.h ckt.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ckfw' cd sysinit; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/sysinit' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/sysinit' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib' cd cmd; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd' cd lib; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/lib' ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 basicutil.h secutil.h pk11table.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/lib' cd addbuiltin; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/addbuiltin' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/addbuiltin' cd atob; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/atob' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/atob' cd btoa; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/btoa' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/btoa' cd certcgi; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/certcgi' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/certcgi' cd certutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/certutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/certutil' cd checkcert; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/checkcert' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/checkcert' cd chktest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/chktest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/chktest' cd crlutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/crlutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/crlutil' cd crmftest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/crmftest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/crmftest' cd dbtest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/dbtest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/dbtest' cd derdump; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/derdump' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/derdump' cd digest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/digest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/digest' cd httpserv; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/httpserv' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/httpserv' cd listsuites; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/listsuites' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/listsuites' cd makepqg; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/makepqg' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/makepqg' cd multinit; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/multinit' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/multinit' cd ocspclnt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/ocspclnt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/ocspclnt' cd ocspresp; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/ocspresp' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/ocspresp' cd oidcalc; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/oidcalc' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/oidcalc' cd p7content; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/p7content' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/p7content' cd p7env; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/p7env' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/p7env' cd p7sign; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/p7sign' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/p7sign' cd p7verify; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/p7verify' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/p7verify' cd pk12util; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pk12util' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pk12util' cd pk11gcmtest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pk11gcmtest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pk11gcmtest' cd pk11mode; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pk11mode' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pk11mode' cd pk1sign; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pk1sign' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pk1sign' cd pkix-errcodes; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pkix-errcodes' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pkix-errcodes' cd pp; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pp' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pp' cd pwdecrypt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pwdecrypt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pwdecrypt' cd rsaperf; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/rsaperf' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/rsaperf' cd sdrtest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/sdrtest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/sdrtest' cd selfserv; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/selfserv' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/selfserv' cd signtool; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/signtool' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/signtool' cd signver; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/signver' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/signver' cd shlibsign; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/shlibsign' cd mangle; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/shlibsign/mangle' make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/shlibsign/mangle' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/shlibsign' cd smimetools; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/smimetools' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/smimetools' cd ssltap; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/ssltap' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/ssltap' cd strsclnt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/strsclnt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/strsclnt' cd symkeyutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/symkeyutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/symkeyutil' cd tests; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/tests' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/tests' cd tstclnt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/tstclnt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/tstclnt' cd vfychain; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/vfychain' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/vfychain' cd vfyserv; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/vfyserv' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/vfyserv' cd modutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/modutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/modutil' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd' cd coreconf; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/coreconf' cd nsinstall; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/coreconf/nsinstall' true -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/coreconf/nsinstall' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/coreconf' cd lib; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib' cd dbm; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm' cd include; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm/include' make[3]: Nothing to be done for `libs'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm/include' cd src; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm/src' ../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libdbm.a ../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm/src' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dbm' cd base; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/base' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/arena.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard arena.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/error.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard error.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/errorval.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard errorval.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/hashops.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard hashops.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/libc.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard libc.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/tracker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tracker.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/item.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard item.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/utf8.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard utf8.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/list.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard list.c list.c: In function 'nssList_Add': list.c:220:14: warning: variable 'nssrv' set but not used [-Wunused-but-set-variable] PRStatus nssrv; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/hash.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard hash.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssb.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssb.a Linux3.19_arm_glibc_PTH_OPT.OBJ/arena.o Linux3.19_arm_glibc_PTH_OPT.OBJ/error.o Linux3.19_arm_glibc_PTH_OPT.OBJ/errorval.o Linux3.19_arm_glibc_PTH_OPT.OBJ/hashops.o Linux3.19_arm_glibc_PTH_OPT.OBJ/libc.o Linux3.19_arm_glibc_PTH_OPT.OBJ/tracker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/item.o Linux3.19_arm_glibc_PTH_OPT.OBJ/utf8.o Linux3.19_arm_glibc_PTH_OPT.OBJ/list.o Linux3.19_arm_glibc_PTH_OPT.OBJ/hash.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssb.a ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssb.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/base' cd dev; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dev' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/devslot.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard devslot.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/devtoken.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard devtoken.c devtoken.c: In function 'nssToken_TraverseCertificates': devtoken.c:1469:14: warning: variable 'status' set but not used [-Wunused-but-set-variable] PRStatus status; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/devutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard devutil.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ckhelper.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ckhelper.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssdev.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssdev.a Linux3.19_arm_glibc_PTH_OPT.OBJ/devslot.o Linux3.19_arm_glibc_PTH_OPT.OBJ/devtoken.o Linux3.19_arm_glibc_PTH_OPT.OBJ/devutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ckhelper.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssdev.a ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssdev.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/dev' cd pki; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/pki' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/asymmkey.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard asymmkey.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certificate.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certificate.c certificate.c: In function 'nssCertificateList_DoCallback': certificate.c:898:14: warning: variable 'nssrv' set but not used [-Wunused-but-set-variable] PRStatus nssrv; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cryptocontext.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cryptocontext.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/symmkey.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard symmkey.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/trustdomain.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard trustdomain.c trustdomain.c: In function 'NSSTrustDomain_TraverseCertificates': trustdomain.c:994:14: warning: variable 'status' set but not used [-Wunused-but-set-variable] PRStatus status = PR_FAILURE; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/tdcache.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tdcache.c tdcache.c: In function 'add_cert_to_cache': tdcache.c:779:9: warning: variable 'handle' set but not used [-Wunused-but-set-variable] PRBool handle = PR_FALSE; ^ tdcache.c: In function 'nssTrustDomain_RemoveCertFromCacheLOCKED': tdcache.c:272:16: warning: 'nickname' may be used uninitialized in this function [-Wmaybe-uninitialized] nssHash_Remove(cache->nickname, nickname); ^ tdcache.c:332:14: note: 'nickname' was declared here NSSUTF8 *nickname; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certdecode.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certdecode.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkistore.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkistore.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkibase.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkibase.c pkibase.c: In function 'nssPKIObjectCollection_Traverse': pkibase.c:906:14: warning: variable 'status' set but not used [-Wunused-but-set-variable] PRStatus status; ^ pkibase.c: In function 'nssCertificateCollection_Create': pkibase.c:1060:14: warning: variable 'status' set but not used [-Wunused-but-set-variable] PRStatus status; ^ pkibase.c: In function 'nssCRLCollection_Create': pkibase.c:1167:14: warning: variable 'status' set but not used [-Wunused-but-set-variable] PRStatus status; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pki3hack.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pki3hack.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsspki.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsspki.a Linux3.19_arm_glibc_PTH_OPT.OBJ/asymmkey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certificate.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cryptocontext.o Linux3.19_arm_glibc_PTH_OPT.OBJ/symmkey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/trustdomain.o Linux3.19_arm_glibc_PTH_OPT.OBJ/tdcache.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certdecode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkistore.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkibase.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pki3hack.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsspki.a ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsspki.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/pki' cd libpkix; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix' cd include; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/include' make[3]: Nothing to be done for `libs'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/include' cd pkix; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/certsel' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_certselector.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_certselector.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_comcertselparams.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixcertsel.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixcertsel.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_certselector.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixcertsel.a ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixcertsel.a ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/crlsel' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_crlselector.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_crlselector.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_comcrlselparams.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixcrlsel.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_crlselector.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/checker' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_basicconstraintschecker.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_certchainchecker.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_crlchecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_crlchecker.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_ekuchecker.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_expirationchecker.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_namechainingchecker.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_nameconstraintschecker.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_ocspchecker.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_revocationmethod.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_revocationchecker.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_policychecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_policychecker.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_signaturechecker.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_targetcertchecker.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixchecker.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixchecker.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_crlchecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_policychecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixchecker.a ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixchecker.a ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/params' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_trustanchor.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_trustanchor.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_procparams.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_procparams.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_valparams.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_valparams.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_resourcelimits.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixparams.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixparams.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_trustanchor.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_procparams.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_valparams.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixparams.a ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixparams.a ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/results' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_buildresult.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_buildresult.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_policynode.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_policynode.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_valresult.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_valresult.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_verifynode.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_verifynode.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixresults.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixresults.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_buildresult.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_policynode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_valresult.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_verifynode.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixresults.a ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixresults.a ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/store' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_store.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_store.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixstore.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixstore.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_store.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixstore.a ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixstore.a ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/top' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_validate.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_validate.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_lifecycle.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_lifecycle.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_build.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_build.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixtop.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixtop.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_validate.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_lifecycle.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_build.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixtop.a ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixtop.a ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/util' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_tools.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_tools.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_error.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_error.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_logger.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_logger.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_list.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_list.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_errpaths.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_errpaths.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixutil.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixutil.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_tools.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_error.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_logger.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_list.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_errpaths.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixutil.a ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixutil.a ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix/util' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/pki' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_basicconstraints.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_cert.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_cert.c pkix_pl_cert.c: In function 'PKIX_PL_Cert_Create': pkix_pl_cert.c:1518:22: warning: variable 'copyDER' set but not used [-Wunused-but-set-variable] PKIX_Boolean copyDER; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_certpolicyinfo.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_certpolicymap.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_certpolicyqualifier.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_crl.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_crl.c pkix_pl_crl.c: In function 'pkix_pl_CRL_ToString': pkix_pl_crl.c:456:21: warning: 'crlVersion' may be used uninitialized in this function [-Wmaybe-uninitialized] (&crlString, ^ pkix_pl_crl.c:354:21: note: 'crlVersion' was declared here PKIX_UInt32 crlVersion; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_crldp.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_crlentry.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_date.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_date.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_generalname.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_infoaccess.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_nameconstraints.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ocsprequest.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ocspresponse.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_publickey.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_x500name.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ocspcertid.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixpki.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixpki.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_cert.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_crl.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_date.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixpki.a ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixpki.a ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/system' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_bigint.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_bytearray.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_common.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_common.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_error.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_error.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_hashtable.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_lifecycle.c pkix_pl_lifecycle.c: In function 'PKIX_PL_Shutdown': pkix_pl_lifecycle.c:248:21: warning: variable 'numLeakedObjects' set but not used [-Wunused-but-set-variable] PKIX_UInt32 numLeakedObjects = 0; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_mem.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_mem.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_monitorlock.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_mutex.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_object.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_object.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_oid.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_oid.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_primhash.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_rwlock.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_string.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_string.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixsystem.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixsystem.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_common.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_error.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_mem.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_object.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_oid.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_string.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixsystem.a ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixsystem.a ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/module' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_aiamgr.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_colcertstore.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_httpcertstore.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_httpdefaultclient.c pkix_pl_httpdefaultclient.c: In function 'pkix_pl_HttpDefaultClient_Cancel': pkix_pl_httpdefaultclient.c:1483:36: warning: variable 'client' set but not used [-Wunused-but-set-variable] PKIX_PL_HttpDefaultClient *client = NULL; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ldaptemplates.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ldapcertstore.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ldapresponse.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ldaprequest.c pkix_pl_ldaprequest.c: In function 'pkix_pl_LdapRequest_Destroy': pkix_pl_ldaprequest.c:266:30: warning: variable 'ldapRq' set but not used [-Wunused-but-set-variable] PKIX_PL_LdapRequest *ldapRq = NULL; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ldapdefaultclient.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_nsscontext.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_pk11certstore.c pkix_pl_pk11certstore.c: In function 'NameCacheHasFetchedCrlInfo': pkix_pl_pk11certstore.c:382:22: warning: variable 'cert' set but not used [-Wunused-but-set-variable] CERTCertificate *cert; ^ pkix_pl_pk11certstore.c: In function 'DownloadCrl': pkix_pl_pk11certstore.c:782:16: warning: variable 'savedError' set but not used [-Wunused-but-set-variable] PKIX_Int32 savedError = -1; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_socket.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_socket.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixmodule.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixmodule.a Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_socket.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixmodule.a ../../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkixmodule.a ../../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss/module' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix/pkix_pl_nss' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/libpkix' cd certdb; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/certdb' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/alg1485.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard alg1485.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certdb.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certdb.c certdb.c: In function 'CERT_ImportCerts': certdb.c:2446:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable] SECStatus rv; ^ certdb.c: In function 'CERT_UnlockCertRefCount': certdb.c:2896:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] PRStatus prstat; ^ certdb.c: In function 'CERT_UnlockCertTrust': certdb.c:2976:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] PRStatus prstat; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certv3.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certv3.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certxutl.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certxutl.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crl.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crl.c crl.c: In function 'crl_storeCRL': crl.c:630:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable] SECStatus rv; ^ crl.c: In function 'cert_CheckCertRevocationStatus': crl.c:2696:27: warning: unused variable 'rv2' [-Wunused-variable] SECStatus rv2 = CERT_FindCRLEntryReasonExten(entry, &reason); ^ crl.c: In function 'cert_CacheCRLByGeneralName': crl.c:3053:32: warning: variable 'rv2' set but not used [-Wunused-but-set-variable] SECStatus rv = SECSuccess, rv2; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/genname.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard genname.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/stanpcertdb.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard stanpcertdb.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/polcyxtn.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard polcyxtn.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secname.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secname.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/xauthkid.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard xauthkid.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/xbsconst.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard xbsconst.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/xconst.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard xconst.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libcertdb.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libcertdb.a Linux3.19_arm_glibc_PTH_OPT.OBJ/alg1485.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certdb.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certv3.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certxutl.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crl.o Linux3.19_arm_glibc_PTH_OPT.OBJ/genname.o Linux3.19_arm_glibc_PTH_OPT.OBJ/stanpcertdb.o Linux3.19_arm_glibc_PTH_OPT.OBJ/polcyxtn.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secname.o Linux3.19_arm_glibc_PTH_OPT.OBJ/xauthkid.o Linux3.19_arm_glibc_PTH_OPT.OBJ/xbsconst.o Linux3.19_arm_glibc_PTH_OPT.OBJ/xconst.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libcertdb.a ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libcertdb.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/certdb' cd certhigh; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/certhigh' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certhtml.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certhtml.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certreq.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certreq.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crlv2.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crlv2.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ocsp.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ocsp.c ocsp.c: In function 'ocsp_RemoveCacheItem': ocsp.c:562:12: warning: variable 'couldRemoveFromHashTable' set but not used [-Wunused-but-set-variable] PRBool couldRemoveFromHashTable; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspsig.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ocspsig.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certhigh.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certhigh.c certhigh.c: In function 'CERT_MatchNickname': certhigh.c:28:9: warning: variable 'len' set but not used [-Wunused-but-set-variable] int len; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certvfy.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certvfy.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certvfypkix.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certvfypkix.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/xcrldist.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard xcrldist.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libcerthi.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libcerthi.a Linux3.19_arm_glibc_PTH_OPT.OBJ/certhtml.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certreq.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crlv2.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ocsp.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspsig.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certhigh.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certvfy.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certvfypkix.o Linux3.19_arm_glibc_PTH_OPT.OBJ/xcrldist.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libcerthi.a ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libcerthi.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/certhigh' cd pk11wrap; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/pk11wrap' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/dev3hack.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dev3hack.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11akey.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11akey.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11auth.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11auth.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11cert.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11cert.c pk11cert.c: In function 'pk11_fastCert': pk11cert.c:231:14: warning: variable 'status' set but not used [-Wunused-but-set-variable] PRStatus status; ^ pk11cert.c: In function 'PK11_TraverseCertsForNicknameInSlot': pk11cert.c:2008:28: warning: variable 'pk11cb' set but not used [-Wunused-but-set-variable] struct nss3_cert_cbstr pk11cb; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11cxt.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11cxt.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11err.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11err.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11kea.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11kea.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11list.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11list.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11load.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11load.c pk11load.c: In function 'SECMOD_UnloadModule': pk11load.c:592:28: warning: unused variable 'status' [-Wunused-variable] PRStatus status = PR_UnloadLibrary(softokenLib); ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11mech.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11mech.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11merge.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11merge.c pk11merge.c: In function 'pk11_mergeByObjectIDs': pk11merge.c:852:15: warning: 'error' may be used uninitialized in this function [-Wmaybe-uninitialized] PORT_SetError(error); ^ pk11merge.c:753:9: note: 'error' was declared here int error; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11nobj.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11nobj.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11obj.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11obj.c pk11obj.c: In function 'PK11_MatchItem': pk11obj.c:1784:22: warning: variable 'parent' set but not used [-Wunused-but-set-variable] CK_OBJECT_HANDLE parent; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pars.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11pars.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pbe.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11pbe.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pk12.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11pk12.c pk11pk12.c: In function 'PK11_ImportPrivateKeyInfoAndReturnKey': pk11pk12.c:425:17: warning: variable 'keyType' set but not used [-Wunused-but-set-variable] CK_KEY_TYPE keyType = CKK_RSA; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pqg.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11pqg.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11sdr.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11sdr.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11skey.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11skey.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11slot.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11slot.c pk11slot.c: In function 'PK11_InitToken': pk11slot.c:1108:11: warning: variable 'tmp' set but not used [-Wunused-but-set-variable] char *tmp; ^ pk11slot.c: In function 'PK11_InitSlot': pk11slot.c:1352:11: warning: variable 'tmp' set but not used [-Wunused-but-set-variable] char *tmp; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11util.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11util.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpk11wrap.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpk11wrap.a Linux3.19_arm_glibc_PTH_OPT.OBJ/dev3hack.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11akey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11auth.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11cert.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11cxt.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11err.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11kea.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11list.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11load.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11mech.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11merge.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11nobj.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11obj.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pars.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pbe.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pk12.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pqg.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11sdr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11skey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11slot.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11util.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpk11wrap.a ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpk11wrap.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/pk11wrap' cd cryptohi; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/cryptohi' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sechash.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sechash.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/seckey.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard seckey.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secsign.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secsign.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secvfy.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secvfy.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/dsautil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dsautil.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libcryptohi.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libcryptohi.a Linux3.19_arm_glibc_PTH_OPT.OBJ/sechash.o Linux3.19_arm_glibc_PTH_OPT.OBJ/seckey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secsign.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secvfy.o Linux3.19_arm_glibc_PTH_OPT.OBJ/dsautil.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libcryptohi.a ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libcryptohi.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/cryptohi' cd nss; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/nss' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/nssinit.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nssinit.c nssinit.c: In function 'NSS_VersionCheck': nssinit.c:1250:19: warning: variable 'c' set but not used [-Wunused-but-set-variable] volatile char c; /* force a reference that won't get optimized away */ ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/nssver.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nssver.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/utilwrap.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard utilwrap.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libnss.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libnss.a Linux3.19_arm_glibc_PTH_OPT.OBJ/nssinit.o Linux3.19_arm_glibc_PTH_OPT.OBJ/nssver.o Linux3.19_arm_glibc_PTH_OPT.OBJ/utilwrap.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libnss.a grep -v ';-' nss.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.19_arm_glibc_PTH_OPT.OBJ/nss.def rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libnss3.so gcc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnss3.so -Wl,--version-script,Linux3.19_arm_glibc_PTH_OPT.OBJ/nss.def -o Linux3.19_arm_glibc_PTH_OPT.OBJ/libnss3.so Linux3.19_arm_glibc_PTH_OPT.OBJ/nssinit.o Linux3.19_arm_glibc_PTH_OPT.OBJ/nssver.o Linux3.19_arm_glibc_PTH_OPT.OBJ/utilwrap.o ../certhigh/Linux3.19_arm_glibc_PTH_OPT.OBJ/certhtml.o ../certhigh/Linux3.19_arm_glibc_PTH_OPT.OBJ/certreq.o ../certhigh/Linux3.19_arm_glibc_PTH_OPT.OBJ/crlv2.o ../certhigh/Linux3.19_arm_glibc_PTH_OPT.OBJ/ocsp.o ../certhigh/Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspsig.o ../certhigh/Linux3.19_arm_glibc_PTH_OPT.OBJ/certhigh.o ../certhigh/Linux3.19_arm_glibc_PTH_OPT.OBJ/certvfy.o ../certhigh/Linux3.19_arm_glibc_PTH_OPT.OBJ/certvfypkix.o ../certhigh/Linux3.19_arm_glibc_PTH_OPT.OBJ/xcrldist.o ../cryptohi/Linux3.19_arm_glibc_PTH_OPT.OBJ/sechash.o ../cryptohi/Linux3.19_arm_glibc_PTH_OPT.OBJ/seckey.o ../cryptohi/Linux3.19_arm_glibc_PTH_OPT.OBJ/secsign.o ../cryptohi/Linux3.19_arm_glibc_PTH_OPT.OBJ/secvfy.o ../cryptohi/Linux3.19_arm_glibc_PTH_OPT.OBJ/dsautil.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/dev3hack.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11akey.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11auth.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11cert.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11cxt.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11err.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11kea.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11list.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11load.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11mech.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11merge.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11nobj.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11obj.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pars.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pbe.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pk12.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11pqg.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11sdr.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11skey.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11slot.o ../pk11wrap/Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11util.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/alg1485.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/certdb.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/certv3.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/certxutl.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/crl.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/genname.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/stanpcertdb.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/polcyxtn.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/secname.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/xauthkid.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/xbsconst.o ../certdb/Linux3.19_arm_glibc_PTH_OPT.OBJ/xconst.o ../pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/asymmkey.o ../pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/certificate.o ../pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/cryptocontext.o ../pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/symmkey.o ../pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/trustdomain.o ../pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/tdcache.o ../pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/certdecode.o ../pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkistore.o ../pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkibase.o ../pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pki3hack.o ../dev/Linux3.19_arm_glibc_PTH_OPT.OBJ/devslot.o ../dev/Linux3.19_arm_glibc_PTH_OPT.OBJ/devtoken.o ../dev/Linux3.19_arm_glibc_PTH_OPT.OBJ/devutil.o ../dev/Linux3.19_arm_glibc_PTH_OPT.OBJ/ckhelper.o ../base/Linux3.19_arm_glibc_PTH_OPT.OBJ/arena.o ../base/Linux3.19_arm_glibc_PTH_OPT.OBJ/error.o ../base/Linux3.19_arm_glibc_PTH_OPT.OBJ/errorval.o ../base/Linux3.19_arm_glibc_PTH_OPT.OBJ/hashops.o ../base/Linux3.19_arm_glibc_PTH_OPT.OBJ/libc.o ../base/Linux3.19_arm_glibc_PTH_OPT.OBJ/tracker.o ../base/Linux3.19_arm_glibc_PTH_OPT.OBJ/item.o ../base/Linux3.19_arm_glibc_PTH_OPT.OBJ/utf8.o ../base/Linux3.19_arm_glibc_PTH_OPT.OBJ/list.o ../base/Linux3.19_arm_glibc_PTH_OPT.OBJ/hash.o ../libpkix/pkix/certsel/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_certselector.o ../libpkix/pkix/certsel/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_crlchecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_policychecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o ../libpkix/pkix/checker/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o ../libpkix/pkix/params/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_trustanchor.o ../libpkix/pkix/params/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_procparams.o ../libpkix/pkix/params/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_valparams.o ../libpkix/pkix/params/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o ../libpkix/pkix/results/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_buildresult.o ../libpkix/pkix/results/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_policynode.o ../libpkix/pkix/results/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_valresult.o ../libpkix/pkix/results/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_verifynode.o ../libpkix/pkix/top/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_validate.o ../libpkix/pkix/top/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_lifecycle.o ../libpkix/pkix/top/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_build.o ../libpkix/pkix/util/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_tools.o ../libpkix/pkix/util/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_error.o ../libpkix/pkix/util/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_logger.o ../libpkix/pkix/util/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_list.o ../libpkix/pkix/util/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_errpaths.o ../libpkix/pkix/crlsel/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_crlselector.o ../libpkix/pkix/crlsel/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o ../libpkix/pkix/store/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_store.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_cert.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_crl.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_date.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o ../libpkix/pkix_pl_nss/pki/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_common.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_error.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_mem.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_object.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_oid.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o ../libpkix/pkix_pl_nss/system/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_string.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o ../libpkix/pkix_pl_nss/module/Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix_pl_socket.o -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux3.19_arm_glibc_PTH_OPT.OBJ/libnss3.so ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libnss.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/libnss3.so ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/nss' cd ssl; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ssl' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/derive.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard derive.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/dtlscon.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dtlscon.c dtlscon.c: In function 'ssl3_DisableNonDTLSSuites': dtlscon.c:107:19: warning: unused variable 'rv' [-Wunused-variable] SECStatus rv = ssl3_CipherPrefSet(ss, *suite, PR_FALSE); ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/prelib.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard prelib.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3con.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssl3con.c ssl3con.c: In function 'ssl3_DeriveMasterSecret': ssl3con.c:3666:23: warning: variable 'master_params_len' set but not used [-Wunused-but-set-variable] unsigned int master_params_len; ^ ssl3con.c: In function 'ssl3_HandleRSAClientKeyExchange': ssl3con.c:9554:23: warning: variable 'pmsItem' set but not used [-Wunused-but-set-variable] SECItem pmsItem = {siBuffer, NULL, 0}; ^ ssl3con.c:9550:23: warning: variable 'isTLS' set but not used [-Wunused-but-set-variable] PRBool isTLS = PR_FALSE; ^ ssl3con.c: In function 'ssl3_HandleRecord': ssl3con.c:12019:21: warning: 'dtls_seq_num' may be used uninitialized in this function [-Wmaybe-uninitialized] dtls_RecordSetRecvd(&crSpec->recvdRecords, dtls_seq_num); ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3gthr.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssl3gthr.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslauth.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslauth.c sslauth.c: In function 'SSL_AuthCertificate': sslauth.c:267:18: warning: unused variable 'error' [-Wunused-variable] PRErrorCode error = PR_GetError(); ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslcon.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslcon.c sslcon.c: In function 'ssl2_HandleMessage': sslcon.c:2498:22: warning: variable 'rv2' set but not used [-Wunused-but-set-variable] int rv2; ^ sslcon.c: In function 'NSSSSL_VersionCheck': sslcon.c:3687:19: warning: variable 'c' set but not used [-Wunused-but-set-variable] volatile char c; /* force a reference that won't get optimized away */ ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssldef.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssldef.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslenum.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslenum.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslerr.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslerr.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslerrstrs.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslerrstrs.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslinit.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslinit.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3ext.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssl3ext.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslgathr.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslgathr.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslmutex.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslmutex.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslnonce.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslnonce.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslreveal.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslreveal.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslsecur.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslsecur.c sslsecur.c: In function 'ssl_SecureRecv': sslsecur.c:1186:22: warning: variable 'sec' set but not used [-Wunused-but-set-variable] sslSecurityInfo *sec; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslsnce.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslsnce.c sslsnce.c: In function 'InitCache': sslsnce.c:1232:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->sidCacheLocks) += ptr; ^ sslsnce.c:1233:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->keyCacheLock ) += ptr; ^ sslsnce.c:1234:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->certCacheLock) += ptr; ^ sslsnce.c:1235:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->srvNameCacheLock) += ptr; ^ sslsnce.c:1236:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->sidCacheSets ) += ptr; ^ sslsnce.c:1237:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->sidCacheData ) += ptr; ^ sslsnce.c:1238:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->certCacheData) += ptr; ^ sslsnce.c:1239:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->keyCacheData ) += ptr; ^ sslsnce.c:1240:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->ticketKeyNameSuffix) += ptr; ^ sslsnce.c:1241:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->ticketEncKey ) += ptr; ^ sslsnce.c:1242:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->ticketMacKey ) += ptr; ^ sslsnce.c:1243:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->ticketKeysValid) += ptr; ^ sslsnce.c:1244:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->srvNameCacheData) += ptr; ^ sslsnce.c: In function 'SSL_InheritMPServerSIDCacheInstance': sslsnce.c:1584:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->sidCacheLocks) += ptr; ^ sslsnce.c:1585:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->keyCacheLock ) += ptr; ^ sslsnce.c:1586:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->certCacheLock) += ptr; ^ sslsnce.c:1587:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->srvNameCacheLock) += ptr; ^ sslsnce.c:1588:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->sidCacheSets ) += ptr; ^ sslsnce.c:1589:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->sidCacheData ) += ptr; ^ sslsnce.c:1590:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->certCacheData) += ptr; ^ sslsnce.c:1591:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->keyCacheData ) += ptr; ^ sslsnce.c:1592:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->ticketKeyNameSuffix) += ptr; ^ sslsnce.c:1593:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->ticketEncKey ) += ptr; ^ sslsnce.c:1594:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->ticketMacKey ) += ptr; ^ sslsnce.c:1595:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->ticketKeysValid) += ptr; ^ sslsnce.c:1596:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(ptrdiff_t *)(&cache->srvNameCacheData) += ptr; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslsock.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslsock.c sslsock.c: In function 'NSS_SetDomesticPolicy': sslsock.c:1392:20: warning: unused variable 'status' [-Wunused-variable] SECStatus status = SECSuccess; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssltrace.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssltrace.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslver.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslver.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/authcert.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard authcert.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmpcert.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmpcert.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslinfo.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslinfo.c sslinfo.c: In function 'SSL_DisableDefaultExportCipherSuites': sslinfo.c:264:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable] SECStatus rv; ^ sslinfo.c: In function 'SSL_DisableExportCipherSuites': sslinfo.c:285:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable] SECStatus rv; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3ecc.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssl3ecc.c ssl3ecc.c: In function 'ssl3_DisableECCSuites': ssl3ecc.c:978:19: warning: unused variable 'rv' [-Wunused-variable] SECStatus rv = ssl3_CipherPrefSet(ss, *suite, PR_FALSE); ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/unix_err.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard unix_err.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libssl.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libssl.a Linux3.19_arm_glibc_PTH_OPT.OBJ/derive.o Linux3.19_arm_glibc_PTH_OPT.OBJ/dtlscon.o Linux3.19_arm_glibc_PTH_OPT.OBJ/prelib.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3con.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslauth.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslcon.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssldef.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslenum.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslerr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslinit.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3ext.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslgathr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslmutex.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslnonce.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslreveal.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslsecur.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslsnce.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslsock.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssltrace.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslver.o Linux3.19_arm_glibc_PTH_OPT.OBJ/authcert.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmpcert.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslinfo.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux3.19_arm_glibc_PTH_OPT.OBJ/unix_err.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libssl.a grep -v ';-' ssl.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl.def rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libssl3.so gcc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libssl3.so -Wl,--version-script,Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl.def -o Linux3.19_arm_glibc_PTH_OPT.OBJ/libssl3.so Linux3.19_arm_glibc_PTH_OPT.OBJ/derive.o Linux3.19_arm_glibc_PTH_OPT.OBJ/dtlscon.o Linux3.19_arm_glibc_PTH_OPT.OBJ/prelib.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3con.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslauth.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslcon.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssldef.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslenum.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslerr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslinit.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3ext.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslgathr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslmutex.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslnonce.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslreveal.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslsecur.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslsnce.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslsock.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssltrace.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslver.o Linux3.19_arm_glibc_PTH_OPT.OBJ/authcert.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmpcert.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sslinfo.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux3.19_arm_glibc_PTH_OPT.OBJ/unix_err.o -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc -lz chmod +x Linux3.19_arm_glibc_PTH_OPT.OBJ/libssl3.so ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libssl.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/libssl3.so ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ssl' cd pkcs12; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/pkcs12' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12local.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12local.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12creat.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12creat.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12dec.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12dec.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12plcy.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12plcy.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12tmpl.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12tmpl.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12e.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12e.c p12e.c: In function 'sec_PKCS12CreateSafeBag': p12e.c:698:12: warning: variable 'setName' set but not used [-Wunused-but-set-variable] PRBool setName = PR_TRUE; ^ p12e.c: In function 'sec_pkcs12_encoder_start_context': p12e.c:1535:12: warning: variable 'rv' set but not used [-Wunused-but-set-variable] SECStatus rv; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12d.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12d.c p12d.c: In function 'SEC_PKCS12DecoderRenameCertNicknames': p12d.c:2813:5: warning: suggest parentheses around assignment used as truth value [-Wparentheses] for (i = 0; safeBag = p12dcx->safeBags[i]; i++) { ^ rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkcs12.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkcs12.a Linux3.19_arm_glibc_PTH_OPT.OBJ/p12local.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12creat.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12dec.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12plcy.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12tmpl.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12e.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p12d.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkcs12.a ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkcs12.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/pkcs12' cd pkcs7; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/pkcs7' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certread.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certread.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7common.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7common.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7create.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7create.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7decode.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7decode.c p7decode.c: In function 'sec_pkcs7_verify_signature': p7decode.c:1293:21: warning: variable 'crls' set but not used [-Wunused-but-set-variable] CERTSignedCrl **crls; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7encode.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7encode.c p7encode.c: In function 'sec_pkcs7_encoder_start_encrypt': p7encode.c:62:18: warning: variable 'wincx' set but not used [-Wunused-but-set-variable] void *mark, *wincx; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7local.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7local.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secmime.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secmime.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkcs7.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkcs7.a Linux3.19_arm_glibc_PTH_OPT.OBJ/certread.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7common.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7create.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7decode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7encode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7local.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secmime.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkcs7.a ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libpkcs7.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/pkcs7' cd smime; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/smime' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsarray.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsarray.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsasn1.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsasn1.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsattr.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsattr.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmscinfo.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmscinfo.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmscipher.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmscipher.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsdecode.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsdecode.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsdigdata.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsdigdata.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsdigest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsdigest.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsencdata.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsencdata.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsencode.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsencode.c cmsencode.c: In function 'nss_cms_encoder_notify': cmsencode.c:125:18: warning: variable 'poolp' set but not used [-Wunused-but-set-variable] PLArenaPool *poolp; ^ cmsencode.c: In function 'nss_cms_before_data': cmsencode.c:204:18: warning: variable 'poolp' set but not used [-Wunused-but-set-variable] PLArenaPool *poolp; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsenvdata.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsenvdata.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsmessage.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsmessage.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmspubkey.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmspubkey.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsrecinfo.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsrecinfo.c cmsrecinfo.c: In function 'NSS_CMSRecipientInfo_UnwrapBulkKey': cmsrecinfo.c:529:21: warning: variable 'encalg' set but not used [-Wunused-but-set-variable] SECAlgorithmID *encalg; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsreclist.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsreclist.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmssigdata.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmssigdata.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmssiginfo.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmssiginfo.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsudf.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsudf.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsutil.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/smimemessage.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard smimemessage.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/smimeutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard smimeutil.c smimeutil.c: In function 'NSSSMIME_VersionCheck': smimeutil.c:772:19: warning: variable 'c' set but not used [-Wunused-but-set-variable] volatile char c; /* force a reference that won't get optimized away */ ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/smimever.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard smimever.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libsmime.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libsmime.a Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsarray.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsasn1.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsattr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmscinfo.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmscipher.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsdecode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsdigest.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsencdata.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsencode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsmessage.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmspubkey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsreclist.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmssigdata.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsudf.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/smimemessage.o Linux3.19_arm_glibc_PTH_OPT.OBJ/smimeutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/smimever.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libsmime.a grep -v ';-' smime.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.19_arm_glibc_PTH_OPT.OBJ/smime.def rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libsmime3.so gcc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libsmime3.so -Wl,--version-script,Linux3.19_arm_glibc_PTH_OPT.OBJ/smime.def -o Linux3.19_arm_glibc_PTH_OPT.OBJ/libsmime3.so Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsarray.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsasn1.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsattr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmscinfo.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmscipher.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsdecode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsdigest.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsencdata.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsencode.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsmessage.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmspubkey.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsreclist.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmssigdata.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsudf.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/smimemessage.o Linux3.19_arm_glibc_PTH_OPT.OBJ/smimeutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/smimever.o ../pkcs12/Linux3.19_arm_glibc_PTH_OPT.OBJ/p12local.o ../pkcs12/Linux3.19_arm_glibc_PTH_OPT.OBJ/p12creat.o ../pkcs12/Linux3.19_arm_glibc_PTH_OPT.OBJ/p12dec.o ../pkcs12/Linux3.19_arm_glibc_PTH_OPT.OBJ/p12plcy.o ../pkcs12/Linux3.19_arm_glibc_PTH_OPT.OBJ/p12tmpl.o ../pkcs12/Linux3.19_arm_glibc_PTH_OPT.OBJ/p12e.o ../pkcs12/Linux3.19_arm_glibc_PTH_OPT.OBJ/p12d.o ../pkcs7/Linux3.19_arm_glibc_PTH_OPT.OBJ/certread.o ../pkcs7/Linux3.19_arm_glibc_PTH_OPT.OBJ/p7common.o ../pkcs7/Linux3.19_arm_glibc_PTH_OPT.OBJ/p7create.o ../pkcs7/Linux3.19_arm_glibc_PTH_OPT.OBJ/p7decode.o ../pkcs7/Linux3.19_arm_glibc_PTH_OPT.OBJ/p7encode.o ../pkcs7/Linux3.19_arm_glibc_PTH_OPT.OBJ/p7local.o ../pkcs7/Linux3.19_arm_glibc_PTH_OPT.OBJ/secmime.o -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux3.19_arm_glibc_PTH_OPT.OBJ/libsmime3.so ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libsmime.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/libsmime3.so ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/smime' cd crmf; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/crmf' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfenc.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfenc.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmftmpl.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmftmpl.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfreq.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfreq.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfpop.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfpop.c crmfpop.c: In function 'CRMF_CertReqMsgSetRAVerifiedPOP': crmfpop.c:36:28: warning: variable 'dummy' set but not used [-Wunused-but-set-variable] SECItem *dummy; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfdec.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfdec.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfget.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfget.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfcont.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfcont.c crmfcont.c: In function 'CRMF_CreateEncryptedKeyWithEncryptedValue': crmfcont.c:860:31: warning: variable 'dummy' set but not used [-Wunused-but-set-variable] CRMFEncryptedValue *dummy; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmmfasn1.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmmfasn1.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmmfresp.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmmfresp.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmmfrec.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmmfrec.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmmfchal.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmmfchal.c cmmfchal.c: In function 'cmmf_create_witness_and_challenge': cmmfchal.c:33:22: warning: variable 'id' set but not used [-Wunused-but-set-variable] CK_OBJECT_HANDLE id; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/servget.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard servget.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/encutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard encutil.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/respcli.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard respcli.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/respcmn.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard respcmn.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/challcli.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard challcli.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/asn1cmn.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard asn1cmn.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libcrmf.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libcrmf.a Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfenc.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmftmpl.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfreq.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfpop.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfdec.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfget.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmfcont.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmmfasn1.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmmfresp.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmmfrec.o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmmfchal.o Linux3.19_arm_glibc_PTH_OPT.OBJ/servget.o Linux3.19_arm_glibc_PTH_OPT.OBJ/encutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/respcli.o Linux3.19_arm_glibc_PTH_OPT.OBJ/respcmn.o Linux3.19_arm_glibc_PTH_OPT.OBJ/challcli.o Linux3.19_arm_glibc_PTH_OPT.OBJ/asn1cmn.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libcrmf.a ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libcrmf.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/crmf' cd jar; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/jar' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/jarver.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jarver.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/jarsign.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jarsign.c jarsign.c: In function 'jar_create_pk7': jarsign.c:174:11: warning: variable 'errstring' set but not used [-Wunused-but-set-variable] char *errstring; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/jar.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jar.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/jar-ds.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jar-ds.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/jarfile.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jarfile.c jarfile.c: In function 'jar_listtar': jarfile.c:824:12: warning: variable 'when' set but not used [-Wunused-but-set-variable] time_t when; ^ jarfile.c:823:14: warning: variable 'mode' set but not used [-Wunused-but-set-variable] long sz, mode; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/jarint.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jarint.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libjar.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libjar.a Linux3.19_arm_glibc_PTH_OPT.OBJ/jarver.o Linux3.19_arm_glibc_PTH_OPT.OBJ/jarsign.o Linux3.19_arm_glibc_PTH_OPT.OBJ/jar.o Linux3.19_arm_glibc_PTH_OPT.OBJ/jar-ds.o Linux3.19_arm_glibc_PTH_OPT.OBJ/jarfile.o Linux3.19_arm_glibc_PTH_OPT.OBJ/jarint.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libjar.a ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libjar.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/jar' cd ckfw; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ckfw' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crypto.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crypto.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/find.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard find.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/hash.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard hash.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/instance.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard instance.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/mutex.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard mutex.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/object.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard object.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/session.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard session.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sessobj.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sessobj.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/slot.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard slot.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/token.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard token.c token.c: In function 'nssCKFWToken_GetUTCTime': token.c:1261:27: warning: variable 'z' set but not used [-Wunused-but-set-variable] int Y, M, D, h, m, s, z; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/wrap.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard wrap.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/mechanism.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard mechanism.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssckfw.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssckfw.a Linux3.19_arm_glibc_PTH_OPT.OBJ/crypto.o Linux3.19_arm_glibc_PTH_OPT.OBJ/find.o Linux3.19_arm_glibc_PTH_OPT.OBJ/hash.o Linux3.19_arm_glibc_PTH_OPT.OBJ/instance.o Linux3.19_arm_glibc_PTH_OPT.OBJ/mutex.o Linux3.19_arm_glibc_PTH_OPT.OBJ/object.o Linux3.19_arm_glibc_PTH_OPT.OBJ/session.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sessobj.o Linux3.19_arm_glibc_PTH_OPT.OBJ/slot.o Linux3.19_arm_glibc_PTH_OPT.OBJ/token.o Linux3.19_arm_glibc_PTH_OPT.OBJ/wrap.o Linux3.19_arm_glibc_PTH_OPT.OBJ/mechanism.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssckfw.a ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssckfw.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib cd builtins; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ckfw/builtins' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/anchor.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard anchor.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/constants.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard constants.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/bfind.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard bfind.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/binst.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard binst.c binst.c: In function 'builtins_mdInstance_GetLibraryVersion': binst.c:70:17: warning: variable 'c' set but not used [-Wunused-but-set-variable] volatile char c; /* force a reference that won't get optimized away */ ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/bobject.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard bobject.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/bsession.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard bsession.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/bslot.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard bslot.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/btoken.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard btoken.c perl certdata.perl < certdata.txt > Linux3.19_arm_glibc_PTH_OPT.OBJ/certdata.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certdata.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/certdata.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ckbiver.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ckbiver.c grep -v ';-' nssckbi.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.19_arm_glibc_PTH_OPT.OBJ/nssckbi.def rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssckbi.so gcc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnssckbi.so -Wl,--version-script,Linux3.19_arm_glibc_PTH_OPT.OBJ/nssckbi.def -o Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssckbi.so Linux3.19_arm_glibc_PTH_OPT.OBJ/anchor.o Linux3.19_arm_glibc_PTH_OPT.OBJ/constants.o Linux3.19_arm_glibc_PTH_OPT.OBJ/bfind.o Linux3.19_arm_glibc_PTH_OPT.OBJ/binst.o Linux3.19_arm_glibc_PTH_OPT.OBJ/bobject.o Linux3.19_arm_glibc_PTH_OPT.OBJ/bsession.o Linux3.19_arm_glibc_PTH_OPT.OBJ/bslot.o Linux3.19_arm_glibc_PTH_OPT.OBJ/btoken.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certdata.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ckbiver.o ../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckfw.a ../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssb.a -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssckbi.so ../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/libnssckbi.so ../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ckfw/builtins' cd pem; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ckfw/pem' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/anchor.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard anchor.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/constants.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard constants.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pargs.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pargs.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pfind.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pfind.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pinst.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pinst.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pobject.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pobject.c pobject.c: In function 'pem_CreateObject': pobject.c:1047:15: warning: variable 'token' set but not used [-Wunused-but-set-variable] pemToken *token; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/prsa.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard prsa.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/psession.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard psession.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pslot.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pslot.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ptoken.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ptoken.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ckpemver.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ckpemver.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/rsawrapr.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard rsawrapr.c rsawrapr.c:128:1: warning: 'oaep_xor_with_h1' defined but not used [-Wunused-function] oaep_xor_with_h1(unsigned char *data, unsigned int datalen, ^ rsawrapr.c:190:1: warning: 'oaep_xor_with_h2' defined but not used [-Wunused-function] oaep_xor_with_h2(unsigned char *salt, unsigned int saltlen, ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/util.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard util.c util.c: In function 'ReadDERFromFile': util.c:142:9: warning: variable 'error' set but not used [-Wunused-but-set-variable] int error; ^ grep -v ';-' nsspem.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.19_arm_glibc_PTH_OPT.OBJ/nsspem.def rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsspem.so gcc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnsspem.so -Wl,--version-script,Linux3.19_arm_glibc_PTH_OPT.OBJ/nsspem.def -o Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsspem.so Linux3.19_arm_glibc_PTH_OPT.OBJ/anchor.o Linux3.19_arm_glibc_PTH_OPT.OBJ/constants.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pargs.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pfind.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pinst.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pobject.o Linux3.19_arm_glibc_PTH_OPT.OBJ/prsa.o Linux3.19_arm_glibc_PTH_OPT.OBJ/psession.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pslot.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ptoken.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ckpemver.o Linux3.19_arm_glibc_PTH_OPT.OBJ/rsawrapr.o Linux3.19_arm_glibc_PTH_OPT.OBJ/util.o ../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckfw.a ../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssb.a /usr/lib/libfreebl.a -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lnssutil3 -lfreebl3 -L../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lnssckfw -lnssb -lplc4 -lplds4 -L../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lnssutil3 -lfreebl3 -lsoftokn3 -lpthread -ldl -lc -L/usr/lib -lfreebl3 -lnssdbm3 -lsoftokn3 -lnssutil3 -lplds4 -lplc4 -lnspr4 -lpthread -ldl chmod +x Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsspem.so ../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsspem.so ../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ckfw/pem' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/ckfw' cd sysinit; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/sysinit' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/nsssysinit.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nsssysinit.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsssysinit.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsssysinit.a Linux3.19_arm_glibc_PTH_OPT.OBJ/nsssysinit.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsssysinit.a rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsssysinit.so gcc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnsssysinit.so -o Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsssysinit.so Linux3.19_arm_glibc_PTH_OPT.OBJ/nsssysinit.o -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsssysinit.so ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsssysinit.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/libnsssysinit.so ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib/sysinit' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/lib' cd cmd; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd' cd lib; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/lib' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/basicutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard basicutil.c basicutil.c: In function 'SECU_PrintAsHex': basicutil.c:312:9: warning: 'column' may be used uninitialized in this function [-Wmaybe-uninitialized] column++; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secutil.c secutil.c: In function 'SECU_ChangePW2': secutil.c:336:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable] SECStatus rv; ^ secutil.c: In function 'SECU_PrintCertificateBasicInfo': secutil.c:2420:9: warning: unused variable 'iv' [-Wunused-variable] int iv; ^ secutil.c: In function 'secu_PrintPKCS7Signed': secutil.c:2746:11: warning: passing argument 5 of 'SECU_PrintSignedData' from incompatible pointer type [enabled by default] SECU_PrintCertificate); ^ In file included from secutil.c:19:0: secutil.h:263:12: note: expected 'SECU_PPFunc' but argument is of type 'int (*)(struct FILE *, const struct SECItem *, const char *, int)' extern int SECU_PrintSignedData(FILE *out, SECItem *der, const char *m, ^ secutil.c: In function 'secu_PrintPKCS7SignedAndEnveloped': secutil.c:2865:11: warning: passing argument 5 of 'SECU_PrintSignedData' from incompatible pointer type [enabled by default] SECU_PrintCertificate); ^ In file included from secutil.c:19:0: secutil.h:263:12: note: expected 'SECU_PPFunc' but argument is of type 'int (*)(struct FILE *, const struct SECItem *, const char *, int)' extern int SECU_PrintSignedData(FILE *out, SECItem *der, const char *m, ^ secutil.c: In function 'SEC_PrintCertificateAndTrust': secutil.c:3195:10: warning: passing argument 5 of 'SECU_PrintSignedData' from incompatible pointer type [enabled by default] SECU_PrintCertificate); ^ secutil.c:3168:5: note: expected 'SECU_PPFunc' but argument is of type 'int (*)(struct FILE *, const struct SECItem *, const char *, int)' int SECU_PrintSignedData(FILE *out, SECItem *der, const char *m, ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secpwd.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secpwd.c secpwd.c: In function 'SEC_GetPassword': secpwd.c:77:14: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result] QUIET_FGETS ( phrase, sizeof(phrase), input); ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/derprint.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard derprint.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/moreoids.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard moreoids.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pppolicy.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pppolicy.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ffs.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ffs.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11table.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11table.c rm -f Linux3.19_arm_glibc_PTH_OPT.OBJ/libsectool.a ar cr Linux3.19_arm_glibc_PTH_OPT.OBJ/libsectool.a Linux3.19_arm_glibc_PTH_OPT.OBJ/basicutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/secpwd.o Linux3.19_arm_glibc_PTH_OPT.OBJ/derprint.o Linux3.19_arm_glibc_PTH_OPT.OBJ/moreoids.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pppolicy.o Linux3.19_arm_glibc_PTH_OPT.OBJ/ffs.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11table.o ranlib Linux3.19_arm_glibc_PTH_OPT.OBJ/libsectool.a ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux3.19_arm_glibc_PTH_OPT.OBJ/libsectool.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/lib' cd addbuiltin; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/addbuiltin' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/addbuiltin.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard addbuiltin.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/addbuiltin -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/addbuiltin.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/addbuiltin ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/addbuiltin' cd atob; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/atob' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/atob.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard atob.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/atob -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/atob.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/atob ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/atob' cd btoa; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/btoa' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/btoa.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard btoa.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/btoa -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/btoa.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/btoa ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/btoa' cd certcgi; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/certcgi' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certcgi.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certcgi.c certcgi.c: In function 'MakeV1Cert': certcgi.c:530:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable] SECStatus rv; ^ certcgi.c: In function 'get_serial_number': certcgi.c:594:6: warning: this decimal constant is unsigned only in ISO C90 [enabled by default] if (serial == 4294967295) { ^ certcgi.c: In function 'string_to_binary': certcgi.c:1425:24: warning: variable 'low_digit' set but not used [-Wunused-but-set-variable] int low_digit; ^ certcgi.c:1424:24: warning: variable 'high_digit' set but not used [-Wunused-but-set-variable] int high_digit; ^ certcgi.c: At top level: certcgi.c:360:1: warning: 'update_data_by_name' defined but not used [-Wunused-function] update_data_by_name(Pair *data, ^ certcgi.c:388:1: warning: 'update_data_by_index' defined but not used [-Wunused-function] update_data_by_index(Pair *data, ^ certcgi.c:404:1: warning: 'add_field' defined but not used [-Wunused-function] add_field(Pair *data, ^ certcgi.c: In function 'get_serial_number': certcgi.c:590:11: warning: ignoring return value of 'fread', declared with attribute warn_unused_result [-Wunused-result] fread(&serial, sizeof(int), 1, serialFile); ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certcgi -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/certcgi.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssb.a /usr/lib/libfreebl.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcerthi.a /usr/lib/libfreebl.a -L/usr/lib -lsoftokn3 -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/certcgi ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/certcgi' cd certutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/certutil' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certext.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certext.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certutil.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/keystuff.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard keystuff.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certutil -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/certext.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/keystuff.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/certutil ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/certutil' cd checkcert; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/checkcert' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/checkcert.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard checkcert.c checkcert.c: In function 'OurVerifyData': checkcert.c:125:15: warning: variable 'sigAlgTag' set but not used [-Wunused-but-set-variable] SECOidTag sigAlgTag; ^ checkcert.c: In function 'main': checkcert.c:391:10: warning: passing argument 5 of 'SECU_PrintSignedData' from incompatible pointer type [enabled by default] SECU_PrintCertificate); ^ In file included from checkcert.c:5:0: ../../../dist/private/nss/secutil.h:263:12: note: expected 'SECU_PPFunc' but argument is of type 'int (*)(struct FILE *, const struct SECItem *, const char *, int)' extern int SECU_PrintSignedData(FILE *out, SECItem *der, const char *m, ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/checkcert -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/checkcert.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/checkcert ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/checkcert' cd chktest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/chktest' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/chktest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard chktest.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/chktest -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/chktest.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssb.a /usr/lib/libfreebl.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcerthi.a /usr/lib/libfreebl.a -L/usr/lib -lsoftokn3 -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/chktest ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/chktest' cd crlutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/crlutil' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crlgen_lex.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crlgen_lex.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crlgen.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crlgen.c crlgen.c: In function 'crlgen_RmCert': crlgen.c:1082:18: warning: variable 'arena' set but not used [-Wunused-but-set-variable] PLArenaPool *arena; ^ crlgen.c: In function 'crlgen_CreateInvalidityDate': crlgen.c:627:22: warning: 'mark' may be used uninitialized in this function [-Wmaybe-uninitialized] PORT_ArenaRelease(arena, mark); ^ crlgen.c: In function 'crlgen_CreateReasonCode': crlgen.c:586:23: warning: 'mark' may be used uninitialized in this function [-Wmaybe-uninitialized] PORT_ArenaRelease (arena, mark); ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crlutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crlutil.c crlutil.c: In function 'main': crlutil.c:1108:16: warning: 'rv' may be used uninitialized in this function [-Wmaybe-uninitialized] return (rv != SECSuccess); ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crlutil -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/crlgen_lex.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crlgen.o Linux3.19_arm_glibc_PTH_OPT.OBJ/crlutil.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/crlutil ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/crlutil' cd crmftest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/crmftest' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/testcrmf.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard testcrmf.c testcrmf.c: In function 'get_serial_number': testcrmf.c:130:16: warning: variable 'rv' set but not used [-Wunused-but-set-variable] SECStatus rv; ^ testcrmf.c: In function 'main': testcrmf.c:1539:23: warning: variable 'PArg' set but not used [-Wunused-but-set-variable] PRBool PArg = PR_FALSE; ^ testcrmf.c:1538:23: warning: variable 'sArg' set but not used [-Wunused-but-set-variable] PRBool sArg = PR_FALSE; ^ testcrmf.c:1537:23: warning: variable 'eArg' set but not used [-Wunused-but-set-variable] PRBool eArg = PR_FALSE; ^ testcrmf.c:1536:23: warning: variable 'pArg' set but not used [-Wunused-but-set-variable] PRBool pArg = PR_FALSE; ^ testcrmf.c: At top level: testcrmf.c:941:1: warning: 'mapWrapKeyType' defined but not used [-Wunused-function] mapWrapKeyType(KeyType keyType) ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/crmftest -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/testcrmf.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcrmf.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/crmftest ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/crmftest' cd dbtest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/dbtest' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/dbtest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dbtest.c In file included from ../modutil/modutil.h:22:0, from dbtest.c:32: ../modutil/error.h:136:14: warning: 'msgStrings' defined but not used [-Wunused-variable] static char *msgStrings[] = { ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/dbtest -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/dbtest.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/dbtest ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/dbtest' cd derdump; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/derdump' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/derdump.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard derdump.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/derdump -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/derdump.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/derdump ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/derdump' cd digest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/digest' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/digest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard digest.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/digest -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/digest.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/digest ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/digest' cd httpserv; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/httpserv' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/httpserv.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard httpserv.c httpserv.c: In function 'handle_connection': httpserv.c:715:39: warning: integer overflow in expression [-Woverflow] nextUpdate = PR_Now() + 60*60*24 * PR_USEC_PER_SEC; /*tomorrow*/ ^ httpserv.c:716:37: warning: integer overflow in expression [-Woverflow] revoDate = PR_Now() - 60*60*24 * PR_USEC_PER_SEC; /*yesterday*/ ^ httpserv.c: In function 'getBoundListenSocket': httpserv.c:941:24: warning: variable 'socketDomain' set but not used [-Wunused-but-set-variable] PRUint16 socketDomain = PR_AF_INET; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/httpserv -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/httpserv.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/httpserv ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/httpserv' cd listsuites; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/listsuites' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/listsuites.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard listsuites.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/listsuites -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/listsuites.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/listsuites ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/listsuites' cd makepqg; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/makepqg' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/makepqg.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard makepqg.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/makepqg -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/makepqg.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/makepqg ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/makepqg' cd multinit; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/multinit' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/multinit.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard multinit.c multinit.c:320:1: warning: 'appendItem' defined but not used [-Wunused-function] appendItem(SECItem *item) ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/multinit -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/multinit.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/multinit ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/multinit' cd ocspclnt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/ocspclnt' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspclnt.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ocspclnt.c ocspclnt.c: In function 'print_raw_certificates': ocspclnt.c:565:10: warning: passing argument 5 of 'SECU_PrintSignedData' from incompatible pointer type [enabled by default] SECU_PrintCertificate); ^ In file included from ocspclnt.c:9:0: ../../../dist/private/nss/secutil.h:263:12: note: expected 'SECU_PPFunc' but argument is of type 'int (*)(struct FILE *, const struct SECItem *, const char *, int)' extern int SECU_PrintSignedData(FILE *out, SECItem *der, const char *m, ^ ocspclnt.c: In function 'main': ocspclnt.c:446:8: warning: 'cert_usage' may be used uninitialized in this function [-Wmaybe-uninitialized] rv = CERT_VerifyCert (handle, cert, PR_TRUE, cert_usage, verify_time, ^ ocspclnt.c:967:18: note: 'cert_usage' was declared here SECCertUsage cert_usage; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspclnt -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspclnt.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspclnt ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/ocspclnt' cd ocspresp; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/ocspresp' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspresp.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ocspresp.c ocspresp.c: In function 'main': ocspresp.c:140:15: warning: variable 'statusDecodedFail' set but not used [-Wunused-but-set-variable] SECStatus statusDecodedFail; ^ ocspresp.c:136:15: warning: variable 'statusDecodedRev' set but not used [-Wunused-but-set-variable] SECStatus statusDecodedRev; ^ ocspresp.c:132:15: warning: variable 'statusDecoded' set but not used [-Wunused-but-set-variable] SECStatus statusDecoded; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspresp -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspresp.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/ocspresp ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/ocspresp' cd oidcalc; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/oidcalc' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/oidcalc.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard oidcalc.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/oidcalc -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/oidcalc.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/oidcalc ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/oidcalc' cd p7content; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/p7content' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7content.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7content.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7content -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/p7content.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/p7content ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/p7content' cd p7env; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/p7env' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7env.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7env.c p7env.c: In function 'main': p7env.c:133:11: warning: variable 'certName' set but not used [-Wunused-but-set-variable] char *certName; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7env -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/p7env.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/p7env ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/p7env' cd p7sign; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/p7sign' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7sign.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7sign.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7sign -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/p7sign.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/p7sign ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/p7sign' cd p7verify; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/p7verify' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7verify.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7verify.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/p7verify -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/p7verify.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/p7verify ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/p7verify' cd pk12util; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pk12util' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk12util.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk12util.c pk12util.c: In function 'P12U_ListPKCS12File': pk12util.c:759:30: warning: passing argument 5 of 'SECU_PrintSignedData' from incompatible pointer type [enabled by default] 0, SECU_PrintCertificate) != 0) { ^ In file included from pk12util.c:11:0: ../../../dist/private/nss/secutil.h:263:12: note: expected 'SECU_PPFunc' but argument is of type 'int (*)(struct FILE *, const struct SECItem *, const char *, int)' extern int SECU_PrintSignedData(FILE *out, SECItem *der, const char *m, ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk12util -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/pk12util.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/pk12util ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pk12util' cd pk11gcmtest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pk11gcmtest' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11gcmtest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11gcmtest.c pk11gcmtest.c: In function 'aes_gcm_kat': pk11gcmtest.c:319:6: warning: 'tagsize' may be used uninitialized in this function [-Wmaybe-uninitialized] rv = aes_decrypt_buf(key, keysize, iv, ivsize, ^ pk11gcmtest.c:319:6: warning: 'ciphertextlen' may be used uninitialized in this function [-Wmaybe-uninitialized] pk11gcmtest.c:66:24: warning: 'ivsize' may be used uninitialized in this function [-Wmaybe-uninitialized] gcm_params.ulIvLen = ivsize; ^ pk11gcmtest.c:174:18: note: 'ivsize' was declared here unsigned int ivsize; ^ pk11gcmtest.c:54:18: warning: 'keysize' may be used uninitialized in this function [-Wmaybe-uninitialized] key_item.len = keysize; ^ pk11gcmtest.c:172:18: note: 'keysize' was declared here unsigned int keysize; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11gcmtest -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11gcmtest.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11gcmtest ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pk11gcmtest' cd pk11mode; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pk11mode' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11mode.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11mode.c pk11mode.c: In function 'PKM_TLSMasterKeyDerive': pk11mode.c:4561:29: warning: variable 'expected_version' set but not used [-Wunused-but-set-variable] CK_VERSION expected_version, version; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11mode -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11mode.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11mode ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pk11mode' cd pk1sign; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pk1sign' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk1sign.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk1sign.c pk1sign.c: In function 'main': pk1sign.c:283:32: warning: 'cert' may be used uninitialized in this function [-Wmaybe-uninitialized] CERT_DestroyCertificate(cert); ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk1sign -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/pk1sign.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/pk1sign ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pk1sign' cd pkix-errcodes; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pkix-errcodes' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix-errcodes.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix-errcodes.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix-errcodes -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix-errcodes.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/pkix-errcodes ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pkix-errcodes' cd pp; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pp' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pp.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pp.c pp.c: In function 'main': pp.c:139:9: warning: passing argument 5 of 'SECU_PrintSignedData' from incompatible pointer type [enabled by default] SECU_PrintCertificate); ^ In file included from pp.c:10:0: ../../../dist/private/nss/secutil.h:263:12: note: expected 'SECU_PPFunc' but argument is of type 'int (*)(struct FILE *, const struct SECItem *, const char *, int)' extern int SECU_PrintSignedData(FILE *out, SECItem *der, const char *m, ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pp -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/pp.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/pp ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pp' cd pwdecrypt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pwdecrypt' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pwdecrypt.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pwdecrypt.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pwdecrypt -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/pwdecrypt.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/pwdecrypt ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/pwdecrypt' cd rsaperf; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/rsaperf' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/rsaperf.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard rsaperf.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/defkey.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard defkey.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/rsaperf -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/rsaperf.o Linux3.19_arm_glibc_PTH_OPT.OBJ/defkey.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssb.a /usr/lib/libfreebl.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcerthi.a /usr/lib/libfreebl.a -L/usr/lib -lsoftokn3 -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/rsaperf ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/rsaperf' cd sdrtest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/sdrtest' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sdrtest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sdrtest.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sdrtest -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/sdrtest.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/sdrtest ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/sdrtest' cd selfserv; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/selfserv' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/selfserv.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard selfserv.c selfserv.c: In function 'makeSignedOCSPResponse': selfserv.c:1148:33: warning: integer overflow in expression [-Woverflow] nextUpdate = now + 60*60*24 * PR_USEC_PER_SEC; /* plus 1 day */ ^ selfserv.c:1163:18: warning: integer overflow in expression [-Woverflow] now - 60*60*24 * PR_USEC_PER_SEC, /* minus 1 day */ ^ selfserv.c: In function 'getBoundListenSocket': selfserv.c:1706:24: warning: variable 'socketDomain' set but not used [-Wunused-but-set-variable] PRUint16 socketDomain = PR_AF_INET; ^ selfserv.c: In function 'makeSignedOCSPResponse': selfserv.c:1179:24: warning: 'sr' may be used uninitialized in this function [-Wmaybe-uninitialized] singleResponses[0] = sr; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/selfserv -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/selfserv.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/selfserv ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/selfserv' cd signtool; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/signtool' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/signtool.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard signtool.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/certgen.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certgen.c certgen.c: In function 'sign_cert': certgen.c:423:11: warning: variable 'dummy' set but not used [-Wunused-but-set-variable] void *dummy; ^ certgen.c: In function 'GetSubjectFromUser': certgen.c:125:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result] fgets(buf, STDIN_BUF_SIZE, stdin); ^ certgen.c:147:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result] fgets(buf, STDIN_BUF_SIZE, stdin); ^ certgen.c:166:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result] fgets(buf, STDIN_BUF_SIZE, stdin); ^ certgen.c:184:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result] fgets(buf, STDIN_BUF_SIZE, stdin); ^ certgen.c:202:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result] fgets(buf, STDIN_BUF_SIZE, stdin); ^ certgen.c:223:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result] fgets(buf, STDIN_BUF_SIZE, stdin); ^ certgen.c:241:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result] fgets(buf, STDIN_BUF_SIZE, stdin); ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/javascript.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard javascript.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/list.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard list.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/sign.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sign.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/util.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard util.c util.c: In function 'XP_GetString': util.c:21:5: warning: return discards 'const' qualifier from pointer target type [enabled by default] return SECU_Strerror (i); ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/verify.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard verify.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/zip.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard zip.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/signtool -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/signtool.o Linux3.19_arm_glibc_PTH_OPT.OBJ/certgen.o Linux3.19_arm_glibc_PTH_OPT.OBJ/javascript.o Linux3.19_arm_glibc_PTH_OPT.OBJ/list.o Linux3.19_arm_glibc_PTH_OPT.OBJ/sign.o Linux3.19_arm_glibc_PTH_OPT.OBJ/util.o Linux3.19_arm_glibc_PTH_OPT.OBJ/verify.o Linux3.19_arm_glibc_PTH_OPT.OBJ/zip.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libjar.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc -lz ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/signtool ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/signtool' cd signver; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/signver' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/signver.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard signver.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk7print.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk7print.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/signver -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/signver.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk7print.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/signver ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/signver' cd shlibsign; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/shlibsign' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/shlibsign.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard shlibsign.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/shlibsign -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/shlibsign.o -Wl,-z,relro -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/shlibsign ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin cd mangle; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/shlibsign/mangle' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/mangle.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard mangle.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/mangle -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/mangle.o -Wl,-z,relro -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/mangle ../../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/shlibsign/mangle' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/shlibsign' cd smimetools; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/smimetools' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsutil.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsutil -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsutil.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/cmsutil ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/smimetools' cd ssltap; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/ssltap' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssltap.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssltap.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/ssltap -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/ssltap.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/ssltap ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/ssltap' cd strsclnt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/strsclnt' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/strsclnt.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard strsclnt.c strsclnt.c: In function 'do_connects': strsclnt.c:735:18: warning: variable 'result' set but not used [-Wunused-but-set-variable] SECStatus result; ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/strsclnt -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/strsclnt.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/strsclnt ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/strsclnt' cd symkeyutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/symkeyutil' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/symkeyutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard symkeyutil.c symkeyutil.c: In function 'main': symkeyutil.c:1018:31: warning: unused variable 'rv2' [-Wunused-variable] SECStatus rv2 = PK11_FreeSlotListElement(slotList, se); ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/symkeyutil -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/symkeyutil.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/symkeyutil ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/symkeyutil' cd tests; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/tests' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/baddbdir.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard baddbdir.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/baddbdir -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/baddbdir.o \ -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/conflict.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard conflict.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/conflict -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/conflict.o \ -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/dertimetest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dertimetest.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/dertimetest -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/dertimetest.o \ -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/encodeinttest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard encodeinttest.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/encodeinttest -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/encodeinttest.o \ -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/nonspr10.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nonspr10.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/nonspr10 -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/nonspr10.o \ -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/remtest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard remtest.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/remtest -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/remtest.o \ -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secmodtest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secmodtest.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/secmodtest -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/secmodtest.o \ -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/baddbdir Linux3.19_arm_glibc_PTH_OPT.OBJ/conflict Linux3.19_arm_glibc_PTH_OPT.OBJ/dertimetest Linux3.19_arm_glibc_PTH_OPT.OBJ/encodeinttest Linux3.19_arm_glibc_PTH_OPT.OBJ/nonspr10 Linux3.19_arm_glibc_PTH_OPT.OBJ/remtest Linux3.19_arm_glibc_PTH_OPT.OBJ/secmodtest ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/tests' cd tstclnt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/tstclnt' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/tstclnt.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tstclnt.c tstclnt.c: In function 'dumpServerCertificateChain': tstclnt.c:537:15: warning: assignment from incompatible pointer type [enabled by default] dumpFunction = SECU_PrintCertificateBasicInfo; ^ tstclnt.c:539:15: warning: assignment from incompatible pointer type [enabled by default] dumpFunction = SECU_PrintCertificate; ^ tstclnt.c: In function 'ownAuthCertificate': tstclnt.c:647:19: warning: unused variable 'error' [-Wunused-variable] PRErrorCode error = PR_GetError(); ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/tstclnt -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/tstclnt.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/tstclnt ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/tstclnt' cd vfychain; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/vfychain' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/vfychain.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard vfychain.c vfychain.c: In function 'configureRevocationParams': vfychain.c:363:50: warning: 'revFlags' may be used uninitialized in this function [-Wmaybe-uninitialized] revFlags[cert_revocation_method_ocsp] = ^ gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/vfychain -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/vfychain.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/vfychain ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/vfychain' cd vfyserv; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/vfyserv' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/vfyserv.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard vfyserv.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/vfyutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard vfyutil.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/vfyserv -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/vfyserv.o Linux3.19_arm_glibc_PTH_OPT.OBJ/vfyutil.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/vfyserv ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/vfyserv' cd modutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/modutil' gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/modutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard modutil.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/instsec.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard instsec.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/install.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard install.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/installparse.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard installparse.c ytab.c: In function 'Pk11Install_yyparse': ytab.c:219:5: warning: suggest parentheses around assignment used as truth value [-Wparentheses] gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/install-ds.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard install-ds.c gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard lex.Pk11Install_yy.c installparse.l:25:17: warning: 'Pkcs11Install_yyunput' defined but not used [-Wunused-function] ^ lex.Pk11Install_yy.cpp:1060:13: note: in expansion of macro 'yyunput' lex.Pk11Install_yy.cpp:1106:12: warning: 'input' defined but not used [-Wunused-function] gcc -o Linux3.19_arm_glibc_PTH_OPT.OBJ/modutil -O2 -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux3.19_arm_glibc_PTH_OPT.OBJ/modutil.o Linux3.19_arm_glibc_PTH_OPT.OBJ/pk11.o Linux3.19_arm_glibc_PTH_OPT.OBJ/instsec.o Linux3.19_arm_glibc_PTH_OPT.OBJ/install.o Linux3.19_arm_glibc_PTH_OPT.OBJ/installparse.o Linux3.19_arm_glibc_PTH_OPT.OBJ/install-ds.o Linux3.19_arm_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o -Wl,-z,relro ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libjar.a ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc -lz ../../coreconf/nsinstall/Linux3.19_arm_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux3.19_arm_glibc_PTH_OPT.OBJ/modutil ../../../dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd/modutil' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/cmd' make: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss' ~/build/BUILD/nss-3.19.1/nss ~/build/BUILD/nss-3.19.1 + unset NSS_BLTEST_NOT_AVAILABLE + pushd ./nss + /usr/bin/make clean_docs build_docs /usr/bin/make -C ./doc clean make[1]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/doc' rm -f date.xml version.xml *.tar.bz2 rm -f html/*.proc rm -fr nss-man ascii make[1]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/doc' /usr/bin/make -C ./doc make[1]: Entering directory `/builddir/build/BUILD/nss-3.19.1/nss/doc' date +"%e %B %Y" | tr -d '\n' > date.xml echo -n > version.xml mkdir -p html mkdir -p nroff make[1]: Leaving directory `/builddir/build/BUILD/nss-3.19.1/nss/doc' ~/build/BUILD/nss-3.19.1 + popd + /usr/bin/mkdir -p ./dist/doc/nroff + /usr/bin/cp ./nss/doc/nroff/certutil.1 ./nss/doc/nroff/cmsutil.1 ./nss/doc/nroff/crlutil.1 ./nss/doc/nroff/derdump.1 ./nss/doc/nroff/modutil.1 ./nss/doc/nroff/pk12util.1 ./nss/doc/nroff/pp.1 ./nss/doc/nroff/signtool.1 ./nss/doc/nroff/signver.1 ./nss/doc/nroff/ssltap.1 ./nss/doc/nroff/vfychain.1 ./nss/doc/nroff/vfyserv.1 ./dist/doc/nroff + /usr/bin/mkdir -p ./dist/pkgconfig + /usr/bin/cat /builddir/build/SOURCES/nss.pc.in + sed -e s,%libdir%,/usr/lib,g -e s,%prefix%,/usr,g -e s,%exec_prefix%,/usr,g -e s,%includedir%,/usr/include/nss3,g -e s,%NSS_VERSION%,3.19.1,g -e s,%NSPR_VERSION%,4.10.8,g -e s,%NSSUTIL_VERSION%,3.19.1,g -e s,%SOFTOKEN_VERSION%,3.16.2.3,g ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VMAJOR' ++ awk '{print $3}' + NSS_VMAJOR=3 ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VMINOR' ++ awk '{print $3}' + NSS_VMINOR=19 ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VPATCH' ++ awk '{print $3}' + NSS_VPATCH=1 + export NSS_VMAJOR + export NSS_VMINOR + export NSS_VPATCH + /usr/bin/cat /builddir/build/SOURCES/nss-config.in + sed -e s,@libdir@,/usr/lib,g -e s,@prefix@,/usr,g -e s,@exec_prefix@,/usr,g -e s,@includedir@,/usr/include/nss3,g -e s,@MOD_MAJOR_VERSION@,3,g -e s,@MOD_MINOR_VERSION@,19,g -e s,@MOD_PATCH_VERSION@,1,g + chmod 755 ./dist/pkgconfig/nss-config + /usr/bin/cat /builddir/build/SOURCES/setup-nsssysinit.sh + chmod 755 ./dist/pkgconfig/setup-nsssysinit.sh + /usr/bin/cp ./nss/lib/ckfw/nssck.api ./dist/private/nss/ + date '+%e %B %Y' + tr -d '\n' + echo -n 3.19.1 + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml + cp /builddir/build/SOURCES/nss-config.xml . + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml + cp /builddir/build/SOURCES/setup-nsssysinit.xml . + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml + cp /builddir/build/SOURCES/pkcs11.txt.xml . + for m in nss-config.xml setup-nsssysinit.xml pkcs11.txt.xml + xmlto man nss-config.xml Note: Writing nss-config.1 + for m in nss-config.xml setup-nsssysinit.xml pkcs11.txt.xml + xmlto man setup-nsssysinit.xml Note: Writing setup-nsssysinit.1 + for m in nss-config.xml setup-nsssysinit.xml pkcs11.txt.xml + xmlto man pkcs11.txt.xml Note: Writing pkcs11.txt.5 + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/cert8.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/cert9.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/key3.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/key4.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/secmod.db.xml . + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man cert8.db.xml Note: Writing cert8.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man cert9.db.xml Note: Writing cert9.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man key3.db.xml Note: Writing key3.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man key4.db.xml Note: Writing key4.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man secmod.db.xml Note: Writing secmod.db.5 + exit 0 Executing(%install): /bin/sh -e /var/tmp/rpm-tmp.e4lUL7 + umask 022 + cd /builddir/build/BUILD + '[' /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm '!=' / ']' + rm -rf /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm ++ dirname /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm + mkdir -p /builddir/build/BUILDROOT + mkdir /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm + cd nss-3.19.1 + /usr/bin/rm -rf /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3/templates + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/bin + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib/nss/unsupported-tools + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib/pkgconfig + mkdir -p /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man1 + mkdir -p /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man5 + touch /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/libnssckbi.so + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib/nss/libnssckbi.so + for file in libnss3.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib + for file in libnss3.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib + for file in libnss3.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib + for file in libnss3.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib + for file in libnss3.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//etc/pki/nssdb + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-cert8.db /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//etc/pki/nssdb/cert8.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-key3.db /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//etc/pki/nssdb/key3.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-secmod.db /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//etc/pki/nssdb/secmod.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-cert9.db /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//etc/pki/nssdb/cert9.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-key4.db /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//etc/pki/nssdb/key4.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/system-pkcs11.txt /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//etc/pki/nssdb/pkcs11.txt + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/certutil /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/cmsutil /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/crlutil /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/modutil /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/signtool /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/signver /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/ssltap /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/bin + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/atob /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/btoa /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/derdump /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/listsuites /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/ocspclnt /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pp /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/selfserv /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/strsclnt /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/symkeyutil /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/tstclnt /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/vfyserv /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/vfychain /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib/nss/unsupported-tools + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cert.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/certdb.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/certt.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cmmf.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cmmft.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cms.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cmsreclist.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cmst.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/crmf.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/crmft.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cryptohi.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cryptoht.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/jar-ds.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/jar.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/jarfile.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/key.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/keyhi.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/keyt.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/keythi.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nss.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssbase.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssbaset.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckbi.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckepv.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckft.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckfw.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckfwc.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckfwt.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckg.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckmdt.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckt.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nsspem.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/ocsp.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/ocspt.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/p12.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/p12plcy.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/p12t.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11func.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11pqg.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11priv.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11pub.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11sdr.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pkcs12.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pkcs12t.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pkcs7t.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/preenc.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sechash.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secmime.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secmod.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secmodt.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secpkcs5.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secpkcs7.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/smime.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/ssl.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sslerr.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sslproto.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sslt.h /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3 + for file in dist/private/nss/nssck.api + /usr/bin/install -p -m 644 dist/private/nss/nssck.api /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/include/nss3/templates + /usr/bin/install -p -m 644 ./dist/pkgconfig/nss.pc /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/lib/pkgconfig/nss.pc + /usr/bin/install -p -m 755 ./dist/pkgconfig/nss-config /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/bin/nss-config + /usr/bin/install -p -m 755 ./dist/pkgconfig/setup-nsssysinit.sh /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/bin/setup-nsssysinit.sh + ln -r -s -f /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/bin/setup-nsssysinit.sh /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm//usr/bin/setup-nsssysinit + for f in nss-config setup-nsssysinit + install -c -m 644 nss-config.1 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man1/nss-config.1 + for f in nss-config setup-nsssysinit + install -c -m 644 setup-nsssysinit.1 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man1/setup-nsssysinit.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/certutil.1 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man1/certutil.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/cmsutil.1 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man1/cmsutil.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/crlutil.1 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man1/crlutil.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/derdump.1 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man1/derdump.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/modutil.1 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man1/modutil.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/pk12util.1 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man1/pk12util.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/pp.1 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man1/pp.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/signtool.1 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man1/signtool.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/signver.1 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man1/signver.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/ssltap.1 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man1/ssltap.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/vfychain.1 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man1/vfychain.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/vfyserv.1 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man1/vfyserv.1 + for f in pkcs11.txt + install -c -m 644 pkcs11.txt.5 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man5/pkcs11.txt.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 cert8.db.5 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man5/cert8.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 cert9.db.5 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man5/cert9.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 key3.db.5 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man5/key3.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 key4.db.5 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man5/key4.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 secmod.db.5 /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/share/man/man5/secmod.db.5 + /usr/lib/rpm/find-debuginfo.sh --strict-build-id -m --run-dwz --dwz-low-mem-die-limit 10000000 --dwz-max-die-limit 50000000 /builddir/build/BUILD/nss-3.19.1 extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/bin/certutil extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/bin/signtool extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/bin/pk12util extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/bin/crlutil extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/bin/modutil extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/bin/signver extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/bin/cmsutil extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/bin/ssltap extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/libsmime3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/libnsssysinit.so extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/libssl3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/libnss3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/nss/unsupported-tools/vfyserv extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/nss/unsupported-tools/vfychain extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/nss/unsupported-tools/listsuites extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/nss/unsupported-tools/selfserv extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/nss/unsupported-tools/ocspclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/nss/unsupported-tools/strsclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/nss/unsupported-tools/derdump extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/nss/unsupported-tools/pp extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/nss/unsupported-tools/tstclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/nss/unsupported-tools/btoa extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/nss/unsupported-tools/symkeyutil extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/nss/unsupported-tools/atob extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/nss/libnssckbi.so extracting debug info from /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm/usr/lib/libnsspem.so /usr/lib/rpm/sepdebugcrcfix: Updated 26 CRC32s, 0 CRC32s did match. cpio: nss-3.19.1/nss/cmd/modutil/lex.Pk11Install_yy.cpp: Cannot stat: No such file or directory cpio: nss-3.19.1/nss/cmd/modutil/ytab.c: Cannot stat: No such file or directory 23987 blocks + /usr/lib/rpm/check-buildroot + /usr/lib/rpm/redhat/brp-compress + /usr/lib/rpm/redhat/brp-strip-static-archive /usr/bin/strip + /usr/lib/rpm/brp-python-bytecompile /usr/bin/python 1 + /usr/lib/rpm/redhat/brp-python-hardlink + /usr/lib/rpm/redhat/brp-java-repack-jars Executing(%check): /bin/sh -e /var/tmp/rpm-tmp.W29GVi + umask 022 + cd /builddir/build/BUILD + cd nss-3.19.1 + '[' 0 -eq 1 ']' + export NSS_NO_SSL2=1 + NSS_NO_SSL2=1 + FREEBL_NO_DEPEND=1 + export FREEBL_NO_DEPEND + BUILD_OPT=1 + export BUILD_OPT + export NSS_BLTEST_NOT_AVAILABLE=1 + NSS_BLTEST_NOT_AVAILABLE=1 + export SOFTOKEN_LIB_DIR=/usr/lib + SOFTOKEN_LIB_DIR=/usr/lib ++ find ./nss/tests ++ grep -c ' ' + SPACEISBAD=0 + : + '[' 0 -ne 0 ']' ++ perl -e 'print 9000 + int rand 1000' 9159 selfserv_9159 + MYRAND=9159 + echo 9159 + RANDSERV=selfserv_9159 + echo selfserv_9159 ++ ls -d ./dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin ./dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin + DISTBINDIR=./dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin + echo ./dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin ++ pwd ~/build/BUILD/nss-3.19.1 ~/build/BUILD/nss-3.19.1 + pushd /builddir/build/BUILD/nss-3.19.1 + cd ./dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin + ln -s selfserv selfserv_9159 ~/build/BUILD/nss-3.19.1 + popd + find ./nss/tests -type f + grep -v '\.db$' + grep -v '\.crl$' + grep -vw CVS + xargs grep -lw selfserv + xargs -l perl -pi -e 's/\bselfserv\b/selfserv_9159/g' + grep -v '\.crt$' + killall selfserv_9159 selfserv_9159: no process found + : + rm -rf ./tests_results ~/build/BUILD/nss-3.19.1/nss/tests ~/build/BUILD/nss-3.19.1 + pushd ./nss/tests/ + HOST=localhost + DOMSUF=localdomain + PORT=9159 + NSS_CYCLES= + NSS_TESTS='libpkix cert dbtests tools fips sdr crmf smime ssl ocsp merge pkits chains' + NSS_SSL_TESTS= + NSS_SSL_RUN= + ./all.sh testdir is /builddir/build/BUILD/nss-3.19.1/tests_results/security init.sh init: Creating /builddir/build/BUILD/nss-3.19.1/tests_results/security which: no domainname in (.:/builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin:/builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/sbin:/usr/local/sbin:/builddir/.local/bin:/builddir/bin) ******************************************** Platform: Linux3.19_arm_glibc_PTH_OPT.OBJ Results: localhost.1 ******************************************** init.sh init: Testing PATH .:/builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin:/builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/sbin:/usr/local/sbin:/builddir/.local/bin:/builddir/bin against LIB /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib: Running tests for libpkix TIMESTAMP libpkix BEGIN: Fri Jan 8 11:07:40 EST 2016 TIMESTAMP libpkix END: Fri Jan 8 11:07:40 EST 2016 Running tests for cert TIMESTAMP cert BEGIN: Fri Jan 8 11:07:40 EST 2016 cert.sh: Certutil and Crlutil Tests with ECC =============================== cert.sh: #1: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -f ../tests.pw cert.sh: #2: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #3: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -o root.cert cert.sh: #5: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA -f ../tests.pw cert.sh: #6: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #7: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #9: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #11: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #12: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #13: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA -f ../tests.pw cert.sh: #14: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #15: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #16: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #17: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #18: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #19: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #20: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #21: Exporting Root Cert - PASSED cert.sh: Creating an DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #22: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #23: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #24: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #25: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #26: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #27: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #28: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #29: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #30: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #31: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #32: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #33: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #34: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #35: Exporting DSA Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #36: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #37: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #38: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #39: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #40: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #41: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #42: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #43: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #44: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #45: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #46: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #47: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #48: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #49: Exporting EC Root Cert - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -f ../tests.pw cert.sh: #50: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #51: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #52: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #53: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #54: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA/clientCA.ca.cert cert.sh: #55: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #56: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #57: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #58: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA/clientCA-dsa.ca.cert cert.sh: #59: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #60: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #61: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #62: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #63: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #64: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #65: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA/clientCA-ec.ca.cert cert.sh: #66: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #67: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #68: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #69: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA/serverCA-ec.ca.cert cert.sh: #70: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA/serverCA-dsa.ca.cert cert.sh: #71: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #72: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #73: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #74: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #75: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #76: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #77: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #78: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -f ../tests.pw cert.sh: #79: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #80: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #81: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #82: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #83: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #84: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #85: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #86: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #87: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA/serverCA-dsa.ca.cert cert.sh: #88: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #89: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #90: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #91: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #92: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #93: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #94: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA/serverCA-ec.ca.cert cert.sh: #95: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #96: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #97: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #98: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #99: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA/clientCA-dsa.ca.cert cert.sh: #100: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #101: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA/clientCA.ca.cert cert.sh: #102: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #103: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #104: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #105: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #106: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/clientCA/clientCA-ec.ca.cert cert.sh: #107: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw cert.sh: #108: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #109: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -i ../CA/TestCA.ca.cert cert.sh: #110: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #111: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -i ../CA/TestCA-ec.ca.cert cert.sh: #112: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #113: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #114: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #115: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #116: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #117: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #118: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #119: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #120: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #121: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #122: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #123: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #124: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #125: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #126: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #127: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #128: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #129: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -i ../CA/TestCA.ca.cert cert.sh: #130: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #131: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -i ../CA/TestCA-ec.ca.cert cert.sh: #132: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #133: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #134: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #135: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #136: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #137: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #138: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #139: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #140: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #141: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #142: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #143: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #144: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #145: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #146: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #147: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #148: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #149: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #150: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #151: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #152: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #153: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #154: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #155: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #156: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #157: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #158: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #159: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #160: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #161: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #162: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #163: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #164: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #165: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating ssl_gtest DB dir cert.sh: Creating database for ssl_gtests cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ssl_gtests --empty-password cert.sh: #166: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Creating server certs for ssl_gtests cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -S -z ../tests_noise -g 2048 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ssl_gtests -n server -s CN=server -t C,C,C -x -m 1 -w -2 -v 120 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? cert.sh: #167: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -S -z ../tests_noise -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ssl_gtests -n ecdsa -s CN=ecdsa -t C,C,C -x -m 1 -w -2 -v 120 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? cert.sh: #168: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/alicedir -f ../tests.pw cert.sh: #169: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #170: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/alicedir -i ../CA/TestCA.ca.cert cert.sh: #171: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #172: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #173: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #174: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #175: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #176: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #177: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #178: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #179: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #180: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #181: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #182: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #183: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #184: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #185: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #186: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #187: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #188: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/bobdir -f ../tests.pw cert.sh: #189: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #190: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/bobdir -i ../CA/TestCA.ca.cert cert.sh: #191: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #192: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #193: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #194: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #195: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #196: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #197: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #198: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #199: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #200: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #201: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #202: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #203: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #204: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #205: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #206: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #207: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #208: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dave -f ../tests.pw cert.sh: #209: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #210: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dave -i ../CA/TestCA.ca.cert cert.sh: #211: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #212: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #213: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #214: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #215: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #216: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #217: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #218: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #219: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #220: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #221: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #222: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #223: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #224: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #225: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #226: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #227: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #228: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eve -f ../tests.pw cert.sh: #229: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #230: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eve -i ../CA/TestCA.ca.cert cert.sh: #231: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #232: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #233: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #234: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #235: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #236: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #237: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #238: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #239: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #240: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #241: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #242: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #243: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #244: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #245: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #246: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #247: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #248: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #249: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #250: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #251: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #252: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #253: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #254: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #255: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #256: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips -f ../tests.fipspw cert.sh: #257: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #258: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #259: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #260: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eccurves -f ../tests.pw cert.sh: #261: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #262: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #263: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #264: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #265: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #266: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #267: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #268: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #269: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #270: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #271: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #272: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw cert.sh: #273: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #274: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #275: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #276: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #277: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #278: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #279: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #280: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #281: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #282: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #283: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #284: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #285: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #286: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #287: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #288: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #289: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #290: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #291: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #292: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:9b:db Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 16:13:49 2016 Not After : Fri Apr 08 16:13:49 2016 Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:0e:3b:65:ee:ad:5e:e4:0c:5c:29:30:24:e9:63:ba: 98:e2:f6:cc:b0:cc:19:d1:6c:87:02:b5:00:0d:73:a3: ae:72:ef:9a:57:69:3e:49:7f:e5:b6:c8:9d:6a:41:e9: 2e:5a:ef:b4:2a:4d:12:ed:45:6f:09:55:79:30:b7:c9: c0:3c:3e:9c:0c:f4:06:47:d4:b3:19:a2:c2:1b:3c:4b: d3:04:7e:a6:c3:17:14:16:37:a6:09:93:27:68:00:ea: 6e:42:d3:ea:36:36:4c:b8:9b:c6:d8:46:6c:2c:1d:cb: ad:5b:53:bc:0f:d9:83:55:78:3c:37:66:29:c9:23:be: dc:59:7c:fe:0d:b2:4b:f4:80:47:76:72:b5:82:b8:a8: 3c:5d:88:8d:81:82:b8:1d:27:c5:89:53:b8:73:51:b6: 07:e3:29:44:c7:3c:f5:ac:ba:02:1f:12:89:29:7d:02: 86:f5:69:dd:a9:a7:23:70:85:21:15:da:47:fe:ba:ee: e4:db:b1:23:d8:4a:b8:4e:e2:d0:e6:99:c3:a9:61:cc: fd:34:e9:e8:49:e9:52:b4:c8:03:8a:7e:08:4c:29:7a: 47:1a:2b:ba:16:ac:4a:a4:48:84:9c:5d:e9:f0:3a:4b: 6a:c3:0a:ba:17:b1:c3:15:38:e2:1b:fb:13:06:74:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:b2:d4:bb:a8:9a:3d:77:88:df:ef:4a:f5:8e:8b:4e: 34:e2:7f:0d:78:87:4d:84:20:00:9f:06:4f:66:f7:ca: d5:4e:68:8c:d5:a3:b4:0f:14:76:e4:c8:b8:42:68:a6: bd:32:85:8b:9d:2c:8b:5d:33:92:6f:d8:f7:9c:1c:7a: d4:0d:07:df:69:04:5c:dc:f3:28:d0:c2:3c:d2:9f:9e: 30:26:9d:68:3f:a7:58:a9:85:41:aa:02:1f:70:e1:7b: 07:3d:ab:8c:43:86:67:dc:9c:55:3b:d5:c3:6a:7f:d7: d8:6f:22:b6:67:48:81:69:6a:dd:94:f0:0f:2d:68:8c: fc:ed:19:b8:68:03:ec:06:4d:1b:16:33:22:42:bf:b4: d7:fe:43:dc:51:46:5a:20:33:c6:d1:ec:be:bf:76:17: 29:07:fb:58:f7:16:86:2b:10:c7:66:b8:2f:90:cb:42: ba:fd:e9:1c:92:2a:a8:c4:db:9e:24:59:ea:a2:9f:09: 1d:68:de:7d:88:8b:c7:b2:14:c5:29:8e:cf:7a:a8:70: dd:c7:77:11:b0:71:f3:e4:44:36:92:aa:1c:22:1e:a0: 6e:f4:ca:f8:05:f5:24:cf:cb:d9:60:73:1e:87:7c:c8: 64:3e:34:1b:cd:c1:98:be:27:6c:00:e7:65:a9:53:ec Fingerprint (SHA-256): 3D:53:96:07:2D:4C:1F:37:44:37:2C:8C:BF:F6:C0:27:51:20:12:50:38:9D:02:B9:E9:3D:1E:82:66:61:97:12 Fingerprint (SHA1): 4B:8D:21:A5:01:FC:D6:85:D0:65:83:DE:19:AF:B5:4B:3E:80:2D:FD Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #293: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:9b:ee Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 16:13:55 2016 Not After : Fri Apr 08 16:13:55 2016 Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:96:43:49:72:d2:1b:b4:79:3f:47:b3:1a:de:b1:e4: bb:f8:6f:cd:96:7d:dd:01:82:e0:8b:06:a6:5e:5f:80: 85:e7:33:57:17:9f:e2:a5:21:d9:14:a3:11:90:07:20: 35:6d:77:43:32:77:92:fc:6d:e3:a2:05:6f:2f:3c:ce: d4:d7:2b:43:fb:99:16:15:97:04:09:58:4e:98:f0:cc: 95:4b:98:a5:ec:5e:46:1c:51:56:29:ba:b1:92:c7:e8: 96:7f:35:48:c0:ce:4d:ff:1d:ae:29:74:d0:8d:c1:dc: 07:5b:d7:6e:44:ed:7b:73:57:c9:12:0c:4b:0b:b5:9e: e2:94:b6:b3:34:40:de:0f:24:9f:d7:d1:c8:0f:22:d9: ff:29:5c:3a:6d:95:7e:7b:0b:85:ab:25:e6:71:7f:3d: f8:14:e7:51:63:17:98:01:04:26:9d:71:fb:85:e3:7a: 7d:cf:ab:4e:4d:0e:94:f1:e4:06:ba:6a:c0:bd:54:d7: fd:11:5d:fa:c2:de:52:f4:1f:d4:98:c1:6e:92:d2:7f: 9d:38:e2:a1:3d:83:f4:e4:5c:e5:a2:f2:a8:5c:28:46: 61:ab:c6:e2:bd:eb:90:76:b6:62:ec:cb:fc:b2:a4:bd: eb:a8:b5:bb:1d:a7:d5:b1:48:6f:8e:2d:26:c4:53:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 44:f1:f7:44:d5:cd:3c:6f:c7:b6:4a:9c:10:e9:ed:a9: 86:72:e9:b5:42:8a:10:5f:5e:b5:85:10:15:c1:3d:ba: 76:a4:36:e5:95:12:b9:8c:f0:47:34:74:1f:92:9f:b0: 24:7d:bf:ad:1c:aa:59:13:3a:ed:89:c8:ca:78:13:97: 68:4a:7f:69:ff:28:00:e6:5c:82:c4:e5:66:d1:a6:23: fd:73:0f:54:cd:f6:b5:14:da:b5:db:5c:cc:30:a0:5f: e7:29:7c:91:d4:f7:4b:a2:13:5f:58:7d:4a:3c:80:a8: 10:c4:da:75:06:17:b3:01:81:01:06:e7:b2:61:19:43: aa:6a:22:b5:74:55:03:82:19:ca:d0:7b:00:3e:5b:15: df:79:4f:b7:39:88:47:00:ed:ed:9c:ed:f5:00:4a:ad: ed:d0:d7:08:27:a2:a7:03:f4:de:cc:66:ed:93:9d:42: d3:a2:99:7a:f4:8a:02:4a:cc:31:c1:54:e0:86:16:70: ed:ad:b7:24:39:30:d0:82:0a:0e:04:e9:a6:6b:bc:4c: ac:e3:e8:93:8a:48:4a:98:15:b8:27:da:48:94:1d:9e: 0b:f2:42:e1:19:a2:46:6a:9c:77:c3:2c:5c:78:cd:c0: a5:46:73:9c:a8:c2:ed:1f:c4:16:a8:bb:ed:9e:45:a8 Fingerprint (SHA-256): 08:63:C8:C8:46:C0:95:8B:5D:5B:01:10:49:62:45:C1:B2:89:F5:E0:9D:49:39:9C:42:CF:20:E0:57:62:F7:5C Fingerprint (SHA1): 7C:45:6F:7A:90:D2:FC:3F:7F:39:96:E7:FD:3E:25:B3:9F:19:5A:3C Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #294: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:9b:f9 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 16:14:00 2016 Not After : Fri Apr 08 16:14:00 2016 Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:f6:bd:a4:c4:57:ec:ed:e3:be:54:1f:8e:02:91:8f: 79:58:73:b1:d9:a3:52:7c:db:de:ed:bc:df:67:e9:f9: e4:e2:f4:cf:4c:24:99:f9:b3:d8:b5:a1:de:c2:60:58: 6e:81:00:67:7b:fe:ea:d4:60:52:06:16:af:ae:6b:d5: 5b:3d:47:c6:b5:fa:6f:e0:c3:d5:8f:fe:36:48:31:97: 54:70:54:e9:77:90:98:0f:82:ae:ea:0e:a0:56:66:c2: 82:4d:a9:39:08:87:1c:65:da:eb:92:c1:c2:fb:95:4b: 40:86:b8:af:61:67:52:f2:0d:e1:01:ea:94:1d:25:03: f8:ec:3e:f4:b5:5e:e9:60:7f:45:20:62:94:df:6f:cc: 31:0c:e1:f3:a6:18:ea:fa:60:1b:90:0a:9d:52:e2:39: d4:13:b0:c8:30:01:3a:ee:19:c0:57:92:fb:ad:ed:39: ec:47:48:79:28:48:d3:fc:c3:aa:bf:7e:78:bb:8d:ae: 30:68:a8:fa:14:78:68:dc:07:ca:f5:3c:4f:39:6b:c9: 2e:b7:59:62:20:4a:24:40:07:6b:7c:3e:92:b6:5d:7c: d4:ac:b7:10:0b:6e:88:9a:74:9f:e1:05:1a:ef:ef:d1: fe:bf:3d:2f:9f:63:79:77:55:07:fe:d6:a7:f1:02:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:de:0b:cd:24:42:b3:47:90:ae:b5:81:24:fc:57:31: 57:0b:23:d3:a5:d3:3f:d8:d8:61:b9:4c:27:25:ae:a0: 41:74:6a:d5:23:8b:d4:cf:ef:8f:7a:92:48:cd:ea:39: 92:10:c6:29:75:c6:a8:5a:24:48:09:79:33:99:7b:63: 62:6b:64:cc:cd:c4:ba:35:36:b2:0f:a8:82:61:24:bb: f7:02:e1:b6:f0:5b:36:32:83:75:37:fd:da:4c:7e:e5: 4e:74:c0:b3:4b:2b:cd:ca:b1:b8:f1:79:68:ae:7f:b9: 1a:77:a6:20:1e:db:47:d3:3a:98:92:2b:d2:58:4b:49: cd:0c:6d:40:88:cf:24:93:40:4a:c2:60:9e:97:ab:b2: 9f:67:a4:38:f1:6b:40:fa:af:3e:63:8a:6e:85:59:21: 95:12:b6:ca:db:ef:d3:51:10:1c:bd:31:4e:dc:e5:89: 4c:04:1b:2d:d1:1c:3e:8b:dc:75:2c:89:5c:2a:a8:2d: fe:f2:50:75:ea:93:79:9b:1e:b3:eb:c9:fc:47:5a:7c: 18:f2:96:6e:8a:4a:07:c5:c1:4e:41:93:4f:46:ab:3d: 6b:50:22:15:12:23:5b:b8:1a:fc:94:30:32:9a:40:7e: c7:b5:81:46:b1:d3:a4:ba:86:4b:65:65:93:1f:4c:4d Fingerprint (SHA-256): A9:16:AC:AE:38:0A:9E:2D:BB:9F:ED:AC:13:0B:94:31:40:99:88:9F:B1:59:AA:7A:DE:D6:BA:A0:07:41:44:2F Fingerprint (SHA1): 08:1F:AD:E5:60:DC:95:65:26:B8:51:19:C6:4E:EB:EA:CF:DF:1F:9D Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #295: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:9c:03 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 16:14:08 2016 Not After : Fri Apr 08 16:14:08 2016 Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:51:a2:48:02:af:c2:93:1b:ab:ff:d5:11:28:60:99: a9:70:9b:4f:65:80:45:ab:15:9e:dd:e8:d1:ef:eb:01: b6:d4:21:31:5f:b6:0f:21:08:b3:0e:c6:c4:2e:b4:c1: d0:37:eb:26:bf:26:90:bc:d1:46:91:0d:11:80:45:10: bc:e3:e7:89:6b:5b:81:23:9c:5c:31:c0:c0:2e:b8:90: fb:fa:30:7a:5d:15:0d:89:65:4a:e4:e6:f5:d3:7c:ff: b0:dd:67:c7:6f:68:c7:27:32:f8:53:5c:2b:7f:96:78: c3:16:4a:31:6f:28:d6:fe:e0:f3:97:88:7d:8d:87:b7: f9:3d:20:b4:2c:4b:c8:f6:83:6d:d3:76:d2:8e:a3:40: 79:9b:e6:3f:46:7f:c0:06:3c:39:e7:2b:87:1b:98:70: c4:ce:9a:21:e2:00:03:61:93:cd:cf:6c:07:6d:ef:ce: c0:69:4e:64:27:cc:6e:47:c8:56:ac:cc:f8:b3:7d:c8: 05:bc:60:6a:96:ff:2d:e5:78:11:0b:8f:3d:ca:46:fa: 7d:75:df:7f:45:1e:fb:81:61:16:40:63:b1:6d:6a:95: b9:da:8e:3e:02:21:e7:75:2a:e2:40:51:e1:a4:e4:d8: 22:88:b5:c0:6e:35:ba:65:e7:83:29:d8:9f:a2:f9:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3c:77:de:55:39:f8:56:80:22:08:76:25:7a:fc:0d:89: a3:de:73:42:21:13:3a:c5:8b:cd:83:74:bb:9e:2a:c1: eb:1f:45:23:be:1c:96:15:14:8c:9f:88:96:3c:18:45: 75:9e:f3:eb:bf:21:6c:45:8b:87:4f:00:4f:bc:ca:85: b4:7c:d3:43:07:fa:51:a1:40:a4:87:b3:b0:77:35:bd: 26:bd:72:3a:5f:59:3c:d6:af:41:5d:82:77:90:32:7b: 1d:54:69:49:8c:a8:86:ab:5d:cb:e3:cc:3c:b0:a4:ec: db:c2:78:71:58:0b:92:33:f2:82:51:45:e2:ca:8b:8a: b8:c6:31:b3:83:b1:51:bc:e3:61:11:b3:99:ca:83:26: 8a:a4:aa:c4:40:f2:ae:f4:58:f1:4b:17:b9:3b:b1:7b: 5c:71:a0:68:89:79:07:31:cc:9b:24:5a:8d:77:10:97: 1d:21:65:e1:09:03:29:76:cc:74:3c:03:41:4c:91:1f: c3:73:49:b1:06:78:9a:5e:0a:50:ba:77:88:bc:b6:fe: ad:93:e0:9f:2f:69:45:b5:14:01:61:3b:26:a6:c9:88: 1e:e7:b3:1a:66:72:78:e7:7d:1b:9a:23:d5:53:38:15: 8c:41:1a:d7:93:12:ca:8b:51:01:dc:16:c6:c5:46:39 Fingerprint (SHA-256): 79:B4:D2:FE:C2:C4:D7:0A:D0:A1:DE:0F:8E:5D:9B:59:4C:16:3B:2B:4F:AF:B6:7C:F0:64:C7:8D:02:03:E8:43 Fingerprint (SHA1): ED:CC:6C:91:96:45:18:6A:33:C4:45:9C:B9:7D:CC:BE:EA:C9:15:3F Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #296: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:9c:13 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 16:14:14 2016 Not After : Fri Apr 08 16:14:14 2016 Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:c7:2c:3a:ba:22:0c:7e:23:05:2d:6d:61:48:ec:34: b5:1a:b7:9f:ac:c4:ca:2d:97:08:d8:2d:26:ba:f4:e5: 5b:5c:b9:4d:0c:ca:28:9e:35:f7:3f:e5:52:4e:ca:fc: 6f:66:0c:6d:26:eb:05:bd:6f:cc:51:7a:99:49:67:93: a6:d5:02:0e:ee:01:a6:77:25:a2:4b:8a:a8:39:b5:5b: 25:c5:c2:cf:6e:39:e7:23:92:a8:dd:8d:ae:5b:51:53: 9d:8a:01:e2:c0:8a:68:a7:1c:1d:7a:e5:63:55:48:86: 61:0f:46:d9:bf:af:27:e1:d6:5a:69:82:19:fd:87:04: 80:98:da:9e:47:59:0c:53:5e:21:a3:db:b7:2a:74:7c: fd:e9:17:7b:89:29:eb:1c:e4:f4:90:94:09:ac:e7:aa: 59:54:ea:2c:97:92:2c:fa:9b:a9:3f:e1:29:50:91:2f: 66:63:c4:7d:6a:c8:5c:92:fc:ed:b2:d7:9d:d5:ec:a6: c2:af:06:f9:c4:44:d8:0c:54:8e:c8:e2:95:c7:a4:13: 8b:08:54:89:62:29:9b:38:22:90:e7:3e:01:76:69:ef: a8:a6:ae:0d:92:f4:6b:6d:d8:2f:e0:7f:3c:39:53:de: 85:69:b2:83:04:c1:6a:29:73:48:e6:3c:2a:88:24:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ce:1c:d2:d5:be:57:f9:89:9a:e3:1b:81:2f:1d:30:d8: 86:84:1d:36:34:c6:a4:67:46:aa:a9:3a:9c:4f:da:e6: 5a:ef:1e:b8:ce:c0:c0:d6:00:a2:b5:5d:70:f1:95:df: a7:77:6e:2f:20:71:14:f8:a5:08:f4:b8:80:a1:dc:b8: d7:82:a9:6f:f6:c7:e6:6d:ad:ba:31:cb:cb:be:39:89: 2b:e0:c3:8e:8b:89:e9:44:fa:a5:8a:0c:f4:26:ca:ec: c6:ea:14:ed:8d:e3:ef:4e:1f:4e:3d:1b:95:03:2e:b0: b3:58:b6:1f:fe:c0:64:a2:a3:1d:94:a2:db:13:9c:8c: fc:84:27:3b:af:c2:92:60:9e:21:d7:1f:f2:27:51:2d: 1c:55:10:b1:26:b7:1e:8e:d5:f0:a6:a2:87:8f:87:1c: ba:ee:bb:e1:9e:85:e7:a8:d1:79:93:61:37:ca:34:30: dc:9e:5e:58:08:25:1f:9f:3e:be:1e:1e:6d:06:ef:c3: ba:48:87:74:a3:31:89:3b:f7:a8:2f:82:ee:dd:ca:a9: fd:0d:a4:d3:bd:a8:c6:b1:02:3f:2b:ea:8f:fc:71:43: eb:34:10:42:bb:48:50:d7:3f:93:ef:e1:4d:4d:38:ca: a3:d7:fc:02:fd:19:41:91:e1:3d:cd:79:32:75:52:18 Fingerprint (SHA-256): 7F:26:37:2D:60:5B:4B:DD:20:09:F8:E8:C1:44:B2:EB:14:18:E4:BA:34:FD:E8:8D:69:1A:ED:94:55:72:33:E7 Fingerprint (SHA1): 2E:20:CB:43:F9:15:86:AE:5D:B6:97:F6:64:BB:D7:24:48:2C:83:0D Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #297: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:9c:1e Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 16:14:27 2016 Not After : Fri Apr 08 16:14:27 2016 Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:75:98:17:d3:f6:93:ad:93:1f:7d:67:42:1d:b1:db: 31:50:c1:1b:ae:36:76:b1:9d:5a:7c:85:45:f3:cf:92: e6:a3:a7:3b:29:94:9d:2a:fc:5b:15:f1:fb:99:41:30: 3b:a1:21:d2:37:79:45:31:6b:52:c4:e2:fa:75:8b:9e: ed:a2:28:5c:56:40:1d:e4:51:95:c3:5a:3e:99:bc:3c: ec:3f:88:b5:94:00:d1:46:e4:bb:a3:07:da:51:34:dd: 25:99:b8:e1:c2:93:b7:99:3f:11:58:4e:4a:e8:39:09: eb:51:25:42:eb:38:a2:de:ae:73:68:ad:50:ce:19:80: 5a:14:85:bc:8f:93:95:c2:23:82:c2:3a:50:ab:d7:b8: 79:7c:e1:ed:b0:0f:6d:32:f9:2a:21:29:3a:65:23:78: d5:ed:77:e5:c2:5c:fa:2b:97:15:6f:b0:ae:62:4e:48: 78:db:30:9e:98:d9:08:f7:7d:2d:40:e5:49:34:66:5f: ac:f5:2a:af:ee:dd:26:2d:6b:72:d3:b6:50:9d:1c:fd: 5b:fd:cc:e1:5b:db:0a:12:00:b5:2e:dc:2f:b2:a0:d5: 5b:b3:1e:f5:ef:17:43:f7:64:8e:fd:f8:08:b2:2f:52: 85:e4:1a:f8:8e:7f:c8:eb:40:3c:3b:85:bd:46:9a:f7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:2c:5f:1f:37:61:0e:db:a9:ba:75:a2:37:b3:c2:43: c7:eb:b9:e0:45:43:ec:c4:40:0b:02:d4:66:7b:ee:9c: 50:eb:65:b9:4d:90:8b:37:80:d4:1f:c4:a9:f8:37:aa: 6c:50:c9:2d:3f:f6:71:ee:83:93:c1:40:17:4b:a3:08: fd:63:6b:cd:83:17:43:74:85:11:0a:47:bc:8a:82:b9: 79:3f:92:83:3f:42:10:8c:48:a5:18:e7:c4:86:fe:42: 58:02:6f:46:48:a1:e7:5a:cd:2b:cb:85:a8:f4:e2:95: 9a:e6:dd:a1:1c:32:10:16:d8:f3:ef:3b:0e:82:5a:bb: 9a:9e:65:64:67:69:e9:dc:24:d9:4f:53:a6:b6:71:c8: 58:7a:4d:9d:2f:10:ab:98:27:5c:bb:39:42:15:a9:3f: 7a:d1:65:67:cf:33:05:45:32:dc:e3:5d:8c:12:76:12: 73:70:8e:59:09:65:7f:12:b1:ed:4b:a9:02:ea:29:b7: f0:ab:44:2c:26:c0:b3:56:46:3f:d7:61:dd:93:f8:e0: ec:21:0b:51:33:e2:97:16:f1:bb:8e:27:1e:fa:6f:99: e6:19:a3:ad:cb:83:a3:7a:56:84:d9:f2:f3:fa:26:8e: b6:76:a6:16:c0:ae:4c:83:b6:ae:aa:11:58:4b:5b:95 Fingerprint (SHA-256): FA:26:B7:C1:FF:E9:C8:2C:CC:E2:78:A2:9A:D9:C6:0B:2A:33:22:22:4C:BB:19:29:C7:85:2C:0F:F9:C3:65:75 Fingerprint (SHA1): 66:F3:EC:69:8C:42:2F:B4:57:77:D1:A9:2E:94:A3:DA:72:7F:EA:28 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #298: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:9c:36 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 16:14:36 2016 Not After : Fri Apr 08 16:14:36 2016 Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:d2:bc:ea:e7:ba:39:37:4b:77:e9:b5:37:dd:92:23: f8:70:fd:90:1a:07:55:28:8c:58:bb:fe:4b:33:6b:67: 46:b4:7b:a6:50:59:d1:54:4f:07:da:d9:16:9b:45:77: 1f:db:d6:f6:b4:74:7f:af:f7:fc:7a:90:8a:23:78:70: ea:56:f9:71:d7:ba:5a:a8:e6:fd:1b:30:1c:9e:3e:db: 61:53:c3:62:6a:c6:df:52:74:41:e4:69:d4:25:0a:71: 50:ec:0e:ac:0f:4b:84:06:4d:bb:d5:3c:a8:d2:e7:95: 0e:e3:19:7f:7c:27:7d:d3:97:9a:6e:82:7c:f9:82:f3: 07:d3:39:56:b3:9e:cb:8c:0e:2e:d3:ba:0a:37:93:c2: 37:da:23:0e:e7:f7:5d:24:46:61:ee:0b:dc:a6:f4:f0: f0:0f:d4:4b:59:80:4a:5c:f8:14:07:bf:01:8e:77:90: d2:a7:94:9c:92:4a:e4:aa:4b:53:da:32:fd:04:af:f9: dd:0b:9b:3b:e7:c6:28:75:14:67:07:81:7e:91:c5:27: 3d:75:ff:21:d2:83:25:39:f1:56:a1:01:e5:bc:2d:3f: f8:9e:3a:16:9e:87:ab:86:58:a5:5e:a2:5a:23:8e:b4: 93:0a:d8:dc:19:8a:1d:98:75:a7:db:b9:4f:55:90:39 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:11:29:92:b2:50:93:fa:17:c6:dc:7b:e2:c9:5f:ff: 01:58:8b:66:52:00:fb:a7:e1:1f:95:6f:75:aa:ad:a3: 5a:c4:52:d9:02:12:97:fa:a8:98:69:e7:30:95:20:46: a8:2e:86:d4:f5:e0:2f:ea:34:b4:21:3b:fa:c1:e6:8c: cd:81:91:81:15:f4:50:05:e4:ef:29:e5:75:fa:63:64: 68:ca:58:09:03:a8:c9:f8:4a:0e:5e:73:87:56:8a:67: bd:60:91:59:1f:39:b3:3b:41:b9:4f:e4:56:dc:80:61: 03:da:82:b7:2b:a0:c3:fc:70:71:09:36:30:65:b9:b9: e8:c2:47:f6:6a:b5:0d:c1:fc:c4:25:c0:b0:5d:11:ae: 41:83:80:72:c7:dd:91:8a:c3:57:7e:7a:bc:a9:3d:bc: f0:01:42:3d:23:9c:09:c0:f4:5d:f2:41:05:b0:4b:92: 72:f4:9a:92:41:ff:61:f0:bb:f5:eb:77:8e:c5:b8:30: e3:6b:62:66:61:69:c0:8a:cf:1c:99:c2:d5:9b:b5:a7: dc:52:be:d7:ac:09:c4:42:af:7e:2e:6b:d5:72:c1:d1: 87:f1:96:f5:dd:cc:2b:e1:5d:d7:43:e6:e1:98:19:2d: 2a:74:bf:89:cc:e9:80:a2:b9:1e:14:81:c9:60:c2:1a Fingerprint (SHA-256): 70:60:2C:E6:76:1A:C7:1A:DF:8B:02:1C:E5:B4:F8:BD:6F:BC:BF:E6:59:90:DE:8B:F3:EC:49:73:6B:AE:DE:BA Fingerprint (SHA1): 6A:AF:5E:4D:22:58:2D:61:AF:9C:A5:D0:FE:A5:EA:F7:C5:99:6B:6E Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #299: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:9c:48 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 16:14:41 2016 Not After : Fri Apr 08 16:14:41 2016 Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:51:f3:3a:30:31:9a:be:29:95:03:12:5a:7d:ee:87: 0b:ba:dd:78:a5:5e:ae:f5:42:c5:ba:a1:25:17:d0:f3: 84:a4:41:83:cc:e0:53:81:2c:d4:35:2e:86:ab:6d:64: b2:cb:1f:6c:f8:f9:30:9c:ab:e4:53:b9:fc:e4:19:54: b6:d5:eb:19:2b:16:b0:c2:e5:ea:bd:61:38:0d:b3:be: f4:5c:72:48:7b:0f:74:1d:6c:79:82:36:25:09:28:6f: 70:39:1b:3e:a8:5d:a6:74:a0:e8:db:15:44:f1:e1:bc: 00:5f:78:79:72:a0:e7:bb:da:eb:cc:f3:bc:f2:25:91: 30:8e:d1:18:7e:36:37:4c:5b:33:fe:dd:5c:3b:22:c6: 8a:b2:58:b1:97:aa:57:c7:80:a9:91:4b:66:38:61:a3: 45:60:3c:b8:08:11:c5:4c:2f:0c:d8:63:e7:31:44:31: f1:fa:a0:aa:e3:07:fb:a4:36:9b:f0:2a:a6:e5:15:3f: 4a:50:6e:e2:cf:72:e1:b5:bc:b5:a1:67:2f:94:96:f2: f0:89:66:dc:16:4a:80:3b:4e:de:d8:95:d4:a7:cd:f6: 5e:76:cf:1a:3a:ee:4e:b2:d4:78:25:83:1c:ed:1a:8d: d7:a1:91:cf:95:a3:a4:e2:71:d6:9e:53:fa:77:a8:03 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:23:16:56:91:cc:de:9c:a9:58:4f:f8:6e:3a:5c:d8: de:49:74:7a:cd:0f:b4:30:6d:d9:96:e6:a4:3a:76:85: 88:19:28:57:d4:61:a3:a9:d5:04:88:47:c5:c2:60:6d: 74:86:2c:a5:f2:13:9d:9c:cc:67:b0:29:f7:63:fc:fb: 58:8c:88:41:b9:33:50:5f:51:b3:21:09:ae:84:3e:c0: a9:16:0c:b5:0f:83:45:70:97:6a:71:6f:72:5d:a3:0d: e8:6d:8d:77:29:5a:f6:cd:be:0b:06:73:e8:63:83:ea: f1:09:41:f1:25:7d:64:d2:e7:5c:8b:33:c9:64:c1:cc: 5c:fc:b4:81:8a:d9:04:ac:bc:40:fd:63:30:9f:ff:0f: fc:e7:07:46:dd:7f:40:ec:6e:34:9a:23:3c:e6:9b:ea: 80:05:14:07:bf:1f:50:19:3b:0a:13:89:8b:7e:d3:1b: 4c:ff:d7:f5:97:6e:7e:ed:78:97:88:fb:09:a3:d0:4b: 99:75:7d:88:5a:76:b3:ad:fe:bc:c4:64:35:39:fe:f9: f1:23:de:7f:9a:00:2a:89:7b:33:36:49:fb:44:12:ff: f3:9c:84:e3:9a:7f:61:c8:3d:48:b2:96:b4:ee:1f:7b: 63:f9:95:7e:c7:85:fb:12:9c:28:62:21:eb:29:3e:08 Fingerprint (SHA-256): 8A:1F:EA:3C:42:2D:2D:11:D6:A6:EF:3C:F9:51:9D:3F:A0:FB:D5:4D:A7:08:08:A7:80:F0:E5:15:AF:C5:5A:89 Fingerprint (SHA1): 7B:C9:8F:B0:E2:F0:AE:AD:B9:6F:81:D7:D5:7B:0A:B6:C6:80:84:B6 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #300: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:9c:52 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 16:14:50 2016 Not After : Fri Apr 08 16:14:50 2016 Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:80:12:f4:82:7a:e1:5e:58:d1:2f:e2:c0:04:99:6a: 3c:1f:9f:1d:4f:97:1a:9a:b2:90:e5:d4:e5:1c:94:6d: 3d:ec:e4:31:c3:06:e7:12:4d:19:77:5d:ac:a6:d4:4b: 10:ee:50:92:83:cf:a3:a4:ae:e9:67:c8:57:99:88:70: 43:41:65:93:52:87:fb:7b:06:77:98:0d:74:c7:c9:01: 14:8f:b1:7f:36:b6:b8:83:a2:63:be:2e:5e:c8:a0:66: 40:74:df:24:65:d9:67:8d:95:24:9d:bc:a8:98:36:cf: 23:77:3f:79:95:92:3a:c5:22:60:71:b4:46:7e:54:b2: cc:9c:e8:91:93:0f:c5:d5:40:58:d7:06:20:ac:5b:3c: 5a:4c:46:b0:34:b8:b4:97:07:65:02:78:d1:79:b3:5a: 80:99:34:51:85:c2:ba:21:9d:db:58:5f:1d:a1:42:bf: cb:da:11:be:39:2f:56:65:63:c6:33:6e:be:b9:1a:08: 6c:ca:f2:dc:b4:45:a3:7b:32:d6:c3:44:cf:a9:24:e4: 49:83:be:17:06:88:04:ab:e2:6c:85:7e:4c:db:e0:dd: 65:f1:66:93:0c:c3:03:ff:56:92:97:6a:f2:1f:fc:7b: e0:96:08:4b:75:c3:4d:43:1d:3c:1b:db:14:24:b7:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:c2:4a:2a:b0:d2:9e:5b:65:5b:07:37:9b:04:d3:29: 80:ee:24:90:2a:17:93:18:7d:76:e8:67:61:1e:45:ef: cc:ca:4a:f2:50:8b:3e:8a:2b:fc:3d:30:16:2c:d4:11: 07:e5:66:63:c4:ad:8f:ec:2f:d5:1b:2e:d8:5f:30:d3: f3:a4:0e:ca:0b:86:04:a2:fb:46:e8:78:fc:e0:85:48: 36:2b:bc:3b:e4:db:77:b2:15:52:bd:c6:f9:15:e6:c5: 6e:d8:04:6e:db:47:7f:23:f9:10:83:9e:dd:a2:6c:64: 80:2b:01:9a:5d:7f:a5:92:3a:4f:1d:7b:ec:05:95:63: be:25:08:73:81:62:af:13:bd:d7:60:12:68:d2:53:bb: 0f:69:d4:e5:a2:0a:69:08:b1:97:b4:67:cf:ef:44:5f: b2:b5:d9:9a:80:ec:3a:ac:a6:8b:ea:cc:7e:b3:11:9e: 4e:08:b7:96:79:d3:aa:53:a3:ef:0f:9c:82:99:eb:8f: 0d:a8:18:2a:c1:91:1f:a2:a8:6a:8c:be:3a:27:4d:73: 39:fe:53:9b:b4:22:12:9c:02:82:6a:a6:91:0e:df:3d: 89:10:a9:d3:0f:d1:cf:89:13:b9:b2:4e:43:f9:25:85: e2:f6:32:aa:7d:19:6a:52:2f:22:af:09:ff:38:2a:49 Fingerprint (SHA-256): 05:3F:3D:9C:3B:CE:0D:2C:35:EC:03:B7:11:E8:FE:64:C9:89:1C:B9:58:C1:F9:9A:CC:E5:42:8F:BE:AD:4E:17 Fingerprint (SHA1): E3:C4:76:74:5B:76:FC:D1:AC:12:15:09:05:A6:9F:14:11:FA:78:D5 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #301: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:9c:63 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Jan 08 16:15:07 2016 Not After : Fri Apr 08 16:15:07 2016 Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:fe:b6:e5:a5:44:4b:3b:0e:56:de:9a:b4:8f:ad:92: e9:6d:8d:1d:35:6d:3f:8f:89:95:db:2a:cc:dc:1d:2e: 05:28:a3:f8:2c:65:ae:28:70:8a:71:ff:7c:ab:e3:e4: 2c:f4:ec:3b:08:cb:75:bf:6f:fb:f0:a6:5f:1a:b8:ae: 66:48:88:38:10:41:10:66:a6:f2:7e:6c:54:89:da:7a: f4:fa:51:7e:8e:e3:07:19:51:1b:44:73:d8:53:72:94: b0:5f:d3:2f:5f:07:f0:1d:45:41:5c:99:ca:f6:fe:ab: e6:da:da:c5:10:2e:45:c8:22:e0:0b:0b:38:d6:42:8f: b9:aa:8f:2b:ed:fe:95:a9:9a:79:d9:78:19:13:7c:54: 00:1b:97:95:a3:3e:32:6e:0b:4d:e7:07:73:40:9f:31: 98:2f:26:67:28:c7:ff:2d:f5:60:c2:ce:d7:33:e8:87: f1:da:f4:c4:73:e1:ba:83:f8:e7:b4:d8:17:98:6b:b9: 67:b8:32:54:55:ab:c1:6c:fa:7d:1c:e0:50:2c:56:af: 54:d8:81:de:69:5e:3c:38:39:47:4f:12:fd:01:c9:42: 27:d9:45:dc:86:0f:59:c7:7f:d5:5b:ee:25:c4:dd:af: 93:20:34:30:e6:10:86:be:88:a1:02:45:61:99:1a:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b7:a2:4f:33:9c:8b:41:fe:25:25:e6:15:30:75:92:d9: 62:19:e1:95:7b:7f:41:bc:8b:75:5c:a3:4b:14:2b:26: ae:22:e6:f2:91:7b:1a:d4:75:ee:97:93:31:55:bc:c1: be:48:a6:c6:97:eb:89:5b:16:e2:c0:42:6a:2a:9b:ef: 76:6b:cc:d9:3f:1f:68:6b:9c:da:a7:c6:f5:d9:d0:8c: bb:36:56:6a:51:98:f7:5e:62:16:3a:ca:b8:bb:47:55: 7d:0b:c4:73:50:97:ab:35:9b:21:75:75:82:28:5a:f0: 05:86:c7:82:59:11:ed:a1:57:92:23:2e:f9:22:33:79: ab:35:52:8e:cf:f4:12:83:72:31:8c:8a:9c:e3:07:8b: 67:7e:93:1f:51:87:60:d9:db:1d:d9:b8:1f:90:38:8d: e0:98:26:1e:12:49:44:50:9d:67:08:bf:f8:d8:4b:fe: 3d:9e:dc:32:ff:28:56:fa:d5:e9:6a:1d:3a:8b:79:13: 74:0b:0c:ac:c4:e2:81:66:f5:cf:8c:3f:9b:1b:9c:fe: 72:e8:58:b8:fe:fc:e0:4d:91:cc:fa:ce:c0:5f:85:67: 31:39:be:fa:b7:98:2f:10:13:2b:35:76:a2:a5:7b:83: bb:1d:3e:41:e4:60:d8:9c:e0:09:8d:3c:f0:73:cb:aa Fingerprint (SHA-256): F4:2B:27:4C:7B:93:4E:1C:87:F5:03:8F:B7:09:68:85:25:F6:ED:01:45:BF:7D:76:B4:19:10:F9:BC:C2:F6:D8 Fingerprint (SHA1): 25:55:9F:7B:90:33:35:01:3E:00:45:A8:2C:76:F6:33:EB:D9:8B:B0 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #302: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:9c:83 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Jan 08 16:15:14 2016 Not After : Fri Apr 08 16:15:14 2016 Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:22:97:58:cb:04:9e:1e:ad:84:c2:b0:24:35:44:36: 8c:1c:d8:65:41:b4:c3:5b:aa:be:30:2e:ca:07:22:01: 2f:2b:81:30:23:79:09:88:1f:bd:ea:a7:bc:e6:28:f4: 58:ac:c2:81:f2:78:ec:2a:c4:8e:c9:5d:c9:13:af:33: cf:9d:f4:17:62:b1:11:b1:5b:4b:b7:ec:c3:62:da:b9: 9b:42:ba:2d:7e:cd:df:a4:b4:37:5a:83:38:d0:8a:56: 7b:4e:85:70:41:88:df:27:73:3c:b7:d4:24:1d:b7:b2: 0d:00:00:d6:1a:41:82:4b:a1:0e:ed:61:fa:dc:d1:4c: 85:07:48:39:ab:c6:83:2d:38:72:9b:25:09:84:6d:23: 93:8d:18:be:8b:d7:67:69:78:fd:6f:4c:86:9e:29:e8: 2e:12:93:af:67:39:2f:28:72:d3:b6:77:cb:3f:96:6e: 43:98:dc:cf:f9:34:32:83:6b:38:09:bc:0f:bf:75:96: ae:ee:6f:ee:23:24:47:73:d6:c6:93:34:86:da:03:5d: 9d:af:66:b6:3f:e4:b1:7a:e2:1a:d8:45:c3:d9:82:1f: 2a:45:3d:56:8d:a9:37:b5:39:53:73:3e:fa:f8:0b:3d: f7:05:70:b8:6e:36:99:5d:e7:94:df:3c:01:6a:26:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:fb:7f:ec:95:c8:d7:3d:48:71:63:b1:94:8f:e4:fa: b2:1b:2e:0e:59:d5:51:6d:bd:81:e3:fb:da:a8:4e:14: ec:3f:57:00:a0:ba:1e:e3:6d:18:e4:9a:57:50:58:36: a5:ab:54:54:99:28:c6:88:36:5e:bb:9d:d2:07:98:be: 1a:28:ab:93:0c:29:d6:f0:de:a7:4e:67:b8:b7:e9:ee: 85:7c:72:9a:55:b1:d3:be:66:10:e3:f6:3c:5d:93:39: 31:4c:6e:83:1a:69:2e:0b:bd:39:e8:59:94:06:1b:2e: a6:19:73:9b:0e:f0:fc:24:7b:ef:5e:0f:f4:ea:35:4d: af:1c:47:c6:1b:11:6a:67:33:51:5a:8f:4f:c0:8c:0c: 4c:3a:05:93:c3:4a:78:46:92:f4:76:58:1e:c1:bb:a8: db:35:58:7d:0a:b1:c0:74:a1:d0:b7:32:12:00:04:22: 65:a5:fd:5d:18:93:6d:48:4b:67:ec:20:1c:1d:95:e6: b0:ce:3c:f1:bb:b4:7f:1b:22:f4:b8:33:41:1c:af:66: 30:9f:d6:e0:6d:61:ef:77:67:b7:9a:eb:95:ee:31:c7: 7b:b9:0e:70:7b:66:74:17:f0:29:42:11:4c:f0:cc:55: 9d:52:e4:d3:47:c2:d4:2c:66:30:5b:eb:cb:85:13:76 Fingerprint (SHA-256): 3D:03:25:DB:A1:A7:44:76:29:D8:BE:69:89:78:DD:DF:15:19:4A:33:88:4C:DF:92:E2:01:FC:9D:AA:93:7D:82 Fingerprint (SHA1): 31:B3:A7:12:25:6B:B8:2B:B4:4A:60:FD:E7:C1:0F:04:E0:20:C2:5A Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #303: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #304: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #305: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #306: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:9c:be Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Fri Jan 08 16:15:40 2016 Not After : Fri Apr 08 16:15:40 2016 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:73:4a:51:80:3b:3e:c6:31:b8:d2:c7:c2:cf:cc:8c: d1:ab:f0:ce:11:a7:5b:10:c5:39:a4:51:4c:71:3d:fd: 06:bd:f3:5e:06:62:56:1a:34:a8:0b:fa:20:14:ef:03: 07:e5:5c:6e:f6:91:49:4e:06:c5:fd:f2:5e:65:4c:0e: aa:9c:b6:17:20:ed:10:01:10:2a:f9:a0:0a:f1:00:79: 02:e8:73:1f:da:04:95:c6:2c:77:b1:e9:76:ce:e7:bc: 9e:2c:34:6d:39:4b:a1:db:7f:ec:af:7a:87:61:d0:76: 22:83:6d:60:a2:79:32:8e:63:20:0b:5c:e7:f4:64:e9: 9c:66:d4:3a:84:a6:66:b2:21:cb:ab:0a:1c:46:11:97: 0d:51:03:ce:9d:18:db:9f:c1:71:6b:34:fb:17:fa:d6: 4c:2f:72:4f:b9:a5:fe:b5:6c:19:c8:69:63:f4:fe:f6: c8:ed:e2:2d:06:59:f9:65:47:65:f5:52:cf:41:ab:08: cf:74:32:e0:7b:16:11:37:aa:a9:b2:c5:ac:6e:42:01: c8:53:fe:f4:10:d9:cb:8c:58:a1:11:ea:a8:df:27:85: 62:9a:00:ef:67:71:f1:22:1f:47:3a:83:42:cb:78:1a: d5:d3:61:aa:da:bd:c7:05:6c:b5:26:2a:f6:81:2b:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:9b:1a:58:81:83:79:cd:49:bf:0c:44:86:84:e1:2f: 54:f9:72:e3:22:1f:92:f1:b9:09:a5:dd:29:be:6f:3c: c0:4a:69:53:e0:c7:f9:27:03:95:10:09:9b:38:e4:6a: 77:7d:bf:dd:9b:bb:17:2a:de:a7:ca:dc:f6:01:11:06: 3f:7e:f0:a0:7f:a4:30:31:4d:d7:19:7c:7b:03:fd:c2: 4d:e0:c3:0d:0b:d5:68:c0:8e:24:a6:fc:c1:1b:c0:8c: e3:da:e3:45:a9:00:58:f9:fd:4b:33:95:29:d4:e6:87: 8a:bd:f8:f0:f6:55:48:1b:32:42:ea:78:f8:b2:af:f9: 72:ed:90:03:c0:8a:91:a2:8d:74:64:6e:fe:9d:d0:93: b9:82:2f:e8:65:c1:30:de:f0:27:c1:c5:f3:ce:78:44: 48:a3:3f:a9:9c:67:01:6e:70:ca:2b:21:01:34:d9:fb: ed:91:1d:96:4a:9a:da:d4:40:d6:8e:1c:e8:b0:39:a7: 57:26:4a:8c:1c:80:42:1f:2e:26:aa:07:76:02:b0:ab: d4:30:5c:f0:7a:b0:ff:b4:42:aa:3c:d4:f1:9b:08:ac: 45:97:b1:b0:cb:b7:cb:89:e4:f3:ad:3f:f6:25:b8:ed: 9e:96:df:63:da:1b:eb:d2:7c:89:8d:34:2f:47:32:78 Fingerprint (SHA-256): DF:03:21:1C:7E:D9:2E:02:D2:41:49:06:15:AF:34:F6:7B:A6:B5:AC:B7:EC:23:D9:B8:55:43:CC:E4:BB:BD:FC Fingerprint (SHA1): E1:04:38:C2:64:60:FC:CA:2D:14:44:E0:A8:F6:27:3E:14:90:AE:E4 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #307: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/sanext.der cert.sh: #308: dump extension 2.5.29.17 to file /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #309: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #310: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #311: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #312: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #313: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #314: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:9c:f3 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Fri Jan 08 16:16:15 2016 Not After : Fri Apr 08 16:16:15 2016 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:a5:ad:8e:26:df:0a:cb:64:ee:10:18:52:93:49:51: 93:1c:94:36:2a:42:00:ed:e9:bb:c9:a2:c0:6e:0e:97: 27:47:10:45:86:58:85:85:24:03:72:a0:4a:d3:ac:f9: 80:d0:d5:bd:2f:26:b1:a5:6f:00:24:8d:b9:90:e2:d2: a2:e7:94:af:88:cc:37:1b:6c:b2:7e:0a:3d:a8:9c:d0: f9:1f:39:0a:8f:b3:43:ba:88:1e:4c:1c:96:a1:53:26: 51:74:7d:ce:f7:74:ac:a0:b3:e9:d2:aa:d4:c0:69:ce: 43:3c:53:4d:d8:a7:f4:d2:3a:43:97:5d:bf:cd:0b:a4: df:e7:8f:c7:c8:35:93:8c:a5:84:7c:3c:5b:d8:3d:de: 21:11:b9:5f:96:bf:a9:cb:29:07:a4:ee:e7:6c:71:d9: 7e:22:ee:eb:79:f0:99:9d:17:9f:13:12:09:d6:c9:41: a6:c2:dc:e7:44:f5:03:36:92:5f:50:34:9e:be:9c:19: 9f:74:9a:24:d7:6c:84:9b:4d:6a:01:e0:72:c1:f7:2c: de:32:43:ff:bd:88:7d:88:fa:bf:6f:95:b8:89:c4:ba: 66:66:0e:46:3e:2c:07:b4:64:8f:f2:62:0b:dd:03:93: 1b:07:5e:5a:b9:f9:41:df:01:a7:de:62:b2:8b:ab:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:5e:2b:59:f1:c0:07:ed:36:fb:1e:91:f0:e5:c8:01: d7:29:37:1f:1e:4f:43:37:f2:41:0a:65:68:9b:f1:76: fd:36:be:94:8d:71:8b:e7:0f:c1:10:13:91:10:aa:5e: 11:9b:53:49:b7:4d:7f:07:1e:bf:70:47:b6:f0:33:fd: 76:59:c4:88:6d:18:a3:03:15:66:35:d1:fc:a0:42:7c: 45:a2:46:ce:b1:37:9b:0c:16:04:4d:06:59:2d:2f:44: 80:a5:9f:28:ba:ac:ce:0b:6b:32:d3:5e:7e:cd:46:65: 08:1f:95:a7:4e:9c:df:0e:de:7b:6f:35:7a:89:ca:75: 0d:f1:9a:c0:14:93:b6:e7:a4:eb:01:04:bf:fd:27:56: d3:e2:21:46:92:94:12:43:9c:ab:7f:cb:c4:99:ee:82: 1d:e8:58:84:e8:cf:98:83:41:7b:94:7f:b2:98:2a:c8: 9e:9f:c7:92:e2:2c:90:b3:34:d3:26:c2:07:f7:51:a2: 1c:81:cb:b1:06:7a:b0:4d:54:ef:64:f4:4d:5d:22:1f: 0d:ad:2a:92:9a:37:f3:93:40:c7:a1:11:47:e1:e1:0f: a2:56:83:c3:40:69:14:f7:8a:19:8e:96:df:33:3e:24: 57:2d:a0:90:99:21:6e:14:cf:1f:64:e8:ad:1b:0a:02 Fingerprint (SHA-256): DB:53:27:B4:9D:CE:B9:1A:76:92:1F:AF:A7:96:BB:B7:9C:90:F6:F6:04:30:48:44:6C:C8:26:6A:B8:D1:F4:35 Fingerprint (SHA1): 7C:02:7D:F9:0B:4D:41:BB:38:20:46:38:B1:AD:E0:6E:90:FA:F3:EC Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #315: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #316: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #317: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dbpass -f ../tests.pw cert.sh: #318: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #319: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #320: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dbpass -o root.cert cert.sh: #321: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #322: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #323: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #324: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw cert.sh: #325: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #326: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -i ../CA/TestCA.ca.cert cert.sh: #327: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #328: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #329: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #330: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #331: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #332: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #333: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #334: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #335: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #336: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #337: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #338: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #339: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #340: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #341: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #342: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #343: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #344: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw cert.sh: #345: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #346: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -o root.cert cert.sh: #347: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #348: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #349: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #350: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #351: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #352: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #353: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #354: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #355: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #356: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #357: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #358: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #359: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #360: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #361: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #362: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #363: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #364: perform selftest - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #365: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #366: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #367: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #368: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #369: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #370: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #371: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #372: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #373: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #374: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #375: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #376: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #377: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #378: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #379: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #380: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #381: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #382: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #383: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #384: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #385: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #386: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #387: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #388: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #389: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #390: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #391: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #392: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #393: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #394: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #395: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #396: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #397: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #398: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #399: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #400: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #401: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #402: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #403: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #404: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #405: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #406: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #407: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #408: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #409: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #410: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #411: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #412: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #413: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #414: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #415: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #416: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #417: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #418: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #419: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #420: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #421: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #422: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #423: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #424: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #425: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #426: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #427: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #428: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #429: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #430: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #431: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #432: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #433: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #434: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #435: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #436: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #437: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #438: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #439: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #440: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #441: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #442: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #443: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #444: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #445: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #446: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #447: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #448: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #449: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #450: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #451: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #452: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #453: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #454: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #455: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #456: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #457: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #458: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #459: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #460: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #461: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #462: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #463: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #464: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #465: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #466: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #467: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #468: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #469: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #470: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #471: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #472: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #473: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #474: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #475: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #476: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #477: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #478: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #479: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #480: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #481: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #482: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #483: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #484: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #485: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #486: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #487: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #488: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #489: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #490: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #491: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #492: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #493: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #494: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #495: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #496: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #497: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #498: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #499: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #500: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #501: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #502: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #503: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #504: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #505: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #506: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #507: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #508: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #509: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #510: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #511: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #512: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #513: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #514: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #515: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #516: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #517: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #518: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #519: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #520: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #521: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #522: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #523: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #524: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #525: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #526: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #527: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #528: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #529: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #530: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #531: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #532: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #533: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #534: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #535: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #536: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #537: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #538: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #539: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #540: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #541: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #542: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #543: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #544: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #545: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #546: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #547: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #548: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #549: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #550: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #551: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #552: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #553: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #554: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #555: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #556: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #557: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #558: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #559: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #560: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #561: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #562: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #563: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #564: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #565: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #566: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #567: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #568: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #569: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #570: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #571: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #572: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #573: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #574: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #575: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #576: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Fri Jan 8 11:21:32 EST 2016 Running tests for dbtests TIMESTAMP dbtests BEGIN: Fri Jan 8 11:21:32 EST 2016 dbtests.sh: CERT and Key DB Tests =============================== --------------------------------------------------------------- | test opening the database read/write in a nonexisting directory --------------------------------------------------------------- certutil: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #577: Certutil didn't work in a nonexisting dir 255 - PASSED dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #578: Dbtest readonly didn't work in a nonexisting dir 46 - PASSED --------------------------------------------------------------- | test force opening the database in a nonexisting directory --------------------------------------------------------------- dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtests.sh: #579: Dbtest force succeeded in a nonexisting dir 0 - PASSED --------------------------------------------------------------- | test opening the database readonly in an empty directory --------------------------------------------------------------- tstclnt: unable to open cert database: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #580: Tstclnt didn't work in an empty dir 1 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/emptydir database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/emptydir/key3.db" does not exist. dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #581: Dbtest readonly didn't work in an empty dir 46 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/emptydir dbtests.sh: #582: Dbtest logout after empty DB Init has key - PASSED dbdir selected is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/emptydir dbtests.sh: #583: Dbtest password DB Init maintains needlogin state - PASSED certutil: could not find certificate named "xxxx": SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #584: Certutil didn't work in an empty dir 255 - PASSED --------------------------------------------------------------- | test force opening the database readonly in a empty directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/emptydir database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/emptydir/key3.db" does not exist. dbtests.sh: #585: Dbtest force readonly succeeded in an empty dir 0 - PASSED --------------------------------------------------------------- | test opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/secmod.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/cert8.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/key3.db" is not writeable. dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #586: Dbtest r/w didn't work in an readonly dir 46 - PASSED certutil: could not find certificate named "TestUser": SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #587: Certutil didn't work in an readonly dir 255 - PASSED --------------------------------------------------------------- | test opening the database ronly in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/secmod.db database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/cert8.db database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/key3.db dbtests.sh: #588: Dbtest readonly succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | test force opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/secmod.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/cert8.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/key3.db" is not writeable. dbtests.sh: #589: Dbtest force succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | ls -l /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir --------------------------------------------------------------- dr-xr-xr-x. 2 mockbuild mockbuild 4096 Jan 8 11:21 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir -r--r-----. 1 mockbuild mockbuild 1221 Jan 8 11:21 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/TestUser-dsa.cert -r--r-----. 1 mockbuild mockbuild 1424 Jan 8 11:21 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/TestUser-dsamixed.cert -r--r-----. 1 mockbuild mockbuild 578 Jan 8 11:21 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/TestUser-ec.cert -r--r-----. 1 mockbuild mockbuild 705 Jan 8 11:21 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/TestUser-ecmixed.cert -r--r-----. 1 mockbuild mockbuild 870 Jan 8 11:21 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/TestUser.cert -r--------. 1 mockbuild mockbuild 229376 Jan 8 11:21 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/cert8.db -r--------. 1 mockbuild mockbuild 118784 Jan 8 11:21 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/key3.db -r--r-----. 1 mockbuild mockbuild 392 Jan 8 11:21 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/req -r--------. 1 mockbuild mockbuild 16384 Jan 8 11:21 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ronlydir/secmod.db --------------------------------------------------------------- | test creating a new cert with a conflicting nickname --------------------------------------------------------------- /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/conflictdir certutil: could not add certificate to token or database: SEC_ERROR_ADDING_CERT: Error adding certificate to database. dbtests.sh: #590: Nicknane conflict test, could not import conflict nickname 255 - PASSED --------------------------------------------------------------- | test importing an old cert to a conflicting nickname --------------------------------------------------------------- Certificate: Data: Version: 3 (0x2) Serial Number: 40 (0x28) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:12:17 2016 Not After : Fri Jan 08 16:12:17 2021 Subject: "CN=Bob,E=Bob@bogus.com,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:30:fb:8c:5d:04:8a:91:f5:81:1c:20:00:56:0d:92: c1:75:b1:04:6b:69:ce:04:80:1e:61:37:0d:d7:3b:8c: 6b:f9:c6:ff:8a:87:bb:5b:36:af:3c:b4:b9:ba:75:c1: 8f:46:f4:00:7f:6f:24:b1:71:07:59:ec:38:6a:32:34: 45:e8:46:e2:5f:40:15:18:7d:b0:a9:15:bd:87:18:9c: b3:84:44:f5:67:a1:38:81:6f:bc:4f:f0:7e:e8:2e:63: b2:ef:6d:63:b4:03:56:db:af:48:4d:54:5e:cd:df:45: 4f:af:7c:0a:84:a9:5a:c2:82:d2:21:81:b4:fd:27:bd: e2:a5:81:74:7f:02:73:aa:fd:d3:ee:0c:55:20:bf:b7: ca:77:b6:a1:68:fa:eb:bd:21:d5:cf:1c:5b:2e:40:8b: a1:4d:42:af:d0:08:49:99:74:87:42:d3:43:f8:ec:49: 2a:c0:84:6b:ca:92:d4:5e:f3:31:78:a0:f3:9b:21:ee: 0f:e3:04:7d:b1:28:ca:6a:2d:48:25:38:8b:96:11:b0: ed:fa:6a:5d:2e:84:6d:6b:52:53:1a:d8:ec:e2:f9:71: 49:84:5c:4b:3d:46:a4:cf:42:6e:b9:f0:bf:fc:b9:69: 17:b3:4d:50:73:76:37:a7:3b:95:e4:07:87:4f:94:8b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b0:43:0d:19:7f:20:bb:5c:29:77:75:fa:49:e0:fb:d5: ff:3d:5d:68:22:4f:74:f9:0c:4f:7a:a7:d2:47:97:df: f0:7d:31:f9:24:3f:7e:bb:00:d5:7e:57:f1:32:8e:90: 6a:1b:97:53:23:3b:54:4b:fe:a0:d3:20:f0:ab:bb:36: 2b:cf:cd:6b:2e:5c:c4:9e:f7:0b:96:24:64:3b:0d:28: de:e7:8d:cf:75:8e:77:08:59:3b:a4:8a:8a:cf:4c:6c: 70:68:76:2e:72:f9:66:f6:3f:77:df:dd:7d:89:64:50: c4:eb:c8:80:28:b8:37:f7:5d:22:f9:f7:90:78:89:6f: 70:32:2a:ac:22:d8:f4:b0:96:d0:49:3d:c6:ab:8f:fc: 36:2b:dd:be:e4:f3:13:2c:c3:c6:6d:1f:1c:ae:36:a7: 10:a8:69:d9:a2:20:28:12:a9:d7:d7:de:6b:b4:76:9e: 25:97:2f:9a:77:f6:90:d6:a4:fe:f1:b9:1c:75:db:bd: 44:d8:41:75:b2:86:f7:56:26:5d:79:26:11:4b:57:cc: dc:52:28:2e:55:7a:f7:21:89:4b:a4:bf:ef:93:f6:f9: c5:ce:0b:2a:94:a6:dd:5a:91:7b:be:2a:db:37:20:f5: 9f:5e:18:21:c3:84:51:a5:28:53:0b:51:9e:8a:19:c2 Fingerprint (SHA-256): BD:29:70:5E:D3:00:D2:14:57:7D:D1:28:AB:AF:8D:E5:F4:2E:C8:95:6B:8C:B7:BA:A5:0F:18:2F:90:B0:51:08 Fingerprint (SHA1): F8:78:6D:5A:F1:D3:C0:FA:E9:E5:45:20:38:73:77:17:AA:91:60:3D Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: dbtests.sh: #591: Nicknane conflict test-setting nickname conflict was correctly rejected - PASSED TIMESTAMP dbtests END: Fri Jan 8 11:21:42 EST 2016 Running tests for tools TIMESTAMP tools BEGIN: Fri Jan 8 11:21:42 EST 2016 tools.sh: Tools Tests with ECC =============================== tools.sh: Exporting Alice's email cert & key - default ciphers tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #592: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7d:62:cc:23:80:05:26:13:ea:6a:9f:4e:27:93:6c:fc Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #593: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #594: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #595: Exporting Alice's email EC cert & key (pk12util -o) - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #596: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 14:30:70:f3:f1:8b:44:da:7b:3c:90:f2:ee:af:15:ce Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Fri Jan 08 16:08:49 2016 Not After : Fri Jan 08 16:08:49 2066 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:00:33:ca:31:22:f4:d8:f3:2b:30:08:a1:25:5e:3a: 18:7c:1d:c9:69:df:75:c9:0d:71:89:9d:69:14:d2:a1: 71:12:e3:7b:b0:ac:48:21:c6:2a:a8:29:1e:bc:39:db: 65:5e:d1:c6:96:a0:d5:c7:ca:0b:77:7b:d4:2f:d0:27: 12:c7:f6:00:a1:e5:86:fd:1b:de:e8:68:cc:ef:d8:f3: 10:11:7b:58:70:c1:f1:24:8a:de:c4:30:1d:66:95:41: 92:1d:a7:36:5d:0e:80:29:00:ea:1d:dc:07:5b:d6:0d: 74:bc:ec:9b:a6:7c:b0:48:1f:f2:f5:5d:0f:6c:8b:fd: 84:81:cd:9e:1d Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:88:02:42:01:5c:61:a4:70:42:78:d0:87:f5:1b: 83:bb:f5:d2:14:4d:f5:61:02:ae:6d:d1:e1:54:17:b8: c0:26:d4:b7:5a:64:ad:18:c2:d6:82:08:62:7f:87:61: 92:69:fd:1e:ff:5e:66:ae:42:06:23:d1:a6:3f:37:5d: f8:84:aa:ec:8a:8f:16:02:42:01:aa:66:00:3d:e1:e2: cc:bf:68:78:eb:ba:57:0f:ba:7c:16:4a:0c:a5:55:1a: 75:ff:c7:06:31:b4:fe:36:ed:f9:83:bc:0d:80:f5:b2: 01:d4:79:13:43:de:ad:86:93:e7:6e:63:04:b0:30:91: 46:b5:18:c3:c0:c3:02:25:a5:23:2e Fingerprint (SHA-256): 38:A0:E0:69:B5:86:9F:1D:18:9B:72:F6:11:41:CE:5A:E1:B8:5A:E3:96:97:5B:A8:0E:35:FE:E6:88:1B:43:8A Fingerprint (SHA1): 55:8A:95:FF:7E:05:37:B0:2A:2E:E8:27:3E:90:23:E3:E8:5C:70:35 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Fri Jan 08 16:12:03 2016 Not After : Fri Jan 08 16:12:03 2021 Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:3a:39:13:5d:9b:d6:b2:b2:28:32:e5:b6:74:34:d9: e2:b4:18:fb:c7:e9:cb:ef:24:bd:b8:27:f6:60:0e:24: 02:1d:84:b3:03:2e:c2:fe:5f:02:95:5d:70:29:bf:1c: 36:cc:a3:d8:76:59:f4:9d:b3:90:e8:f6:05:90:82:17: 6f:02:4b:97:db:31:f2:4b:71:ee:84:6e:8d:33:ba:19: b8:b3:10:09:b0:3b:c9:ea:63:f2:1c:4e:3c:19:cd:c6: 6b Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:88:02:42:00:ca:bd:de:bb:50:c3:69:7b:a6:f7: 1f:8a:1c:f5:1f:4c:b7:38:23:28:d6:8b:7c:21:b3:07: e9:84:01:3e:17:a9:e6:fd:62:8d:53:20:04:a5:44:af: ef:15:82:e7:57:91:27:7a:c0:52:44:47:5d:e0:0f:f3: 1c:d8:f1:0b:ae:46:c7:02:42:01:62:d9:a8:1f:b3:c0: b6:61:91:f4:68:e7:57:63:60:5c:c5:34:62:2b:14:19: ee:78:b9:54:c7:1d:20:cc:d3:79:ac:88:fa:e7:8e:18: 69:ac:61:85:16:49:b8:b1:5e:ae:18:28:d1:3b:52:fb: 8a:90:7a:67:b4:2a:34:7c:e0:de:2b Fingerprint (SHA-256): E3:93:0D:FE:24:E2:7C:3F:F7:58:FB:3C:83:BA:01:BE:39:60:32:5F:BF:4C:D3:FC:30:C1:4F:AF:80:F8:4C:31 Fingerprint (SHA1): 0D:1A:20:64:03:3F:AB:DA:5E:EA:B2:86:F2:25:0E:E3:89:99:59:6C Friendly Name: Alice-ec tools.sh: #597: Listing Alice's pk12 EC file (pk12util -l) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #598: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 6d:2e:3b:59:ed:5c:2b:d6:6f:12:22:5c:9d:2d:8e:b5 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #599: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #600: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #601: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 09:13:bc:eb:90:5c:b2:d9:53:3f:49:95:8b:3d:03:8d Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #602: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #603: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #604: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: d9:e0:a2:35:29:f6:32:a5:23:ca:18:88:ad:22:85:03 Iteration Count: 2000 (0x7d0) tools.sh: #605: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #606: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #607: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b1:f5:28:72:08:9c:55:99:37:6a:45:9c:c7:af:d5:17 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #608: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #609: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #610: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5b:ce:fd:e7:c0:50:41:5c:00:48:d4:84:1e:0a:5f:c7 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #611: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #612: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #613: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: db:27:b2:06:fb:0b:8a:2b:ce:94:a7:7a:ca:87:c3:a8 Iteration Count: 2000 (0x7d0) tools.sh: #614: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #615: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #616: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 72:da:17:01:df:bb:b7:04:36:8a:14:f3:d7:56:88:4e Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:6c:72:ad:da:ce:5b:cc:5a:a9:26:36:cf:59:36: 5c:5b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #617: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #618: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #619: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b4:db:24:4e:ec:c7:82:88:2d:d4:d9:96:7e:d6:dc:a1 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:21:f6:80:27:57:d4:6b:b4:94:9e:88:8c:cb:b2: df:aa Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #620: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #621: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #622: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a4:ac:e4:77:e8:08:d7:cc:e5:6b:e8:6c:1c:2b:34:7e Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:f3:1d:a7:51:40:e9:11:65:53:76:b6:b8:1a:b7: 72:43 tools.sh: #623: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #624: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #625: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b6:ea:63:93:77:37:96:8e:a3:df:75:08:ff:b9:e8:40 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:be:7a:86:08:90:d8:33:08:66:a0:df:82:ab:b3: bb:cf Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #626: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #627: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #628: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 12:86:9e:31:e7:c1:1d:30:22:7d:6f:1f:ca:e2:31:d9 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:11:6b:d6:02:05:db:75:fb:3c:a1:a0:81:6a:4a: f5:be Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #629: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #630: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #631: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 79:65:04:ce:6a:6d:3f:ec:62:ed:65:d0:96:51:49:0a Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:52:f8:a8:b5:03:93:71:bf:72:cf:85:82:b9:98: c8:8b tools.sh: #632: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #633: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #634: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e7:58:b4:8c:05:68:24:5b:5c:72:9d:d3:86:aa:75:a2 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:c6:28:f2:11:3c:2a:e9:03:0d:0c:ab:53:67:95: 03:93 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #635: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #636: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #637: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 90:15:87:a4:f4:48:9b:1e:71:26:e0:94:b3:73:1f:09 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:96:8d:b6:a2:29:22:3b:6a:bd:d7:e9:94:c9:31: 93:10 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #638: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #639: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #640: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a9:f3:b2:86:5a:78:fd:a1:45:7d:40:10:06:f2:f8:ea Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:9d:2d:52:63:02:4a:e2:08:09:f5:4c:27:e4:9e: 87:85 tools.sh: #641: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #642: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #643: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1a:b8:b6:4a:08:49:50:bc:e0:26:a6:30:2f:54:3f:30 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:16:b0:aa:3f:89:c1:a3:f0:02:8d:56:99:3f:f7: 28:dd Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #644: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #645: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #646: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 54:1a:00:94:11:b1:b2:2d:39:3c:d5:db:93:e1:9b:42 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:60:c4:c2:bb:f7:a3:fe:4f:83:9a:ec:82:29:10: 20:b1 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #647: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #648: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #649: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fb:3e:9f:f1:a8:bb:4f:b0:67:74:b6:0a:42:e5:5e:39 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:ec:dc:c4:d2:85:2e:c0:f1:8d:39:ba:0c:04:98: e9:50 tools.sh: #650: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #651: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #652: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fd:d3:51:d9:d3:e7:95:a1:44:0d:d4:4d:0b:b3:76:de Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:20:c6:65:d3:24:7d:cc:8f:18:18:78:78:af:d1: 7c:ea Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #653: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #654: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #655: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4e:af:44:d8:73:5e:b3:9a:c0:af:97:b7:59:db:ae:ce Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:0d:44:bc:2c:5f:17:90:d6:d5:a8:60:62:e9:ae: de:07 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #656: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #657: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #658: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b9:0d:58:23:d1:2d:0f:57:ea:aa:f6:3d:d0:a6:f8:07 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:16:d9:c0:59:a8:ed:f8:aa:81:d0:2c:ae:d8:f9: 6f:9c tools.sh: #659: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #660: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #661: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0d:50:6a:d4:67:a2:ad:ee:55:7f:bc:95:a2:d3:26:fd Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:6d:07:28:36:7b:c9:a3:ee:48:df:2e:20:a7:9f: 4b:aa Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #662: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #663: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #664: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d0:07:02:3d:83:40:b7:11:c0:78:c7:76:bf:40:ee:46 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:04:9a:c4:6c:ca:8b:5e:43:99:15:00:37:d9:e7: df:11 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #665: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #666: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #667: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: de:1e:fc:4b:15:09:34:6a:79:c5:54:6c:71:86:21:db Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:29:50:a5:8d:63:77:71:70:a5:fb:68:ad:e7:97: 61:26 tools.sh: #668: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #669: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #670: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 46:5c:ed:f8:9c:54:0a:5c:0c:71:38:47:33:2b:14:9d Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #671: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #672: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #673: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 1b:87:b9:db:d2:d4:b3:e5:68:4c:12:ff:e8:33:20:8a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #674: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #675: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #676: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: b2:68:e8:1d:93:b5:4b:0c:dc:7a:1f:90:34:d9:d3:cb Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #677: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #678: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #679: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 06:69:48:2d:43:d3:1d:8c:e0:6d:de:5d:6d:2d:e4:b1 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #680: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #681: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #682: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: a2:43:b3:73:d1:bc:92:4b:10:2b:03:d8:2f:1d:22:56 Iteration Count: 2000 (0x7d0) tools.sh: #683: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #684: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #685: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 63:a8:0d:9b:08:0d:79:e2:a7:f7:ea:61:89:c3:c5:92 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #686: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #687: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #688: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 22:88:dc:45:f2:86:9e:d6:55:a9:82:74:96:6f:63:6d Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #689: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #690: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #691: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: cf:09:3b:c4:8a:e7:a9:ce:6a:d2:b6:3b:fa:e9:20:47 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #692: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #693: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #694: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: fc:5b:8e:60:a3:bb:45:e7:c0:27:db:5f:d0:75:de:6a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #695: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #696: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #697: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 40:4c:19:d4:0a:05:57:87:63:5c:e7:fd:2e:23:26:eb Iteration Count: 2000 (0x7d0) tools.sh: #698: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #699: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #700: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 2d:cf:e5:e9:19:d6:cf:1a:4d:51:8b:73:89:5c:d9:ea Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #701: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #702: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #703: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 9f:28:d8:7f:f6:30:d1:23:07:7a:74:6a:32:cd:29:8a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #704: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #705: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #706: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: f3:75:32:5e:6d:df:d9:5a:74:b0:c6:83:bf:12:04:43 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #707: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #708: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #709: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 43:2e:17:e3:dd:ea:49:b3:75:63:cd:5b:c9:a9:73:84 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #710: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #711: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #712: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 51:66:d0:91:9e:ca:d2:b2:3e:8a:80:21:6e:56:00:aa Iteration Count: 2000 (0x7d0) tools.sh: #713: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #714: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #715: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 94:0a:b0:81:97:dc:7a:8d:50:a3:db:4c:fa:24:f6:7a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #716: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #717: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #718: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 91:f9:e1:af:43:d1:3d:3d:19:91:f3:45:e7:11:a3:58 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #719: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #720: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #721: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6d:d7:ab:48:d9:7b:b3:7b:c9:06:84:4f:77:21:55:55 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #722: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #723: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #724: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e4:26:67:ab:e3:a3:5b:98:54:82:2a:cd:1b:5e:4b:dd Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #725: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #726: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:null] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #727: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7d:cb:b2:fe:dd:9c:fb:37:c4:4a:ea:ab:3a:01:87:53 Iteration Count: 2000 (0x7d0) tools.sh: #728: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #729: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #730: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 73:9e:7b:fd:11:d8:a9:87:4e:29:31:94:12:2e:3a:f8 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #731: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #732: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #733: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ac:1f:9a:7b:4e:b9:b1:ef:00:46:c0:a1:b8:cf:99:75 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #734: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #735: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #736: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b1:ce:9d:c9:4b:a8:ac:d7:f9:c8:d4:2e:cf:8b:3d:c2 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #737: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #738: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #739: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a4:13:9c:00:7d:e3:19:a0:9e:98:27:0f:45:8e:cf:da Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #740: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #741: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #742: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f9:3d:15:1e:12:28:1f:92:70:64:3e:52:05:d3:3d:ba Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #743: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #744: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #745: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fc:06:c2:1b:6f:f6:8a:1a:b7:0a:3b:20:4e:c3:d9:04 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #746: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #747: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #748: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c6:30:13:2b:78:21:0a:0e:e7:3c:60:bf:c0:b3:c2:16 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #749: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #750: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #751: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 79:23:de:08:01:8f:5d:9c:f2:98:03:6a:8d:d1:7e:f3 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #752: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #753: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #754: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5a:43:bd:64:9a:15:a3:ea:b4:db:0f:34:4e:fe:4e:0c Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #755: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #756: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #757: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: de:f5:3c:db:12:c1:5a:23:27:91:bb:46:80:2c:97:55 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #758: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #759: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c null pk12util: Algorithm: "null": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #760: Exporting with [null:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #761: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #762: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 32%) tree "../tools/html" signed successfully tools.sh: #763: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #764: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #765: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html --> signjs.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #766: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #767: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #768: Show who signed xpi (signtool -w) - PASSED TIMESTAMP tools END: Fri Jan 8 11:23:14 EST 2016 Running tests for fips TIMESTAMP fips BEGIN: Fri Jan 8 11:23:14 EST 2016 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. fips.sh: #769: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #770: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa ab2a0abf9f9504c1fd8c065c82a6a7604f1f248d NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #771: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #772: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #773: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #774: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #775: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #776: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #777: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #778: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #779: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #780: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #781: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa ab2a0abf9f9504c1fd8c065c82a6a7604f1f248d FIPS_PUB_140_Test_Certificate fips.sh: #782: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #783: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #784: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #785: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #786: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa ab2a0abf9f9504c1fd8c065c82a6a7604f1f248d FIPS_PUB_140_Test_Certificate fips.sh: #787: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 106. **** **** ALL TESTS PASSED **** fips.sh: #788: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 104. **** **** ALL TESTS PASSED **** fips.sh: #789: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle/libsoftokn3.so -o -8 -b 5 cp /usr/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle Changing byte 0x00032fe4 (208868): from 01 (1) to 21 (33) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/fips/mangle dbtest -r -d ../fips fips.sh: #790: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Fri Jan 8 11:24:10 EST 2016 Running tests for sdr TIMESTAMP sdr BEGIN: Fri Jan 8 11:24:10 EST 2016 sdr.sh: SDR Tests =============================== sdr.sh: Creating an SDR key/SDR Encrypt - Value 1 sdrtest -d . -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests.v1.27064 -t "Test1" sdr.sh: #791: Creating SDR Key/Encrypt - Value 1 - PASSED sdr.sh: SDR Encrypt - Value 2 sdrtest -d . -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests.v2.27064 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #792: Encrypt - Value 2 - PASSED sdr.sh: SDR Encrypt - Value 3 sdrtest -d . -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests.v3.27064 -t "1234567" sdr.sh: #793: Encrypt - Value 3 - PASSED sdr.sh: SDR Decrypt - Value 1 sdrtest -d . -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests.v1.27064 -t "Test1" sdr.sh: #794: Decrypt - Value 1 - PASSED sdr.sh: SDR Decrypt - Value 2 sdrtest -d . -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests.v2.27064 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #795: Decrypt - Value 2 - PASSED sdr.sh: SDR Decrypt - Value 3 sdrtest -d . -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests.v3.27064 -t "1234567" sdr.sh: #796: Decrypt - Value 3 - PASSED TIMESTAMP sdr END: Fri Jan 8 11:24:13 EST 2016 Running tests for crmf TIMESTAMP crmf BEGIN: Fri Jan 8 11:24:13 EST 2016 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #797: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #798: CMMF test . - PASSED TIMESTAMP crmf END: Fri Jan 8 11:24:14 EST 2016 Running tests for smime TIMESTAMP smime BEGIN: Fri Jan 8 11:24:14 EST 2016 smime.sh: S/MIME Tests with ECC =============================== smime.sh: Signing Detached Message {SHA1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #799: Create Detached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #800: Verifying Alice's Detached Signature (SHA1) . - PASSED smime.sh: Signing Attached Message (SHA1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #801: Create Attached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1 smime.sh: #802: Decode Alice's Attached Signature (SHA1) . - PASSED diff alice.txt alice.data.SHA1 smime.sh: #803: Compare Attached Signed Data and Original (SHA1) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA1} ------------------ cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1 smime.sh: #804: Create Detached Signature Alice (ECDSA w/ SHA1) . - PASSED cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #805: Verifying Alice's Detached Signature (ECDSA w/ SHA1) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA1) ------------------ cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1 smime.sh: #806: Create Attached Signature Alice (ECDSA w/ SHA1) . - PASSED cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.SHA1 smime.sh: #807: Decode Alice's Attached Signature (ECDSA w/ SHA1) . - PASSED diff alice.txt alice-ec.data.SHA1 smime.sh: #808: Compare Attached Signed Data and Original (ECDSA w/ SHA1) . - PASSED smime.sh: Signing Detached Message {SHA256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #809: Create Detached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #810: Verifying Alice's Detached Signature (SHA256) . - PASSED smime.sh: Signing Attached Message (SHA256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #811: Create Attached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256 smime.sh: #812: Decode Alice's Attached Signature (SHA256) . - PASSED diff alice.txt alice.data.SHA256 smime.sh: #813: Compare Attached Signed Data and Original (SHA256) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA256} ------------------ cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256 smime.sh: #814: Create Detached Signature Alice (ECDSA w/ SHA256) . - PASSED cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #815: Verifying Alice's Detached Signature (ECDSA w/ SHA256) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA256) ------------------ cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256 smime.sh: #816: Create Attached Signature Alice (ECDSA w/ SHA256) . - PASSED cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.SHA256 smime.sh: #817: Decode Alice's Attached Signature (ECDSA w/ SHA256) . - PASSED diff alice.txt alice-ec.data.SHA256 smime.sh: #818: Compare Attached Signed Data and Original (ECDSA w/ SHA256) . - PASSED smime.sh: Signing Detached Message {SHA384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #819: Create Detached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #820: Verifying Alice's Detached Signature (SHA384) . - PASSED smime.sh: Signing Attached Message (SHA384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #821: Create Attached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384 smime.sh: #822: Decode Alice's Attached Signature (SHA384) . - PASSED diff alice.txt alice.data.SHA384 smime.sh: #823: Compare Attached Signed Data and Original (SHA384) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA384} ------------------ cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384 smime.sh: #824: Create Detached Signature Alice (ECDSA w/ SHA384) . - PASSED cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #825: Verifying Alice's Detached Signature (ECDSA w/ SHA384) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA384) ------------------ cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384 smime.sh: #826: Create Attached Signature Alice (ECDSA w/ SHA384) . - PASSED cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.SHA384 smime.sh: #827: Decode Alice's Attached Signature (ECDSA w/ SHA384) . - PASSED diff alice.txt alice-ec.data.SHA384 smime.sh: #828: Compare Attached Signed Data and Original (ECDSA w/ SHA384) . - PASSED smime.sh: Signing Detached Message {SHA512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #829: Create Detached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #830: Verifying Alice's Detached Signature (SHA512) . - PASSED smime.sh: Signing Attached Message (SHA512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #831: Create Attached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512 smime.sh: #832: Decode Alice's Attached Signature (SHA512) . - PASSED diff alice.txt alice.data.SHA512 smime.sh: #833: Compare Attached Signed Data and Original (SHA512) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA512} ------------------ cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512 smime.sh: #834: Create Detached Signature Alice (ECDSA w/ SHA512) . - PASSED cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #835: Verifying Alice's Detached Signature (ECDSA w/ SHA512) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA512) ------------------ cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512 smime.sh: #836: Create Attached Signature Alice (ECDSA w/ SHA512) . - PASSED cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.SHA512 smime.sh: #837: Decode Alice's Attached Signature (ECDSA w/ SHA512) . - PASSED diff alice.txt alice-ec.data.SHA512 smime.sh: #838: Compare Attached Signed Data and Original (ECDSA w/ SHA512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #839: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #840: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #841: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@bogus.com,dave@bogus.com smime.sh: #842: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@bogus.net smime.sh: #843: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #844: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #845: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #846: Decrypt with a Multiple Email cert . - PASSED smime.sh: #847: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #848: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #849: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \ -d ../alicedir > co.der smime.sh: #850: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #851: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@bogus.com" > alice.enc smime.sh: #852: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #853: Decode Encrypted-Data . - PASSED smime.sh: #854: Compare Decoded and Original Data . - PASSED smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #855: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice.env -o alice_p7.data smime.sh: #856: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #857: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #858: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #859: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Fri Jan 8 11:24:43 EST 2016 Running tests for ssl TIMESTAMP ssl BEGIN: Fri Jan 8 11:24:43 EST 2016 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:24:43 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:24:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:24:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #860: Waiting for Server - FAILED kill -0 4338 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4338 found at Fri Jan 8 11:24:49 EST 2016 selfserv_9159 with PID 4338 started at Fri Jan 8 11:24:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #861: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4338 at Fri Jan 8 11:24:49 EST 2016 kill -USR1 4338 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4338 killed at Fri Jan 8 11:24:50 EST 2016 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:24:50 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:24:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:24:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #862: Waiting for Server - FAILED kill -0 4408 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4408 found at Fri Jan 8 11:24:56 EST 2016 selfserv_9159 with PID 4408 started at Fri Jan 8 11:24:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #863: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4408 at Fri Jan 8 11:24:56 EST 2016 kill -USR1 4408 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4408 killed at Fri Jan 8 11:24:57 EST 2016 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:24:57 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:24:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:25:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #864: Waiting for Server - FAILED kill -0 4476 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4476 found at Fri Jan 8 11:25:03 EST 2016 selfserv_9159 with PID 4476 started at Fri Jan 8 11:25:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #865: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4476 at Fri Jan 8 11:25:03 EST 2016 kill -USR1 4476 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4476 killed at Fri Jan 8 11:25:04 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:25:04 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:25:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:25:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #866: Waiting for Server - FAILED kill -0 4557 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4557 found at Fri Jan 8 11:25:10 EST 2016 selfserv_9159 with PID 4557 started at Fri Jan 8 11:25:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #867: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4557 at Fri Jan 8 11:25:10 EST 2016 kill -USR1 4557 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4557 killed at Fri Jan 8 11:25:11 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:25:11 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:25:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:25:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #868: Waiting for Server - FAILED kill -0 4626 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4626 found at Fri Jan 8 11:25:17 EST 2016 selfserv_9159 with PID 4626 started at Fri Jan 8 11:25:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #869: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4626 at Fri Jan 8 11:25:17 EST 2016 kill -USR1 4626 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4626 killed at Fri Jan 8 11:25:17 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:25:18 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:25:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:25:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #870: Waiting for Server - FAILED kill -0 4694 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4694 found at Fri Jan 8 11:25:23 EST 2016 selfserv_9159 with PID 4694 started at Fri Jan 8 11:25:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #871: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4694 at Fri Jan 8 11:25:24 EST 2016 kill -USR1 4694 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4694 killed at Fri Jan 8 11:25:24 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:25:24 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:25:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:25:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #872: Waiting for Server - FAILED kill -0 4774 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4774 found at Fri Jan 8 11:25:30 EST 2016 selfserv_9159 with PID 4774 started at Fri Jan 8 11:25:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #873: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 4774 at Fri Jan 8 11:25:31 EST 2016 kill -USR1 4774 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4774 killed at Fri Jan 8 11:25:31 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:25:31 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:25:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:25:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #874: Waiting for Server - FAILED kill -0 4843 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4843 found at Fri Jan 8 11:25:37 EST 2016 selfserv_9159 with PID 4843 started at Fri Jan 8 11:25:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #875: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4843 at Fri Jan 8 11:25:38 EST 2016 kill -USR1 4843 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4843 killed at Fri Jan 8 11:25:38 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:25:38 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:25:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:25:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #876: Waiting for Server - FAILED kill -0 4911 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4911 found at Fri Jan 8 11:25:44 EST 2016 selfserv_9159 with PID 4911 started at Fri Jan 8 11:25:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #877: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 4911 at Fri Jan 8 11:25:45 EST 2016 kill -USR1 4911 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4911 killed at Fri Jan 8 11:25:45 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:25:45 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:25:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:25:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #878: Waiting for Server - FAILED kill -0 4991 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4991 found at Fri Jan 8 11:25:51 EST 2016 selfserv_9159 with PID 4991 started at Fri Jan 8 11:25:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #879: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 4991 at Fri Jan 8 11:25:52 EST 2016 kill -USR1 4991 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4991 killed at Fri Jan 8 11:25:52 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:25:52 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:25:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:25:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #880: Waiting for Server - FAILED kill -0 5060 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5060 found at Fri Jan 8 11:25:58 EST 2016 selfserv_9159 with PID 5060 started at Fri Jan 8 11:25:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #881: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 5060 at Fri Jan 8 11:25:58 EST 2016 kill -USR1 5060 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5060 killed at Fri Jan 8 11:25:59 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:25:59 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:25:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:26:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #882: Waiting for Server - FAILED kill -0 5128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5128 found at Fri Jan 8 11:26:05 EST 2016 selfserv_9159 with PID 5128 started at Fri Jan 8 11:26:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #883: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 5128 at Fri Jan 8 11:26:05 EST 2016 kill -USR1 5128 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5128 killed at Fri Jan 8 11:26:06 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:26:06 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:26:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:26:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #884: Waiting for Server - FAILED kill -0 5208 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5208 found at Fri Jan 8 11:26:12 EST 2016 selfserv_9159 with PID 5208 started at Fri Jan 8 11:26:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #885: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 5208 at Fri Jan 8 11:26:12 EST 2016 kill -USR1 5208 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5208 killed at Fri Jan 8 11:26:13 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:26:13 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:26:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:26:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #886: Waiting for Server - FAILED kill -0 5277 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5277 found at Fri Jan 8 11:26:19 EST 2016 selfserv_9159 with PID 5277 started at Fri Jan 8 11:26:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #887: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 5277 at Fri Jan 8 11:26:19 EST 2016 kill -USR1 5277 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5277 killed at Fri Jan 8 11:26:20 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:26:20 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:26:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:26:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #888: Waiting for Server - FAILED kill -0 5345 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5345 found at Fri Jan 8 11:26:26 EST 2016 selfserv_9159 with PID 5345 started at Fri Jan 8 11:26:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #889: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 5345 at Fri Jan 8 11:26:26 EST 2016 kill -USR1 5345 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5345 killed at Fri Jan 8 11:26:26 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:26:27 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:26:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:26:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #890: Waiting for Server - FAILED kill -0 5425 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5425 found at Fri Jan 8 11:26:32 EST 2016 selfserv_9159 with PID 5425 started at Fri Jan 8 11:26:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #891: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 5425 at Fri Jan 8 11:26:33 EST 2016 kill -USR1 5425 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5425 killed at Fri Jan 8 11:26:33 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:26:33 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:26:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:26:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #892: Waiting for Server - FAILED kill -0 5494 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5494 found at Fri Jan 8 11:26:39 EST 2016 selfserv_9159 with PID 5494 started at Fri Jan 8 11:26:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #893: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 5494 at Fri Jan 8 11:26:40 EST 2016 kill -USR1 5494 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5494 killed at Fri Jan 8 11:26:40 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:26:40 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:26:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:26:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #894: Waiting for Server - FAILED kill -0 5562 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5562 found at Fri Jan 8 11:26:46 EST 2016 selfserv_9159 with PID 5562 started at Fri Jan 8 11:26:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #895: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 5562 at Fri Jan 8 11:26:47 EST 2016 kill -USR1 5562 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5562 killed at Fri Jan 8 11:26:47 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:26:47 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:26:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:26:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #896: Waiting for Server - FAILED kill -0 5642 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5642 found at Fri Jan 8 11:26:53 EST 2016 selfserv_9159 with PID 5642 started at Fri Jan 8 11:26:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #897: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 5642 at Fri Jan 8 11:26:54 EST 2016 kill -USR1 5642 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5642 killed at Fri Jan 8 11:26:54 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:26:54 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:26:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:27:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #898: Waiting for Server - FAILED kill -0 5711 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5711 found at Fri Jan 8 11:27:00 EST 2016 selfserv_9159 with PID 5711 started at Fri Jan 8 11:27:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #899: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 5711 at Fri Jan 8 11:27:01 EST 2016 kill -USR1 5711 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5711 killed at Fri Jan 8 11:27:01 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:27:01 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:27:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:27:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #900: Waiting for Server - FAILED kill -0 5779 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5779 found at Fri Jan 8 11:27:07 EST 2016 selfserv_9159 with PID 5779 started at Fri Jan 8 11:27:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #901: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 5779 at Fri Jan 8 11:27:08 EST 2016 kill -USR1 5779 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5779 killed at Fri Jan 8 11:27:08 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:27:08 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:27:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:27:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #902: Waiting for Server - FAILED kill -0 5859 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5859 found at Fri Jan 8 11:27:14 EST 2016 selfserv_9159 with PID 5859 started at Fri Jan 8 11:27:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #903: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 5859 at Fri Jan 8 11:27:14 EST 2016 kill -USR1 5859 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5859 killed at Fri Jan 8 11:27:15 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:27:15 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:27:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:27:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #904: Waiting for Server - FAILED kill -0 5928 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5928 found at Fri Jan 8 11:27:21 EST 2016 selfserv_9159 with PID 5928 started at Fri Jan 8 11:27:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #905: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 5928 at Fri Jan 8 11:27:21 EST 2016 kill -USR1 5928 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5928 killed at Fri Jan 8 11:27:22 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:27:22 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:27:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:27:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #906: Waiting for Server - FAILED kill -0 5996 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5996 found at Fri Jan 8 11:27:28 EST 2016 selfserv_9159 with PID 5996 started at Fri Jan 8 11:27:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #907: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 5996 at Fri Jan 8 11:27:28 EST 2016 kill -USR1 5996 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5996 killed at Fri Jan 8 11:27:29 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:27:29 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:27:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:27:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #908: Waiting for Server - FAILED kill -0 6076 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6076 found at Fri Jan 8 11:27:35 EST 2016 selfserv_9159 with PID 6076 started at Fri Jan 8 11:27:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #909: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 6076 at Fri Jan 8 11:27:35 EST 2016 kill -USR1 6076 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6076 killed at Fri Jan 8 11:27:36 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:27:36 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:27:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:27:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #910: Waiting for Server - FAILED kill -0 6145 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6145 found at Fri Jan 8 11:27:42 EST 2016 selfserv_9159 with PID 6145 started at Fri Jan 8 11:27:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #911: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 6145 at Fri Jan 8 11:27:42 EST 2016 kill -USR1 6145 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6145 killed at Fri Jan 8 11:27:42 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:27:43 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:27:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:27:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #912: Waiting for Server - FAILED kill -0 6213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6213 found at Fri Jan 8 11:27:48 EST 2016 selfserv_9159 with PID 6213 started at Fri Jan 8 11:27:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #913: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 6213 at Fri Jan 8 11:27:49 EST 2016 kill -USR1 6213 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6213 killed at Fri Jan 8 11:27:49 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:27:49 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:27:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:27:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #914: Waiting for Server - FAILED kill -0 6293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6293 found at Fri Jan 8 11:27:55 EST 2016 selfserv_9159 with PID 6293 started at Fri Jan 8 11:27:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #915: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 6293 at Fri Jan 8 11:27:56 EST 2016 kill -USR1 6293 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6293 killed at Fri Jan 8 11:27:56 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:27:56 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:27:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:28:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #916: Waiting for Server - FAILED kill -0 6362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6362 found at Fri Jan 8 11:28:02 EST 2016 selfserv_9159 with PID 6362 started at Fri Jan 8 11:28:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #917: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 6362 at Fri Jan 8 11:28:03 EST 2016 kill -USR1 6362 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6362 killed at Fri Jan 8 11:28:03 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:28:03 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:28:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:28:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #918: Waiting for Server - FAILED kill -0 6431 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6431 found at Fri Jan 8 11:28:09 EST 2016 selfserv_9159 with PID 6431 started at Fri Jan 8 11:28:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #919: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 6431 at Fri Jan 8 11:28:10 EST 2016 kill -USR1 6431 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6431 killed at Fri Jan 8 11:28:10 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:28:10 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:28:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:28:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #920: Waiting for Server - FAILED kill -0 6511 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6511 found at Fri Jan 8 11:28:16 EST 2016 selfserv_9159 with PID 6511 started at Fri Jan 8 11:28:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #921: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 6511 at Fri Jan 8 11:28:17 EST 2016 kill -USR1 6511 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6511 killed at Fri Jan 8 11:28:17 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:28:17 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:28:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:28:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #922: Waiting for Server - FAILED kill -0 6580 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6580 found at Fri Jan 8 11:28:23 EST 2016 selfserv_9159 with PID 6580 started at Fri Jan 8 11:28:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #923: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 6580 at Fri Jan 8 11:28:23 EST 2016 kill -USR1 6580 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6580 killed at Fri Jan 8 11:28:24 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:28:24 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:28:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:28:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #924: Waiting for Server - FAILED kill -0 6648 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6648 found at Fri Jan 8 11:28:30 EST 2016 selfserv_9159 with PID 6648 started at Fri Jan 8 11:28:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #925: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 6648 at Fri Jan 8 11:28:30 EST 2016 kill -USR1 6648 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6648 killed at Fri Jan 8 11:28:31 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:28:31 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:28:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:28:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #926: Waiting for Server - FAILED kill -0 6728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6728 found at Fri Jan 8 11:28:37 EST 2016 selfserv_9159 with PID 6728 started at Fri Jan 8 11:28:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #927: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 6728 at Fri Jan 8 11:28:37 EST 2016 kill -USR1 6728 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6728 killed at Fri Jan 8 11:28:38 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:28:38 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:28:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:28:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #928: Waiting for Server - FAILED kill -0 6799 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6799 found at Fri Jan 8 11:28:44 EST 2016 selfserv_9159 with PID 6799 started at Fri Jan 8 11:28:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #929: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 6799 at Fri Jan 8 11:28:44 EST 2016 kill -USR1 6799 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6799 killed at Fri Jan 8 11:28:45 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:28:45 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:28:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:28:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #930: Waiting for Server - FAILED kill -0 6869 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6869 found at Fri Jan 8 11:28:51 EST 2016 selfserv_9159 with PID 6869 started at Fri Jan 8 11:28:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #931: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 6869 at Fri Jan 8 11:28:51 EST 2016 kill -USR1 6869 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6869 killed at Fri Jan 8 11:28:52 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:28:52 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:28:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:28:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #932: Waiting for Server - FAILED kill -0 6949 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6949 found at Fri Jan 8 11:28:58 EST 2016 selfserv_9159 with PID 6949 started at Fri Jan 8 11:28:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #933: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 6949 at Fri Jan 8 11:28:58 EST 2016 kill -USR1 6949 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6949 killed at Fri Jan 8 11:28:58 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:28:59 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:28:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:29:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #934: Waiting for Server - FAILED kill -0 7018 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7018 found at Fri Jan 8 11:29:04 EST 2016 selfserv_9159 with PID 7018 started at Fri Jan 8 11:29:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #935: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 7018 at Fri Jan 8 11:29:05 EST 2016 kill -USR1 7018 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7018 killed at Fri Jan 8 11:29:05 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:29:05 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:29:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:29:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #936: Waiting for Server - FAILED kill -0 7086 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7086 found at Fri Jan 8 11:29:11 EST 2016 selfserv_9159 with PID 7086 started at Fri Jan 8 11:29:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #937: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 7086 at Fri Jan 8 11:29:12 EST 2016 kill -USR1 7086 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7086 killed at Fri Jan 8 11:29:12 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:29:12 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:29:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:29:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #938: Waiting for Server - FAILED kill -0 7166 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7166 found at Fri Jan 8 11:29:18 EST 2016 selfserv_9159 with PID 7166 started at Fri Jan 8 11:29:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #939: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 7166 at Fri Jan 8 11:29:19 EST 2016 kill -USR1 7166 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7166 killed at Fri Jan 8 11:29:19 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:29:19 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:29:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:29:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #940: Waiting for Server - FAILED kill -0 7235 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7235 found at Fri Jan 8 11:29:25 EST 2016 selfserv_9159 with PID 7235 started at Fri Jan 8 11:29:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #941: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 7235 at Fri Jan 8 11:29:26 EST 2016 kill -USR1 7235 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7235 killed at Fri Jan 8 11:29:26 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:29:26 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:29:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:29:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #942: Waiting for Server - FAILED kill -0 7303 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7303 found at Fri Jan 8 11:29:32 EST 2016 selfserv_9159 with PID 7303 started at Fri Jan 8 11:29:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #943: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 7303 at Fri Jan 8 11:29:33 EST 2016 kill -USR1 7303 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7303 killed at Fri Jan 8 11:29:33 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:29:33 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:29:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:29:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #944: Waiting for Server - FAILED kill -0 7383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7383 found at Fri Jan 8 11:29:39 EST 2016 selfserv_9159 with PID 7383 started at Fri Jan 8 11:29:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #945: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 7383 at Fri Jan 8 11:29:39 EST 2016 kill -USR1 7383 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7383 killed at Fri Jan 8 11:29:40 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:29:40 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:29:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:29:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #946: Waiting for Server - FAILED kill -0 7452 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7452 found at Fri Jan 8 11:29:46 EST 2016 selfserv_9159 with PID 7452 started at Fri Jan 8 11:29:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #947: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 7452 at Fri Jan 8 11:29:46 EST 2016 kill -USR1 7452 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7452 killed at Fri Jan 8 11:29:47 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:29:47 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:29:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:29:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #948: Waiting for Server - FAILED kill -0 7520 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7520 found at Fri Jan 8 11:29:53 EST 2016 selfserv_9159 with PID 7520 started at Fri Jan 8 11:29:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #949: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 7520 at Fri Jan 8 11:29:53 EST 2016 kill -USR1 7520 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7520 killed at Fri Jan 8 11:29:54 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:29:54 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:29:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:29:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #950: Waiting for Server - FAILED kill -0 7600 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7600 found at Fri Jan 8 11:30:00 EST 2016 selfserv_9159 with PID 7600 started at Fri Jan 8 11:30:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #951: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 7600 at Fri Jan 8 11:30:00 EST 2016 kill -USR1 7600 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7600 killed at Fri Jan 8 11:30:01 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:30:01 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:30:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:30:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #952: Waiting for Server - FAILED kill -0 7669 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7669 found at Fri Jan 8 11:30:07 EST 2016 selfserv_9159 with PID 7669 started at Fri Jan 8 11:30:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #953: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 7669 at Fri Jan 8 11:30:07 EST 2016 kill -USR1 7669 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7669 killed at Fri Jan 8 11:30:08 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:30:08 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:30:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:30:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #954: Waiting for Server - FAILED kill -0 7737 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7737 found at Fri Jan 8 11:30:13 EST 2016 selfserv_9159 with PID 7737 started at Fri Jan 8 11:30:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #955: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 7737 at Fri Jan 8 11:30:14 EST 2016 kill -USR1 7737 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7737 killed at Fri Jan 8 11:30:14 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:30:15 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:30:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:30:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #956: Waiting for Server - FAILED kill -0 7817 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7817 found at Fri Jan 8 11:30:20 EST 2016 selfserv_9159 with PID 7817 started at Fri Jan 8 11:30:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #957: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 7817 at Fri Jan 8 11:30:21 EST 2016 kill -USR1 7817 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7817 killed at Fri Jan 8 11:30:21 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:30:21 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:30:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:30:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #958: Waiting for Server - FAILED kill -0 7886 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7886 found at Fri Jan 8 11:30:27 EST 2016 selfserv_9159 with PID 7886 started at Fri Jan 8 11:30:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #959: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 7886 at Fri Jan 8 11:30:28 EST 2016 kill -USR1 7886 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7886 killed at Fri Jan 8 11:30:28 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:30:28 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:30:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:30:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #960: Waiting for Server - FAILED kill -0 7954 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7954 found at Fri Jan 8 11:30:34 EST 2016 selfserv_9159 with PID 7954 started at Fri Jan 8 11:30:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #961: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 7954 at Fri Jan 8 11:30:35 EST 2016 kill -USR1 7954 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7954 killed at Fri Jan 8 11:30:35 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:30:35 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:30:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:30:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #962: Waiting for Server - FAILED kill -0 8034 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8034 found at Fri Jan 8 11:30:41 EST 2016 selfserv_9159 with PID 8034 started at Fri Jan 8 11:30:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #963: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 8034 at Fri Jan 8 11:30:42 EST 2016 kill -USR1 8034 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8034 killed at Fri Jan 8 11:30:42 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:30:42 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:30:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:30:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #964: Waiting for Server - FAILED kill -0 8103 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8103 found at Fri Jan 8 11:30:48 EST 2016 selfserv_9159 with PID 8103 started at Fri Jan 8 11:30:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #965: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 8103 at Fri Jan 8 11:30:49 EST 2016 kill -USR1 8103 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8103 killed at Fri Jan 8 11:30:49 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:30:49 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:30:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:30:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #966: Waiting for Server - FAILED kill -0 8171 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8171 found at Fri Jan 8 11:30:55 EST 2016 selfserv_9159 with PID 8171 started at Fri Jan 8 11:30:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #967: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 8171 at Fri Jan 8 11:30:55 EST 2016 kill -USR1 8171 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8171 killed at Fri Jan 8 11:30:56 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:30:56 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:30:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:31:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #968: Waiting for Server - FAILED kill -0 8251 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8251 found at Fri Jan 8 11:31:02 EST 2016 selfserv_9159 with PID 8251 started at Fri Jan 8 11:31:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #969: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 8251 at Fri Jan 8 11:31:02 EST 2016 kill -USR1 8251 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8251 killed at Fri Jan 8 11:31:03 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:31:03 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:31:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:31:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #970: Waiting for Server - FAILED kill -0 8320 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8320 found at Fri Jan 8 11:31:09 EST 2016 selfserv_9159 with PID 8320 started at Fri Jan 8 11:31:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #971: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 8320 at Fri Jan 8 11:31:09 EST 2016 kill -USR1 8320 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8320 killed at Fri Jan 8 11:31:10 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:31:10 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:31:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:31:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #972: Waiting for Server - FAILED kill -0 8389 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8389 found at Fri Jan 8 11:31:16 EST 2016 selfserv_9159 with PID 8389 started at Fri Jan 8 11:31:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #973: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 8389 at Fri Jan 8 11:31:16 EST 2016 kill -USR1 8389 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8389 killed at Fri Jan 8 11:31:17 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:31:17 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:31:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:31:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #974: Waiting for Server - FAILED kill -0 8471 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8471 found at Fri Jan 8 11:31:23 EST 2016 selfserv_9159 with PID 8471 started at Fri Jan 8 11:31:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #975: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 8471 at Fri Jan 8 11:31:23 EST 2016 kill -USR1 8471 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8471 killed at Fri Jan 8 11:31:24 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:31:24 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:31:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:31:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #976: Waiting for Server - FAILED kill -0 8540 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8540 found at Fri Jan 8 11:31:30 EST 2016 selfserv_9159 with PID 8540 started at Fri Jan 8 11:31:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #977: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 8540 at Fri Jan 8 11:31:30 EST 2016 kill -USR1 8540 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8540 killed at Fri Jan 8 11:31:31 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:31:31 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:31:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:31:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #978: Waiting for Server - FAILED kill -0 8608 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8608 found at Fri Jan 8 11:31:37 EST 2016 selfserv_9159 with PID 8608 started at Fri Jan 8 11:31:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #979: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 8608 at Fri Jan 8 11:31:37 EST 2016 kill -USR1 8608 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8608 killed at Fri Jan 8 11:31:38 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:31:38 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:31:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:31:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #980: Waiting for Server - FAILED kill -0 8689 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8689 found at Fri Jan 8 11:31:44 EST 2016 selfserv_9159 with PID 8689 started at Fri Jan 8 11:31:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #981: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 8689 at Fri Jan 8 11:31:44 EST 2016 kill -USR1 8689 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8689 killed at Fri Jan 8 11:31:45 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:31:45 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:31:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:31:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #982: Waiting for Server - FAILED kill -0 8757 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8757 found at Fri Jan 8 11:31:51 EST 2016 selfserv_9159 with PID 8757 started at Fri Jan 8 11:31:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #983: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 8757 at Fri Jan 8 11:31:51 EST 2016 kill -USR1 8757 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8757 killed at Fri Jan 8 11:31:51 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:31:52 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:31:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:31:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #984: Waiting for Server - FAILED kill -0 8825 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8825 found at Fri Jan 8 11:31:57 EST 2016 selfserv_9159 with PID 8825 started at Fri Jan 8 11:31:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #985: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 8825 at Fri Jan 8 11:31:58 EST 2016 kill -USR1 8825 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8825 killed at Fri Jan 8 11:31:58 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:31:59 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:31:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:32:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #986: Waiting for Server - FAILED kill -0 8906 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8906 found at Fri Jan 8 11:32:04 EST 2016 selfserv_9159 with PID 8906 started at Fri Jan 8 11:32:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #987: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 8906 at Fri Jan 8 11:32:05 EST 2016 kill -USR1 8906 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8906 killed at Fri Jan 8 11:32:05 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:32:05 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:32:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:32:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #988: Waiting for Server - FAILED kill -0 8974 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8974 found at Fri Jan 8 11:32:11 EST 2016 selfserv_9159 with PID 8974 started at Fri Jan 8 11:32:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #989: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 8974 at Fri Jan 8 11:32:12 EST 2016 kill -USR1 8974 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8974 killed at Fri Jan 8 11:32:12 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:32:12 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:32:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:32:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #990: Waiting for Server - FAILED kill -0 9042 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9042 found at Fri Jan 8 11:32:18 EST 2016 selfserv_9159 with PID 9042 started at Fri Jan 8 11:32:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #991: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 9042 at Fri Jan 8 11:32:19 EST 2016 kill -USR1 9042 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9042 killed at Fri Jan 8 11:32:19 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:32:19 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:32:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:32:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #992: Waiting for Server - FAILED kill -0 9123 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9123 found at Fri Jan 8 11:32:25 EST 2016 selfserv_9159 with PID 9123 started at Fri Jan 8 11:32:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #993: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 9123 at Fri Jan 8 11:32:26 EST 2016 kill -USR1 9123 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9123 killed at Fri Jan 8 11:32:26 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:32:26 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:32:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:32:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #994: Waiting for Server - FAILED kill -0 9191 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9191 found at Fri Jan 8 11:32:32 EST 2016 selfserv_9159 with PID 9191 started at Fri Jan 8 11:32:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #995: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 9191 at Fri Jan 8 11:32:33 EST 2016 kill -USR1 9191 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9191 killed at Fri Jan 8 11:32:33 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:32:33 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:32:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:32:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #996: Waiting for Server - FAILED kill -0 9259 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9259 found at Fri Jan 8 11:32:39 EST 2016 selfserv_9159 with PID 9259 started at Fri Jan 8 11:32:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #997: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 9259 at Fri Jan 8 11:32:39 EST 2016 kill -USR1 9259 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9259 killed at Fri Jan 8 11:32:40 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:32:40 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:32:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:32:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #998: Waiting for Server - FAILED kill -0 9340 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9340 found at Fri Jan 8 11:32:46 EST 2016 selfserv_9159 with PID 9340 started at Fri Jan 8 11:32:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #999: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 9340 at Fri Jan 8 11:32:46 EST 2016 kill -USR1 9340 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9340 killed at Fri Jan 8 11:32:47 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:32:47 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:32:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:32:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1000: Waiting for Server - FAILED kill -0 9411 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9411 found at Fri Jan 8 11:32:53 EST 2016 selfserv_9159 with PID 9411 started at Fri Jan 8 11:32:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1001: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 9411 at Fri Jan 8 11:32:53 EST 2016 kill -USR1 9411 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9411 killed at Fri Jan 8 11:32:54 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:32:54 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:32:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:32:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1002: Waiting for Server - FAILED kill -0 9479 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9479 found at Fri Jan 8 11:33:00 EST 2016 selfserv_9159 with PID 9479 started at Fri Jan 8 11:33:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1003: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 9479 at Fri Jan 8 11:33:00 EST 2016 kill -USR1 9479 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9479 killed at Fri Jan 8 11:33:01 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:33:01 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:33:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:33:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1004: Waiting for Server - FAILED kill -0 9560 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9560 found at Fri Jan 8 11:33:07 EST 2016 selfserv_9159 with PID 9560 started at Fri Jan 8 11:33:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1005: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 9560 at Fri Jan 8 11:33:07 EST 2016 kill -USR1 9560 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9560 killed at Fri Jan 8 11:33:08 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:33:08 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:33:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:33:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1006: Waiting for Server - FAILED kill -0 9628 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9628 found at Fri Jan 8 11:33:13 EST 2016 selfserv_9159 with PID 9628 started at Fri Jan 8 11:33:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1007: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 9628 at Fri Jan 8 11:33:14 EST 2016 kill -USR1 9628 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9628 killed at Fri Jan 8 11:33:14 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:33:14 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:33:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:33:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1008: Waiting for Server - FAILED kill -0 9696 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9696 found at Fri Jan 8 11:33:20 EST 2016 selfserv_9159 with PID 9696 started at Fri Jan 8 11:33:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1009: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 9696 at Fri Jan 8 11:33:21 EST 2016 kill -USR1 9696 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9696 killed at Fri Jan 8 11:33:21 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:33:21 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:33:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:33:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1010: Waiting for Server - FAILED kill -0 9777 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9777 found at Fri Jan 8 11:33:27 EST 2016 selfserv_9159 with PID 9777 started at Fri Jan 8 11:33:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1011: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 9777 at Fri Jan 8 11:33:28 EST 2016 kill -USR1 9777 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9777 killed at Fri Jan 8 11:33:28 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:33:28 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:33:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:33:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1012: Waiting for Server - FAILED kill -0 9845 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9845 found at Fri Jan 8 11:33:34 EST 2016 selfserv_9159 with PID 9845 started at Fri Jan 8 11:33:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1013: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 9845 at Fri Jan 8 11:33:35 EST 2016 kill -USR1 9845 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9845 killed at Fri Jan 8 11:33:35 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:33:35 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:33:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:33:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1014: Waiting for Server - FAILED kill -0 9913 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9913 found at Fri Jan 8 11:33:41 EST 2016 selfserv_9159 with PID 9913 started at Fri Jan 8 11:33:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1015: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 9913 at Fri Jan 8 11:33:42 EST 2016 kill -USR1 9913 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9913 killed at Fri Jan 8 11:33:42 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:33:42 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:33:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:33:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1016: Waiting for Server - FAILED kill -0 9994 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9994 found at Fri Jan 8 11:33:48 EST 2016 selfserv_9159 with PID 9994 started at Fri Jan 8 11:33:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1017: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 9994 at Fri Jan 8 11:33:49 EST 2016 kill -USR1 9994 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9994 killed at Fri Jan 8 11:33:49 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:33:49 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:33:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:33:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1018: Waiting for Server - FAILED kill -0 10062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10062 found at Fri Jan 8 11:33:55 EST 2016 selfserv_9159 with PID 10062 started at Fri Jan 8 11:33:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1019: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 10062 at Fri Jan 8 11:33:55 EST 2016 kill -USR1 10062 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10062 killed at Fri Jan 8 11:33:56 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:33:56 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:33:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:34:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1020: Waiting for Server - FAILED kill -0 10130 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10130 found at Fri Jan 8 11:34:02 EST 2016 selfserv_9159 with PID 10130 started at Fri Jan 8 11:34:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1021: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 10130 at Fri Jan 8 11:34:02 EST 2016 kill -USR1 10130 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10130 killed at Fri Jan 8 11:34:03 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:34:03 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:34:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:34:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1022: Waiting for Server - FAILED kill -0 10211 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10211 found at Fri Jan 8 11:34:09 EST 2016 selfserv_9159 with PID 10211 started at Fri Jan 8 11:34:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1023: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 10211 at Fri Jan 8 11:34:09 EST 2016 kill -USR1 10211 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10211 killed at Fri Jan 8 11:34:10 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:34:10 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:34:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:34:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1024: Waiting for Server - FAILED kill -0 10280 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10280 found at Fri Jan 8 11:34:16 EST 2016 selfserv_9159 with PID 10280 started at Fri Jan 8 11:34:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1025: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 10280 at Fri Jan 8 11:34:16 EST 2016 kill -USR1 10280 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10280 killed at Fri Jan 8 11:34:17 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:34:17 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:34:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:34:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1026: Waiting for Server - FAILED kill -0 10348 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10348 found at Fri Jan 8 11:34:23 EST 2016 selfserv_9159 with PID 10348 started at Fri Jan 8 11:34:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1027: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 10348 at Fri Jan 8 11:34:23 EST 2016 kill -USR1 10348 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10348 killed at Fri Jan 8 11:34:23 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:34:24 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:34:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:34:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1028: Waiting for Server - FAILED kill -0 10429 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10429 found at Fri Jan 8 11:34:30 EST 2016 selfserv_9159 with PID 10429 started at Fri Jan 8 11:34:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1029: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 10429 at Fri Jan 8 11:34:30 EST 2016 kill -USR1 10429 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10429 killed at Fri Jan 8 11:34:30 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:34:30 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:34:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:34:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1030: Waiting for Server - FAILED kill -0 10497 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10497 found at Fri Jan 8 11:34:36 EST 2016 selfserv_9159 with PID 10497 started at Fri Jan 8 11:34:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1031: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 10497 at Fri Jan 8 11:34:37 EST 2016 kill -USR1 10497 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10497 killed at Fri Jan 8 11:34:37 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:34:37 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:34:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:34:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1032: Waiting for Server - FAILED kill -0 10565 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10565 found at Fri Jan 8 11:34:43 EST 2016 selfserv_9159 with PID 10565 started at Fri Jan 8 11:34:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1033: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 10565 at Fri Jan 8 11:34:44 EST 2016 kill -USR1 10565 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10565 killed at Fri Jan 8 11:34:44 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:34:44 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:34:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:34:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1034: Waiting for Server - FAILED kill -0 10646 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10646 found at Fri Jan 8 11:34:50 EST 2016 selfserv_9159 with PID 10646 started at Fri Jan 8 11:34:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1035: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 10646 at Fri Jan 8 11:34:51 EST 2016 kill -USR1 10646 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10646 killed at Fri Jan 8 11:34:51 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:34:51 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:34:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:34:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1036: Waiting for Server - FAILED kill -0 10714 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10714 found at Fri Jan 8 11:34:57 EST 2016 selfserv_9159 with PID 10714 started at Fri Jan 8 11:34:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1037: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 10714 at Fri Jan 8 11:34:58 EST 2016 kill -USR1 10714 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10714 killed at Fri Jan 8 11:34:58 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:34:58 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:34:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:35:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1038: Waiting for Server - FAILED kill -0 10782 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10782 found at Fri Jan 8 11:35:04 EST 2016 selfserv_9159 with PID 10782 started at Fri Jan 8 11:35:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1039: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 10782 at Fri Jan 8 11:35:05 EST 2016 kill -USR1 10782 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10782 killed at Fri Jan 8 11:35:05 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:35:05 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:35:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:35:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1040: Waiting for Server - FAILED kill -0 10872 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10872 found at Fri Jan 8 11:35:11 EST 2016 selfserv_9159 with PID 10872 started at Fri Jan 8 11:35:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1041: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 10872 at Fri Jan 8 11:35:11 EST 2016 kill -USR1 10872 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10872 killed at Fri Jan 8 11:35:12 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:35:12 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:35:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:35:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1042: Waiting for Server - FAILED kill -0 10940 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10940 found at Fri Jan 8 11:35:18 EST 2016 selfserv_9159 with PID 10940 started at Fri Jan 8 11:35:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1043: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 10940 at Fri Jan 8 11:35:18 EST 2016 kill -USR1 10940 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10940 killed at Fri Jan 8 11:35:19 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:35:19 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:35:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:35:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1044: Waiting for Server - FAILED kill -0 11008 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11008 found at Fri Jan 8 11:35:25 EST 2016 selfserv_9159 with PID 11008 started at Fri Jan 8 11:35:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1045: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11008 at Fri Jan 8 11:35:25 EST 2016 kill -USR1 11008 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11008 killed at Fri Jan 8 11:35:26 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:35:26 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:35:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:35:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1046: Waiting for Server - FAILED kill -0 11089 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11089 found at Fri Jan 8 11:35:32 EST 2016 selfserv_9159 with PID 11089 started at Fri Jan 8 11:35:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1047: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 11089 at Fri Jan 8 11:35:32 EST 2016 kill -USR1 11089 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11089 killed at Fri Jan 8 11:35:33 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:35:33 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:35:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:35:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1048: Waiting for Server - FAILED kill -0 11157 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11157 found at Fri Jan 8 11:35:39 EST 2016 selfserv_9159 with PID 11157 started at Fri Jan 8 11:35:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1049: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11157 at Fri Jan 8 11:35:39 EST 2016 kill -USR1 11157 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11157 killed at Fri Jan 8 11:35:40 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:35:40 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:35:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:35:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1050: Waiting for Server - FAILED kill -0 11225 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11225 found at Fri Jan 8 11:35:45 EST 2016 selfserv_9159 with PID 11225 started at Fri Jan 8 11:35:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1051: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 11225 at Fri Jan 8 11:35:46 EST 2016 kill -USR1 11225 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11225 killed at Fri Jan 8 11:35:46 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:35:47 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:35:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:35:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1052: Waiting for Server - FAILED kill -0 11306 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11306 found at Fri Jan 8 11:35:52 EST 2016 selfserv_9159 with PID 11306 started at Fri Jan 8 11:35:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1053: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 11306 at Fri Jan 8 11:35:53 EST 2016 kill -USR1 11306 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11306 killed at Fri Jan 8 11:35:53 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:35:53 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:35:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:35:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1054: Waiting for Server - FAILED kill -0 11374 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11374 found at Fri Jan 8 11:35:59 EST 2016 selfserv_9159 with PID 11374 started at Fri Jan 8 11:35:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1055: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 11374 at Fri Jan 8 11:36:00 EST 2016 kill -USR1 11374 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11374 killed at Fri Jan 8 11:36:00 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:36:00 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:36:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:36:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1056: Waiting for Server - FAILED kill -0 11442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11442 found at Fri Jan 8 11:36:06 EST 2016 selfserv_9159 with PID 11442 started at Fri Jan 8 11:36:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1057: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 11442 at Fri Jan 8 11:36:07 EST 2016 kill -USR1 11442 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11442 killed at Fri Jan 8 11:36:07 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:36:07 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:36:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:36:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1058: Waiting for Server - FAILED kill -0 11523 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11523 found at Fri Jan 8 11:36:13 EST 2016 selfserv_9159 with PID 11523 started at Fri Jan 8 11:36:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1059: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 11523 at Fri Jan 8 11:36:14 EST 2016 kill -USR1 11523 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11523 killed at Fri Jan 8 11:36:14 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:36:14 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:36:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:36:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1060: Waiting for Server - FAILED kill -0 11591 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11591 found at Fri Jan 8 11:36:20 EST 2016 selfserv_9159 with PID 11591 started at Fri Jan 8 11:36:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1061: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11591 at Fri Jan 8 11:36:21 EST 2016 kill -USR1 11591 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11591 killed at Fri Jan 8 11:36:21 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:36:21 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:36:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:36:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1062: Waiting for Server - FAILED kill -0 11659 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11659 found at Fri Jan 8 11:36:27 EST 2016 selfserv_9159 with PID 11659 started at Fri Jan 8 11:36:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1063: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 11659 at Fri Jan 8 11:36:27 EST 2016 kill -USR1 11659 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11659 killed at Fri Jan 8 11:36:28 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:36:28 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:36:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:36:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1064: Waiting for Server - FAILED kill -0 11740 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11740 found at Fri Jan 8 11:36:34 EST 2016 selfserv_9159 with PID 11740 started at Fri Jan 8 11:36:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1065: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11740 at Fri Jan 8 11:36:34 EST 2016 kill -USR1 11740 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11740 killed at Fri Jan 8 11:36:35 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:36:35 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:36:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:36:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1066: Waiting for Server - FAILED kill -0 11809 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11809 found at Fri Jan 8 11:36:41 EST 2016 selfserv_9159 with PID 11809 started at Fri Jan 8 11:36:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1067: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11809 at Fri Jan 8 11:36:41 EST 2016 kill -USR1 11809 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11809 killed at Fri Jan 8 11:36:42 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:36:42 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:36:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:36:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1068: Waiting for Server - FAILED kill -0 11877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11877 found at Fri Jan 8 11:36:48 EST 2016 selfserv_9159 with PID 11877 started at Fri Jan 8 11:36:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1069: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11877 at Fri Jan 8 11:36:48 EST 2016 kill -USR1 11877 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11877 killed at Fri Jan 8 11:36:49 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:36:49 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:36:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:36:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1070: Waiting for Server - FAILED kill -0 11958 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11958 found at Fri Jan 8 11:36:55 EST 2016 selfserv_9159 with PID 11958 started at Fri Jan 8 11:36:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1071: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 11958 at Fri Jan 8 11:36:55 EST 2016 kill -USR1 11958 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11958 killed at Fri Jan 8 11:36:56 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:36:56 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:36:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:37:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1072: Waiting for Server - FAILED kill -0 12026 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12026 found at Fri Jan 8 11:37:02 EST 2016 selfserv_9159 with PID 12026 started at Fri Jan 8 11:37:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1073: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 12026 at Fri Jan 8 11:37:02 EST 2016 kill -USR1 12026 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12026 killed at Fri Jan 8 11:37:02 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:37:03 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:37:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:37:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1074: Waiting for Server - FAILED kill -0 12094 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12094 found at Fri Jan 8 11:37:08 EST 2016 selfserv_9159 with PID 12094 started at Fri Jan 8 11:37:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1075: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 12094 at Fri Jan 8 11:37:09 EST 2016 kill -USR1 12094 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12094 killed at Fri Jan 8 11:37:09 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:37:09 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:37:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:37:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1076: Waiting for Server - FAILED kill -0 12175 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12175 found at Fri Jan 8 11:37:15 EST 2016 selfserv_9159 with PID 12175 started at Fri Jan 8 11:37:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1077: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 12175 at Fri Jan 8 11:37:16 EST 2016 kill -USR1 12175 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12175 killed at Fri Jan 8 11:37:16 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:37:16 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:37:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:37:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1078: Waiting for Server - FAILED kill -0 12243 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12243 found at Fri Jan 8 11:37:22 EST 2016 selfserv_9159 with PID 12243 started at Fri Jan 8 11:37:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1079: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 12243 at Fri Jan 8 11:37:23 EST 2016 kill -USR1 12243 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12243 killed at Fri Jan 8 11:37:23 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:37:23 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:37:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:37:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1080: Waiting for Server - FAILED kill -0 12311 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12311 found at Fri Jan 8 11:37:29 EST 2016 selfserv_9159 with PID 12311 started at Fri Jan 8 11:37:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1081: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 12311 at Fri Jan 8 11:37:30 EST 2016 kill -USR1 12311 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12311 killed at Fri Jan 8 11:37:30 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:37:30 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:37:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:37:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1082: Waiting for Server - FAILED kill -0 12392 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12392 found at Fri Jan 8 11:37:36 EST 2016 selfserv_9159 with PID 12392 started at Fri Jan 8 11:37:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1083: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 12392 at Fri Jan 8 11:37:37 EST 2016 kill -USR1 12392 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12392 killed at Fri Jan 8 11:37:37 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:37:37 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:37:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:37:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1084: Waiting for Server - FAILED kill -0 12460 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12460 found at Fri Jan 8 11:37:43 EST 2016 selfserv_9159 with PID 12460 started at Fri Jan 8 11:37:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1085: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 12460 at Fri Jan 8 11:37:43 EST 2016 kill -USR1 12460 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12460 killed at Fri Jan 8 11:37:44 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:37:44 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:37:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:37:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1086: Waiting for Server - FAILED kill -0 12528 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12528 found at Fri Jan 8 11:37:50 EST 2016 selfserv_9159 with PID 12528 started at Fri Jan 8 11:37:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1087: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 12528 at Fri Jan 8 11:37:50 EST 2016 kill -USR1 12528 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12528 killed at Fri Jan 8 11:37:51 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:37:51 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:37:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:37:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1088: Waiting for Server - FAILED kill -0 12609 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12609 found at Fri Jan 8 11:37:57 EST 2016 selfserv_9159 with PID 12609 started at Fri Jan 8 11:37:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1089: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 12609 at Fri Jan 8 11:37:57 EST 2016 kill -USR1 12609 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12609 killed at Fri Jan 8 11:37:58 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:37:58 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:37:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:38:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1090: Waiting for Server - FAILED kill -0 12677 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12677 found at Fri Jan 8 11:38:04 EST 2016 selfserv_9159 with PID 12677 started at Fri Jan 8 11:38:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1091: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 12677 at Fri Jan 8 11:38:04 EST 2016 kill -USR1 12677 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12677 killed at Fri Jan 8 11:38:05 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:38:05 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:38:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:38:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1092: Waiting for Server - FAILED kill -0 12745 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12745 found at Fri Jan 8 11:38:11 EST 2016 selfserv_9159 with PID 12745 started at Fri Jan 8 11:38:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1093: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 12745 at Fri Jan 8 11:38:11 EST 2016 kill -USR1 12745 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12745 killed at Fri Jan 8 11:38:12 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:38:12 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:38:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:38:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1094: Waiting for Server - FAILED kill -0 12826 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12826 found at Fri Jan 8 11:38:18 EST 2016 selfserv_9159 with PID 12826 started at Fri Jan 8 11:38:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1095: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 12826 at Fri Jan 8 11:38:18 EST 2016 kill -USR1 12826 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12826 killed at Fri Jan 8 11:38:18 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:38:19 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:38:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:38:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1096: Waiting for Server - FAILED kill -0 12897 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12897 found at Fri Jan 8 11:38:24 EST 2016 selfserv_9159 with PID 12897 started at Fri Jan 8 11:38:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1097: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 12897 at Fri Jan 8 11:38:25 EST 2016 kill -USR1 12897 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12897 killed at Fri Jan 8 11:38:25 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:38:25 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:38:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:38:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1098: Waiting for Server - FAILED kill -0 12973 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12973 found at Fri Jan 8 11:38:31 EST 2016 selfserv_9159 with PID 12973 started at Fri Jan 8 11:38:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1099: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 12973 at Fri Jan 8 11:38:32 EST 2016 kill -USR1 12973 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12973 killed at Fri Jan 8 11:38:32 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:38:32 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:38:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:38:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1100: Waiting for Server - FAILED kill -0 13060 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13060 found at Fri Jan 8 11:38:38 EST 2016 selfserv_9159 with PID 13060 started at Fri Jan 8 11:38:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1101: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 13060 at Fri Jan 8 11:38:39 EST 2016 kill -USR1 13060 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13060 killed at Fri Jan 8 11:38:39 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:38:39 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:38:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:38:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1102: Waiting for Server - FAILED kill -0 13134 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13134 found at Fri Jan 8 11:38:45 EST 2016 selfserv_9159 with PID 13134 started at Fri Jan 8 11:38:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1103: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 13134 at Fri Jan 8 11:38:46 EST 2016 kill -USR1 13134 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13134 killed at Fri Jan 8 11:38:46 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:38:46 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:38:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:38:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1104: Waiting for Server - FAILED kill -0 13208 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13208 found at Fri Jan 8 11:38:52 EST 2016 selfserv_9159 with PID 13208 started at Fri Jan 8 11:38:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1105: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 13208 at Fri Jan 8 11:38:53 EST 2016 kill -USR1 13208 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13208 killed at Fri Jan 8 11:38:53 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:38:53 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:38:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:38:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1106: Waiting for Server - FAILED kill -0 13297 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13297 found at Fri Jan 8 11:38:59 EST 2016 selfserv_9159 with PID 13297 started at Fri Jan 8 11:38:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1107: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 13297 at Fri Jan 8 11:39:00 EST 2016 kill -USR1 13297 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13297 killed at Fri Jan 8 11:39:00 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:39:00 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:39:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:39:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1108: Waiting for Server - FAILED kill -0 13371 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13371 found at Fri Jan 8 11:39:06 EST 2016 selfserv_9159 with PID 13371 started at Fri Jan 8 11:39:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1109: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 13371 at Fri Jan 8 11:39:06 EST 2016 kill -USR1 13371 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13371 killed at Fri Jan 8 11:39:07 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:39:07 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:39:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:39:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1110: Waiting for Server - FAILED kill -0 13445 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13445 found at Fri Jan 8 11:39:13 EST 2016 selfserv_9159 with PID 13445 started at Fri Jan 8 11:39:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1111: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 13445 at Fri Jan 8 11:39:13 EST 2016 kill -USR1 13445 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13445 killed at Fri Jan 8 11:39:14 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:39:14 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:39:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:39:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1112: Waiting for Server - FAILED kill -0 13532 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13532 found at Fri Jan 8 11:39:20 EST 2016 selfserv_9159 with PID 13532 started at Fri Jan 8 11:39:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1113: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 13532 at Fri Jan 8 11:39:20 EST 2016 kill -USR1 13532 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13532 killed at Fri Jan 8 11:39:21 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:39:21 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:39:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:39:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1114: Waiting for Server - FAILED kill -0 13608 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13608 found at Fri Jan 8 11:39:27 EST 2016 selfserv_9159 with PID 13608 started at Fri Jan 8 11:39:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1115: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 13608 at Fri Jan 8 11:39:27 EST 2016 kill -USR1 13608 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13608 killed at Fri Jan 8 11:39:28 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:39:28 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:39:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:39:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1116: Waiting for Server - FAILED kill -0 13682 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13682 found at Fri Jan 8 11:39:34 EST 2016 selfserv_9159 with PID 13682 started at Fri Jan 8 11:39:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1117: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 13682 at Fri Jan 8 11:39:34 EST 2016 kill -USR1 13682 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13682 killed at Fri Jan 8 11:39:35 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:39:35 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:39:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:39:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1118: Waiting for Server - FAILED kill -0 13769 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13769 found at Fri Jan 8 11:39:41 EST 2016 selfserv_9159 with PID 13769 started at Fri Jan 8 11:39:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1119: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 13769 at Fri Jan 8 11:39:41 EST 2016 kill -USR1 13769 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13769 killed at Fri Jan 8 11:39:41 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:39:42 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:39:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:39:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1120: Waiting for Server - FAILED kill -0 13843 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13843 found at Fri Jan 8 11:39:47 EST 2016 selfserv_9159 with PID 13843 started at Fri Jan 8 11:39:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1121: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 13843 at Fri Jan 8 11:39:48 EST 2016 kill -USR1 13843 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13843 killed at Fri Jan 8 11:39:48 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:39:48 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:39:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:39:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1122: Waiting for Server - FAILED kill -0 13917 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13917 found at Fri Jan 8 11:39:54 EST 2016 selfserv_9159 with PID 13917 started at Fri Jan 8 11:39:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1123: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 13917 at Fri Jan 8 11:39:55 EST 2016 kill -USR1 13917 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13917 killed at Fri Jan 8 11:39:55 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:39:55 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:39:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:40:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1124: Waiting for Server - FAILED kill -0 14004 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14004 found at Fri Jan 8 11:40:01 EST 2016 selfserv_9159 with PID 14004 started at Fri Jan 8 11:40:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1125: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 14004 at Fri Jan 8 11:40:02 EST 2016 kill -USR1 14004 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14004 killed at Fri Jan 8 11:40:02 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:40:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:40:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:40:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1126: Waiting for Server - FAILED kill -0 14080 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14080 found at Fri Jan 8 11:40:08 EST 2016 selfserv_9159 with PID 14080 started at Fri Jan 8 11:40:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1127: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 14080 at Fri Jan 8 11:40:09 EST 2016 kill -USR1 14080 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14080 killed at Fri Jan 8 11:40:09 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:40:09 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:40:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:40:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1128: Waiting for Server - FAILED kill -0 14154 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14154 found at Fri Jan 8 11:40:15 EST 2016 selfserv_9159 with PID 14154 started at Fri Jan 8 11:40:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1129: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 14154 at Fri Jan 8 11:40:16 EST 2016 kill -USR1 14154 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14154 killed at Fri Jan 8 11:40:16 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:40:16 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:40:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:40:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1130: Waiting for Server - FAILED kill -0 14241 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14241 found at Fri Jan 8 11:40:22 EST 2016 selfserv_9159 with PID 14241 started at Fri Jan 8 11:40:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1131: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 14241 at Fri Jan 8 11:40:23 EST 2016 kill -USR1 14241 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14241 killed at Fri Jan 8 11:40:23 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:40:23 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:40:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:40:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1132: Waiting for Server - FAILED kill -0 14311 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14311 found at Fri Jan 8 11:40:29 EST 2016 selfserv_9159 with PID 14311 started at Fri Jan 8 11:40:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1133: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 14311 at Fri Jan 8 11:40:29 EST 2016 kill -USR1 14311 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14311 killed at Fri Jan 8 11:40:30 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:40:30 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:40:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:40:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1134: Waiting for Server - FAILED kill -0 14379 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14379 found at Fri Jan 8 11:40:36 EST 2016 selfserv_9159 with PID 14379 started at Fri Jan 8 11:40:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1135: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 14379 at Fri Jan 8 11:40:36 EST 2016 kill -USR1 14379 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14379 killed at Fri Jan 8 11:40:37 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:40:37 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:40:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:40:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1136: Waiting for Server - FAILED kill -0 14460 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14460 found at Fri Jan 8 11:40:43 EST 2016 selfserv_9159 with PID 14460 started at Fri Jan 8 11:40:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1137: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 14460 at Fri Jan 8 11:40:43 EST 2016 kill -USR1 14460 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14460 killed at Fri Jan 8 11:40:44 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:40:44 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:40:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:40:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1138: Waiting for Server - FAILED kill -0 14528 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14528 found at Fri Jan 8 11:40:50 EST 2016 selfserv_9159 with PID 14528 started at Fri Jan 8 11:40:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1139: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 14528 at Fri Jan 8 11:40:50 EST 2016 kill -USR1 14528 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14528 killed at Fri Jan 8 11:40:51 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:40:51 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:40:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:40:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1140: Waiting for Server - FAILED kill -0 14596 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14596 found at Fri Jan 8 11:40:57 EST 2016 selfserv_9159 with PID 14596 started at Fri Jan 8 11:40:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1141: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 14596 at Fri Jan 8 11:40:57 EST 2016 kill -USR1 14596 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14596 killed at Fri Jan 8 11:40:58 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:40:58 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:40:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:41:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1142: Waiting for Server - FAILED kill -0 14677 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14677 found at Fri Jan 8 11:41:04 EST 2016 selfserv_9159 with PID 14677 started at Fri Jan 8 11:41:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1143: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 14677 at Fri Jan 8 11:41:04 EST 2016 kill -USR1 14677 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14677 killed at Fri Jan 8 11:41:04 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:41:05 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:41:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:41:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1144: Waiting for Server - FAILED kill -0 14745 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14745 found at Fri Jan 8 11:41:10 EST 2016 selfserv_9159 with PID 14745 started at Fri Jan 8 11:41:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1145: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 14745 at Fri Jan 8 11:41:11 EST 2016 kill -USR1 14745 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14745 killed at Fri Jan 8 11:41:11 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:41:11 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:41:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:41:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1146: Waiting for Server - FAILED kill -0 14813 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14813 found at Fri Jan 8 11:41:17 EST 2016 selfserv_9159 with PID 14813 started at Fri Jan 8 11:41:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1147: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 14813 at Fri Jan 8 11:41:18 EST 2016 kill -USR1 14813 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14813 killed at Fri Jan 8 11:41:18 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:41:18 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:41:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:41:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1148: Waiting for Server - FAILED kill -0 14894 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14894 found at Fri Jan 8 11:41:24 EST 2016 selfserv_9159 with PID 14894 started at Fri Jan 8 11:41:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1149: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 14894 at Fri Jan 8 11:41:25 EST 2016 kill -USR1 14894 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14894 killed at Fri Jan 8 11:41:25 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:41:25 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:41:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:41:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1150: Waiting for Server - FAILED kill -0 14962 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14962 found at Fri Jan 8 11:41:31 EST 2016 selfserv_9159 with PID 14962 started at Fri Jan 8 11:41:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1151: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 14962 at Fri Jan 8 11:41:32 EST 2016 kill -USR1 14962 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14962 killed at Fri Jan 8 11:41:32 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:41:32 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:41:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:41:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1152: Waiting for Server - FAILED kill -0 15030 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15030 found at Fri Jan 8 11:41:38 EST 2016 selfserv_9159 with PID 15030 started at Fri Jan 8 11:41:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1153: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 15030 at Fri Jan 8 11:41:39 EST 2016 kill -USR1 15030 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15030 killed at Fri Jan 8 11:41:39 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:41:39 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:41:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:41:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1154: Waiting for Server - FAILED kill -0 15111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15111 found at Fri Jan 8 11:41:45 EST 2016 selfserv_9159 with PID 15111 started at Fri Jan 8 11:41:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1155: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 15111 at Fri Jan 8 11:41:46 EST 2016 kill -USR1 15111 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15111 killed at Fri Jan 8 11:41:46 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:41:46 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:41:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:41:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1156: Waiting for Server - FAILED kill -0 15179 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15179 found at Fri Jan 8 11:41:52 EST 2016 selfserv_9159 with PID 15179 started at Fri Jan 8 11:41:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1157: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 15179 at Fri Jan 8 11:41:52 EST 2016 kill -USR1 15179 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15179 killed at Fri Jan 8 11:41:53 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:41:53 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:41:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:41:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1158: Waiting for Server - FAILED kill -0 15247 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15247 found at Fri Jan 8 11:41:59 EST 2016 selfserv_9159 with PID 15247 started at Fri Jan 8 11:41:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1159: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 15247 at Fri Jan 8 11:41:59 EST 2016 kill -USR1 15247 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15247 killed at Fri Jan 8 11:42:00 EST 2016 ssl.sh: Cache CRL SSL Client Tests - with ECC =============================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/authin.tl.tmp 0 selfserv_9159 starting at Fri Jan 8 11:42:00 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:42:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:42:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1160: Waiting for Server - FAILED kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:06 EST 2016 selfserv_9159 with PID 15323 started at Fri Jan 8 11:42:06 EST 2016 Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:06 EST 2016 ssl.sh: #1161: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:07 EST 2016 ssl.sh: #1162: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:07 EST 2016 ssl.sh: #1163: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:08 EST 2016 ssl.sh: #1164: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:08 EST 2016 ssl.sh: #1165: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:09 EST 2016 ssl.sh: #1166: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:10 EST 2016 ssl.sh: #1167: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:10 EST 2016 ssl.sh: #1168: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:11 EST 2016 ssl.sh: #1169: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:11 EST 2016 ssl.sh: #1170: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:12 EST 2016 ssl.sh: #1171: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:12 EST 2016 ssl.sh: #1172: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:13 EST 2016 ssl.sh: #1173: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:14 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1174: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:14 EST 2016 ssl.sh: #1175: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:15 EST 2016 ssl.sh: #1176: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:15 EST 2016 ssl.sh: #1177: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:16 EST 2016 ssl.sh: #1178: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:16 EST 2016 ssl.sh: #1179: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:17 EST 2016 ssl.sh: #1180: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:17 EST 2016 ssl.sh: #1181: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:18 EST 2016 ssl.sh: #1182: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:18 EST 2016 ssl.sh: #1183: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:19 EST 2016 ssl.sh: #1184: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:20 EST 2016 ssl.sh: #1185: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:20 EST 2016 ssl.sh: #1186: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:21 EST 2016 ssl.sh: #1187: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:21 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1188: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:22 EST 2016 ssl.sh: #1189: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:22 EST 2016 ssl.sh: #1190: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:23 EST 2016 ssl.sh: #1191: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:23 EST 2016 ssl.sh: #1192: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:24 EST 2016 ssl.sh: #1193: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:25 EST 2016 ssl.sh: #1194: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:25 EST 2016 ssl.sh: #1195: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:26 EST 2016 ssl.sh: #1196: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:26 EST 2016 ssl.sh: #1197: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:27 EST 2016 ssl.sh: #1198: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:27 EST 2016 ssl.sh: #1199: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:28 EST 2016 ssl.sh: #1200: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15323 found at Fri Jan 8 11:42:28 EST 2016 ssl.sh: #1201: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 15323 at Fri Jan 8 11:42:29 EST 2016 kill -USR1 15323 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15323 killed at Fri Jan 8 11:42:29 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:42:29 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:42:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:42:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1202: Waiting for Server - FAILED kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:35 EST 2016 selfserv_9159 with PID 16758 started at Fri Jan 8 11:42:35 EST 2016 Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:35 EST 2016 ssl.sh: #1203: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:36 EST 2016 ssl.sh: #1204: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:37 EST 2016 ssl.sh: #1205: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:37 EST 2016 ssl.sh: #1206: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:38 EST 2016 ssl.sh: #1207: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:38 EST 2016 ssl.sh: #1208: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:39 EST 2016 ssl.sh: #1209: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:39 EST 2016 ssl.sh: #1210: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:40 EST 2016 ssl.sh: #1211: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:40 EST 2016 ssl.sh: #1212: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:41 EST 2016 ssl.sh: #1213: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:42 EST 2016 ssl.sh: #1214: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:42 EST 2016 ssl.sh: #1215: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:43 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1216: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:43 EST 2016 ssl.sh: #1217: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:44 EST 2016 ssl.sh: #1218: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:44 EST 2016 ssl.sh: #1219: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:45 EST 2016 ssl.sh: #1220: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:45 EST 2016 ssl.sh: #1221: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:46 EST 2016 ssl.sh: #1222: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:46 EST 2016 ssl.sh: #1223: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:47 EST 2016 ssl.sh: #1224: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:48 EST 2016 ssl.sh: #1225: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:48 EST 2016 ssl.sh: #1226: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:49 EST 2016 ssl.sh: #1227: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:49 EST 2016 ssl.sh: #1228: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:50 EST 2016 ssl.sh: #1229: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:50 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1230: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:51 EST 2016 ssl.sh: #1231: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:51 EST 2016 ssl.sh: #1232: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:52 EST 2016 ssl.sh: #1233: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:53 EST 2016 ssl.sh: #1234: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:53 EST 2016 ssl.sh: #1235: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:54 EST 2016 ssl.sh: #1236: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:54 EST 2016 ssl.sh: #1237: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:55 EST 2016 ssl.sh: #1238: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:55 EST 2016 ssl.sh: #1239: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:56 EST 2016 ssl.sh: #1240: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:56 EST 2016 ssl.sh: #1241: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:57 EST 2016 ssl.sh: #1242: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16758 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16758 found at Fri Jan 8 11:42:58 EST 2016 ssl.sh: #1243: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 16758 at Fri Jan 8 11:42:58 EST 2016 kill -USR1 16758 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16758 killed at Fri Jan 8 11:42:58 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:42:58 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:42:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:43:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1244: Waiting for Server - FAILED kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:04 EST 2016 selfserv_9159 with PID 18195 started at Fri Jan 8 11:43:04 EST 2016 Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:05 EST 2016 ssl.sh: #1245: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:05 EST 2016 ssl.sh: #1246: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:06 EST 2016 ssl.sh: #1247: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:06 EST 2016 ssl.sh: #1248: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:07 EST 2016 ssl.sh: #1249: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:07 EST 2016 ssl.sh: #1250: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:08 EST 2016 ssl.sh: #1251: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:08 EST 2016 ssl.sh: #1252: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:09 EST 2016 ssl.sh: #1253: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:10 EST 2016 ssl.sh: #1254: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:10 EST 2016 ssl.sh: #1255: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:11 EST 2016 ssl.sh: #1256: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:11 EST 2016 ssl.sh: #1257: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:12 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1258: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:12 EST 2016 ssl.sh: #1259: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:13 EST 2016 ssl.sh: #1260: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:13 EST 2016 ssl.sh: #1261: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:14 EST 2016 ssl.sh: #1262: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:15 EST 2016 ssl.sh: #1263: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:15 EST 2016 ssl.sh: #1264: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:16 EST 2016 ssl.sh: #1265: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:16 EST 2016 ssl.sh: #1266: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:17 EST 2016 ssl.sh: #1267: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:17 EST 2016 ssl.sh: #1268: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:18 EST 2016 ssl.sh: #1269: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:18 EST 2016 ssl.sh: #1270: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:19 EST 2016 ssl.sh: #1271: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:20 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1272: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:20 EST 2016 ssl.sh: #1273: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:21 EST 2016 ssl.sh: #1274: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:21 EST 2016 ssl.sh: #1275: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:22 EST 2016 ssl.sh: #1276: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:22 EST 2016 ssl.sh: #1277: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:23 EST 2016 ssl.sh: #1278: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:23 EST 2016 ssl.sh: #1279: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:24 EST 2016 ssl.sh: #1280: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:24 EST 2016 ssl.sh: #1281: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:25 EST 2016 ssl.sh: #1282: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:26 EST 2016 ssl.sh: #1283: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:26 EST 2016 ssl.sh: #1284: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18195 found at Fri Jan 8 11:43:27 EST 2016 ssl.sh: #1285: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 18195 at Fri Jan 8 11:43:27 EST 2016 kill -USR1 18195 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18195 killed at Fri Jan 8 11:43:27 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:43:27 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:43:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:43:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1286: Waiting for Server - FAILED kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:33 EST 2016 selfserv_9159 with PID 19634 started at Fri Jan 8 11:43:33 EST 2016 Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:34 EST 2016 ssl.sh: #1287: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:34 EST 2016 ssl.sh: #1288: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:35 EST 2016 ssl.sh: #1289: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:35 EST 2016 ssl.sh: #1290: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:36 EST 2016 ssl.sh: #1291: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:37 EST 2016 ssl.sh: #1292: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:37 EST 2016 ssl.sh: #1293: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:38 EST 2016 ssl.sh: #1294: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:38 EST 2016 ssl.sh: #1295: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:39 EST 2016 ssl.sh: #1296: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:39 EST 2016 ssl.sh: #1297: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:40 EST 2016 ssl.sh: #1298: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:40 EST 2016 ssl.sh: #1299: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:41 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1300: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:42 EST 2016 ssl.sh: #1301: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:42 EST 2016 ssl.sh: #1302: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:43 EST 2016 ssl.sh: #1303: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:43 EST 2016 ssl.sh: #1304: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:44 EST 2016 ssl.sh: #1305: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:44 EST 2016 ssl.sh: #1306: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:45 EST 2016 ssl.sh: #1307: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:45 EST 2016 ssl.sh: #1308: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:46 EST 2016 ssl.sh: #1309: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:47 EST 2016 ssl.sh: #1310: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:47 EST 2016 ssl.sh: #1311: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:48 EST 2016 ssl.sh: #1312: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:48 EST 2016 ssl.sh: #1313: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:49 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1314: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:49 EST 2016 ssl.sh: #1315: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:50 EST 2016 ssl.sh: #1316: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:50 EST 2016 ssl.sh: #1317: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:51 EST 2016 ssl.sh: #1318: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:51 EST 2016 ssl.sh: #1319: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:52 EST 2016 ssl.sh: #1320: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:53 EST 2016 ssl.sh: #1321: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:53 EST 2016 ssl.sh: #1322: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:54 EST 2016 ssl.sh: #1323: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:54 EST 2016 ssl.sh: #1324: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:55 EST 2016 ssl.sh: #1325: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:55 EST 2016 ssl.sh: #1326: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19634 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19634 found at Fri Jan 8 11:43:56 EST 2016 ssl.sh: #1327: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 19634 at Fri Jan 8 11:43:56 EST 2016 kill -USR1 19634 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19634 killed at Fri Jan 8 11:43:56 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:43:57 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:43:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:44:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1328: Waiting for Server - FAILED kill -0 21073 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21073 found at Fri Jan 8 11:44:02 EST 2016 selfserv_9159 with PID 21073 started at Fri Jan 8 11:44:02 EST 2016 trying to kill selfserv_9159 with PID 21073 at Fri Jan 8 11:44:02 EST 2016 kill -USR1 21073 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21073 killed at Fri Jan 8 11:44:03 EST 2016 selfserv_9159 starting at Fri Jan 8 11:44:03 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:44:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:44:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1329: Waiting for Server - FAILED kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:09 EST 2016 selfserv_9159 with PID 21128 started at Fri Jan 8 11:44:09 EST 2016 Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:09 EST 2016 ssl.sh: #1330: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:10 EST 2016 ssl.sh: #1331: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:10 EST 2016 ssl.sh: #1332: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:11 EST 2016 ssl.sh: #1333: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:12 EST 2016 ssl.sh: #1334: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:12 EST 2016 ssl.sh: #1335: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:13 EST 2016 ssl.sh: #1336: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:13 EST 2016 ssl.sh: #1337: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:14 EST 2016 ssl.sh: #1338: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:14 EST 2016 ssl.sh: #1339: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:15 EST 2016 ssl.sh: #1340: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:16 EST 2016 ssl.sh: #1341: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:16 EST 2016 ssl.sh: #1342: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:17 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1343: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:17 EST 2016 ssl.sh: #1344: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:18 EST 2016 ssl.sh: #1345: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:18 EST 2016 ssl.sh: #1346: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:19 EST 2016 ssl.sh: #1347: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:19 EST 2016 ssl.sh: #1348: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:20 EST 2016 ssl.sh: #1349: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:20 EST 2016 ssl.sh: #1350: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:21 EST 2016 ssl.sh: #1351: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:22 EST 2016 ssl.sh: #1352: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:22 EST 2016 ssl.sh: #1353: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:23 EST 2016 ssl.sh: #1354: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:23 EST 2016 ssl.sh: #1355: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:24 EST 2016 ssl.sh: #1356: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:24 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1357: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:25 EST 2016 ssl.sh: #1358: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:25 EST 2016 ssl.sh: #1359: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:26 EST 2016 ssl.sh: #1360: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:27 EST 2016 ssl.sh: #1361: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:27 EST 2016 ssl.sh: #1362: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:28 EST 2016 ssl.sh: #1363: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:28 EST 2016 ssl.sh: #1364: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:29 EST 2016 ssl.sh: #1365: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:29 EST 2016 ssl.sh: #1366: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:30 EST 2016 ssl.sh: #1367: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:30 EST 2016 ssl.sh: #1368: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:31 EST 2016 ssl.sh: #1369: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21128 found at Fri Jan 8 11:44:32 EST 2016 ssl.sh: #1370: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 21128 at Fri Jan 8 11:44:32 EST 2016 kill -USR1 21128 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21128 killed at Fri Jan 8 11:44:32 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:44:32 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:44:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:44:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1371: Waiting for Server - FAILED kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:38 EST 2016 selfserv_9159 with PID 22563 started at Fri Jan 8 11:44:38 EST 2016 Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:39 EST 2016 ssl.sh: #1372: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:39 EST 2016 ssl.sh: #1373: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:40 EST 2016 ssl.sh: #1374: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:40 EST 2016 ssl.sh: #1375: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:41 EST 2016 ssl.sh: #1376: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:41 EST 2016 ssl.sh: #1377: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:42 EST 2016 ssl.sh: #1378: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:42 EST 2016 ssl.sh: #1379: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:43 EST 2016 ssl.sh: #1380: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:44 EST 2016 ssl.sh: #1381: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:44 EST 2016 ssl.sh: #1382: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:45 EST 2016 ssl.sh: #1383: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:45 EST 2016 ssl.sh: #1384: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:46 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1385: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:46 EST 2016 ssl.sh: #1386: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:47 EST 2016 ssl.sh: #1387: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:47 EST 2016 ssl.sh: #1388: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:48 EST 2016 ssl.sh: #1389: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:48 EST 2016 ssl.sh: #1390: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:49 EST 2016 ssl.sh: #1391: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:50 EST 2016 ssl.sh: #1392: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:50 EST 2016 ssl.sh: #1393: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:51 EST 2016 ssl.sh: #1394: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:51 EST 2016 ssl.sh: #1395: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:52 EST 2016 ssl.sh: #1396: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:52 EST 2016 ssl.sh: #1397: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:53 EST 2016 ssl.sh: #1398: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:54 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1399: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:54 EST 2016 ssl.sh: #1400: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:55 EST 2016 ssl.sh: #1401: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:55 EST 2016 ssl.sh: #1402: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:56 EST 2016 ssl.sh: #1403: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:56 EST 2016 ssl.sh: #1404: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:57 EST 2016 ssl.sh: #1405: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:57 EST 2016 ssl.sh: #1406: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:58 EST 2016 ssl.sh: #1407: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:58 EST 2016 ssl.sh: #1408: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:44:59 EST 2016 ssl.sh: #1409: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:45:00 EST 2016 ssl.sh: #1410: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:45:00 EST 2016 ssl.sh: #1411: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22563 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22563 found at Fri Jan 8 11:45:01 EST 2016 ssl.sh: #1412: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 22563 at Fri Jan 8 11:45:01 EST 2016 kill -USR1 22563 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22563 killed at Fri Jan 8 11:45:01 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:45:01 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:45:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:45:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1413: Waiting for Server - FAILED kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:07 EST 2016 selfserv_9159 with PID 24000 started at Fri Jan 8 11:45:07 EST 2016 Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:08 EST 2016 ssl.sh: #1414: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:08 EST 2016 ssl.sh: #1415: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:09 EST 2016 ssl.sh: #1416: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:09 EST 2016 ssl.sh: #1417: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:10 EST 2016 ssl.sh: #1418: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:11 EST 2016 ssl.sh: #1419: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:11 EST 2016 ssl.sh: #1420: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:12 EST 2016 ssl.sh: #1421: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:12 EST 2016 ssl.sh: #1422: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:13 EST 2016 ssl.sh: #1423: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:13 EST 2016 ssl.sh: #1424: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:14 EST 2016 ssl.sh: #1425: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:14 EST 2016 ssl.sh: #1426: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:15 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1427: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:16 EST 2016 ssl.sh: #1428: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:16 EST 2016 ssl.sh: #1429: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:17 EST 2016 ssl.sh: #1430: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:17 EST 2016 ssl.sh: #1431: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:18 EST 2016 ssl.sh: #1432: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:18 EST 2016 ssl.sh: #1433: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:19 EST 2016 ssl.sh: #1434: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:19 EST 2016 ssl.sh: #1435: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:20 EST 2016 ssl.sh: #1436: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:20 EST 2016 ssl.sh: #1437: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:21 EST 2016 ssl.sh: #1438: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:22 EST 2016 ssl.sh: #1439: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:22 EST 2016 ssl.sh: #1440: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:23 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1441: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:23 EST 2016 ssl.sh: #1442: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:24 EST 2016 ssl.sh: #1443: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:24 EST 2016 ssl.sh: #1444: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:25 EST 2016 ssl.sh: #1445: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:25 EST 2016 ssl.sh: #1446: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:26 EST 2016 ssl.sh: #1447: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:27 EST 2016 ssl.sh: #1448: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:27 EST 2016 ssl.sh: #1449: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:28 EST 2016 ssl.sh: #1450: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:28 EST 2016 ssl.sh: #1451: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:29 EST 2016 ssl.sh: #1452: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:29 EST 2016 ssl.sh: #1453: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24000 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24000 found at Fri Jan 8 11:45:30 EST 2016 ssl.sh: #1454: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 24000 at Fri Jan 8 11:45:30 EST 2016 kill -USR1 24000 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24000 killed at Fri Jan 8 11:45:30 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:45:31 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:45:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:45:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1455: Waiting for Server - FAILED kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:36 EST 2016 selfserv_9159 with PID 25442 started at Fri Jan 8 11:45:36 EST 2016 Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:37 EST 2016 ssl.sh: #1456: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:38 EST 2016 ssl.sh: #1457: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:38 EST 2016 ssl.sh: #1458: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:39 EST 2016 ssl.sh: #1459: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:39 EST 2016 ssl.sh: #1460: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:40 EST 2016 ssl.sh: #1461: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:40 EST 2016 ssl.sh: #1462: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:41 EST 2016 ssl.sh: #1463: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:41 EST 2016 ssl.sh: #1464: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:42 EST 2016 ssl.sh: #1465: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:43 EST 2016 ssl.sh: #1466: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:43 EST 2016 ssl.sh: #1467: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:44 EST 2016 ssl.sh: #1468: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:44 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1469: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:45 EST 2016 ssl.sh: #1470: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:45 EST 2016 ssl.sh: #1471: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:46 EST 2016 ssl.sh: #1472: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:46 EST 2016 ssl.sh: #1473: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:47 EST 2016 ssl.sh: #1474: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:47 EST 2016 ssl.sh: #1475: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:48 EST 2016 ssl.sh: #1476: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:49 EST 2016 ssl.sh: #1477: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:49 EST 2016 ssl.sh: #1478: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:50 EST 2016 ssl.sh: #1479: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:50 EST 2016 ssl.sh: #1480: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:51 EST 2016 ssl.sh: #1481: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:51 EST 2016 ssl.sh: #1482: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:52 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1483: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:52 EST 2016 ssl.sh: #1484: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:53 EST 2016 ssl.sh: #1485: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:54 EST 2016 ssl.sh: #1486: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:54 EST 2016 ssl.sh: #1487: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:55 EST 2016 ssl.sh: #1488: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:55 EST 2016 ssl.sh: #1489: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:56 EST 2016 ssl.sh: #1490: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:56 EST 2016 ssl.sh: #1491: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:57 EST 2016 ssl.sh: #1492: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:57 EST 2016 ssl.sh: #1493: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:58 EST 2016 ssl.sh: #1494: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:59 EST 2016 ssl.sh: #1495: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25442 found at Fri Jan 8 11:45:59 EST 2016 ssl.sh: #1496: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 25442 at Fri Jan 8 11:45:59 EST 2016 kill -USR1 25442 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25442 killed at Fri Jan 8 11:46:00 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:46:00 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:46:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:46:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1497: Waiting for Server - FAILED kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:06 EST 2016 selfserv_9159 with PID 26877 started at Fri Jan 8 11:46:06 EST 2016 Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:06 EST 2016 ssl.sh: #1498: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:07 EST 2016 ssl.sh: #1499: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:07 EST 2016 ssl.sh: #1500: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:08 EST 2016 ssl.sh: #1501: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:08 EST 2016 ssl.sh: #1502: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:09 EST 2016 ssl.sh: #1503: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:09 EST 2016 ssl.sh: #1504: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:10 EST 2016 ssl.sh: #1505: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:11 EST 2016 ssl.sh: #1506: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:11 EST 2016 ssl.sh: #1507: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:12 EST 2016 ssl.sh: #1508: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:12 EST 2016 ssl.sh: #1509: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:13 EST 2016 ssl.sh: #1510: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:13 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1511: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:14 EST 2016 ssl.sh: #1512: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:14 EST 2016 ssl.sh: #1513: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:15 EST 2016 ssl.sh: #1514: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:16 EST 2016 ssl.sh: #1515: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:16 EST 2016 ssl.sh: #1516: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:17 EST 2016 ssl.sh: #1517: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:17 EST 2016 ssl.sh: #1518: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:18 EST 2016 ssl.sh: #1519: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:18 EST 2016 ssl.sh: #1520: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:19 EST 2016 ssl.sh: #1521: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:19 EST 2016 ssl.sh: #1522: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:20 EST 2016 ssl.sh: #1523: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:21 EST 2016 ssl.sh: #1524: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:21 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1525: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:22 EST 2016 ssl.sh: #1526: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:22 EST 2016 ssl.sh: #1527: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:23 EST 2016 ssl.sh: #1528: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:23 EST 2016 ssl.sh: #1529: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:24 EST 2016 ssl.sh: #1530: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:24 EST 2016 ssl.sh: #1531: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:25 EST 2016 ssl.sh: #1532: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:26 EST 2016 ssl.sh: #1533: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:26 EST 2016 ssl.sh: #1534: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:27 EST 2016 ssl.sh: #1535: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:27 EST 2016 ssl.sh: #1536: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:28 EST 2016 ssl.sh: #1537: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26877 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26877 found at Fri Jan 8 11:46:28 EST 2016 ssl.sh: #1538: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 26877 at Fri Jan 8 11:46:28 EST 2016 kill -USR1 26877 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26877 killed at Fri Jan 8 11:46:29 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:46:29 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:46:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:46:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1539: Waiting for Server - FAILED kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:35 EST 2016 selfserv_9159 with PID 28317 started at Fri Jan 8 11:46:35 EST 2016 Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:35 EST 2016 ssl.sh: #1540: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:36 EST 2016 ssl.sh: #1541: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:36 EST 2016 ssl.sh: #1542: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:37 EST 2016 ssl.sh: #1543: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:38 EST 2016 ssl.sh: #1544: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:38 EST 2016 ssl.sh: #1545: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:39 EST 2016 ssl.sh: #1546: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:39 EST 2016 ssl.sh: #1547: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:40 EST 2016 ssl.sh: #1548: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:40 EST 2016 ssl.sh: #1549: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:41 EST 2016 ssl.sh: #1550: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:42 EST 2016 ssl.sh: #1551: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:42 EST 2016 ssl.sh: #1552: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:43 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1553: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:43 EST 2016 ssl.sh: #1554: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:44 EST 2016 ssl.sh: #1555: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:44 EST 2016 ssl.sh: #1556: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:45 EST 2016 ssl.sh: #1557: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:45 EST 2016 ssl.sh: #1558: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:46 EST 2016 ssl.sh: #1559: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:46 EST 2016 ssl.sh: #1560: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:47 EST 2016 ssl.sh: #1561: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:48 EST 2016 ssl.sh: #1562: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:48 EST 2016 ssl.sh: #1563: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:49 EST 2016 ssl.sh: #1564: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:49 EST 2016 ssl.sh: #1565: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:50 EST 2016 ssl.sh: #1566: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:50 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1567: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:51 EST 2016 ssl.sh: #1568: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:51 EST 2016 ssl.sh: #1569: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:52 EST 2016 ssl.sh: #1570: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:53 EST 2016 ssl.sh: #1571: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:53 EST 2016 ssl.sh: #1572: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:54 EST 2016 ssl.sh: #1573: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:54 EST 2016 ssl.sh: #1574: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:55 EST 2016 ssl.sh: #1575: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:55 EST 2016 ssl.sh: #1576: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:56 EST 2016 ssl.sh: #1577: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:56 EST 2016 ssl.sh: #1578: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:57 EST 2016 ssl.sh: #1579: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28317 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28317 found at Fri Jan 8 11:46:58 EST 2016 ssl.sh: #1580: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 28317 at Fri Jan 8 11:46:58 EST 2016 kill -USR1 28317 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28317 killed at Fri Jan 8 11:46:58 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:46:58 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:46:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:47:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1581: Waiting for Server - FAILED kill -0 29752 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29752 found at Fri Jan 8 11:47:04 EST 2016 selfserv_9159 with PID 29752 started at Fri Jan 8 11:47:04 EST 2016 trying to kill selfserv_9159 with PID 29752 at Fri Jan 8 11:47:04 EST 2016 kill -USR1 29752 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 29752 killed at Fri Jan 8 11:47:05 EST 2016 selfserv_9159 starting at Fri Jan 8 11:47:05 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:47:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:47:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1582: Waiting for Server - FAILED kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:10 EST 2016 selfserv_9159 with PID 29807 started at Fri Jan 8 11:47:11 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:11 EST 2016 ssl.sh: #1583: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:12 EST 2016 ssl.sh: #1584: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:12 EST 2016 ssl.sh: #1585: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:13 EST 2016 ssl.sh: #1586: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:13 EST 2016 ssl.sh: #1587: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:14 EST 2016 ssl.sh: #1588: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:14 EST 2016 ssl.sh: #1589: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:15 EST 2016 ssl.sh: #1590: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:15 EST 2016 ssl.sh: #1591: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:16 EST 2016 ssl.sh: #1592: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:17 EST 2016 ssl.sh: #1593: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:17 EST 2016 ssl.sh: #1594: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:18 EST 2016 ssl.sh: #1595: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:18 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1596: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:19 EST 2016 ssl.sh: #1597: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:19 EST 2016 ssl.sh: #1598: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:20 EST 2016 ssl.sh: #1599: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:20 EST 2016 ssl.sh: #1600: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:21 EST 2016 ssl.sh: #1601: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:22 EST 2016 ssl.sh: #1602: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:22 EST 2016 ssl.sh: #1603: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:23 EST 2016 ssl.sh: #1604: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:23 EST 2016 ssl.sh: #1605: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:24 EST 2016 ssl.sh: #1606: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:24 EST 2016 ssl.sh: #1607: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:25 EST 2016 ssl.sh: #1608: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:26 EST 2016 ssl.sh: #1609: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:26 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1610: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:27 EST 2016 ssl.sh: #1611: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:27 EST 2016 ssl.sh: #1612: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:28 EST 2016 ssl.sh: #1613: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:28 EST 2016 ssl.sh: #1614: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:29 EST 2016 ssl.sh: #1615: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:29 EST 2016 ssl.sh: #1616: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:30 EST 2016 ssl.sh: #1617: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:30 EST 2016 ssl.sh: #1618: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:31 EST 2016 ssl.sh: #1619: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:32 EST 2016 ssl.sh: #1620: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:32 EST 2016 ssl.sh: #1621: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:33 EST 2016 ssl.sh: #1622: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29807 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29807 found at Fri Jan 8 11:47:33 EST 2016 ssl.sh: #1623: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 29807 at Fri Jan 8 11:47:33 EST 2016 kill -USR1 29807 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 29807 killed at Fri Jan 8 11:47:34 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:47:34 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:47:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:47:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1624: Waiting for Server - FAILED kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:40 EST 2016 selfserv_9159 with PID 31242 started at Fri Jan 8 11:47:40 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:40 EST 2016 ssl.sh: #1625: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:41 EST 2016 ssl.sh: #1626: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:41 EST 2016 ssl.sh: #1627: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:42 EST 2016 ssl.sh: #1628: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:42 EST 2016 ssl.sh: #1629: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:43 EST 2016 ssl.sh: #1630: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:44 EST 2016 ssl.sh: #1631: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:44 EST 2016 ssl.sh: #1632: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:45 EST 2016 ssl.sh: #1633: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:45 EST 2016 ssl.sh: #1634: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:46 EST 2016 ssl.sh: #1635: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:46 EST 2016 ssl.sh: #1636: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:47 EST 2016 ssl.sh: #1637: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:48 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1638: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:48 EST 2016 ssl.sh: #1639: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:49 EST 2016 ssl.sh: #1640: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:49 EST 2016 ssl.sh: #1641: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:50 EST 2016 ssl.sh: #1642: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:50 EST 2016 ssl.sh: #1643: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:51 EST 2016 ssl.sh: #1644: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:51 EST 2016 ssl.sh: #1645: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:52 EST 2016 ssl.sh: #1646: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:52 EST 2016 ssl.sh: #1647: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:53 EST 2016 ssl.sh: #1648: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:54 EST 2016 ssl.sh: #1649: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:54 EST 2016 ssl.sh: #1650: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:55 EST 2016 ssl.sh: #1651: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:55 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1652: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:56 EST 2016 ssl.sh: #1653: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:56 EST 2016 ssl.sh: #1654: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:57 EST 2016 ssl.sh: #1655: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:57 EST 2016 ssl.sh: #1656: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:58 EST 2016 ssl.sh: #1657: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:59 EST 2016 ssl.sh: #1658: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:47:59 EST 2016 ssl.sh: #1659: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:48:00 EST 2016 ssl.sh: #1660: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:48:00 EST 2016 ssl.sh: #1661: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:48:01 EST 2016 ssl.sh: #1662: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:48:01 EST 2016 ssl.sh: #1663: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:48:02 EST 2016 ssl.sh: #1664: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31242 found at Fri Jan 8 11:48:03 EST 2016 ssl.sh: #1665: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 31242 at Fri Jan 8 11:48:03 EST 2016 kill -USR1 31242 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 31242 killed at Fri Jan 8 11:48:03 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:48:03 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:48:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:48:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1666: Waiting for Server - FAILED kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:09 EST 2016 selfserv_9159 with PID 32678 started at Fri Jan 8 11:48:09 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:10 EST 2016 ssl.sh: #1667: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:10 EST 2016 ssl.sh: #1668: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:11 EST 2016 ssl.sh: #1669: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:11 EST 2016 ssl.sh: #1670: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:12 EST 2016 ssl.sh: #1671: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:12 EST 2016 ssl.sh: #1672: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:13 EST 2016 ssl.sh: #1673: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:13 EST 2016 ssl.sh: #1674: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:14 EST 2016 ssl.sh: #1675: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:15 EST 2016 ssl.sh: #1676: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:15 EST 2016 ssl.sh: #1677: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:16 EST 2016 ssl.sh: #1678: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:16 EST 2016 ssl.sh: #1679: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:17 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1680: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:17 EST 2016 ssl.sh: #1681: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:18 EST 2016 ssl.sh: #1682: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:18 EST 2016 ssl.sh: #1683: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:19 EST 2016 ssl.sh: #1684: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:20 EST 2016 ssl.sh: #1685: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:20 EST 2016 ssl.sh: #1686: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:21 EST 2016 ssl.sh: #1687: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:21 EST 2016 ssl.sh: #1688: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:22 EST 2016 ssl.sh: #1689: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:22 EST 2016 ssl.sh: #1690: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:23 EST 2016 ssl.sh: #1691: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:24 EST 2016 ssl.sh: #1692: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:24 EST 2016 ssl.sh: #1693: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:25 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1694: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:25 EST 2016 ssl.sh: #1695: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:26 EST 2016 ssl.sh: #1696: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:26 EST 2016 ssl.sh: #1697: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:27 EST 2016 ssl.sh: #1698: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:27 EST 2016 ssl.sh: #1699: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:28 EST 2016 ssl.sh: #1700: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:28 EST 2016 ssl.sh: #1701: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:29 EST 2016 ssl.sh: #1702: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:30 EST 2016 ssl.sh: #1703: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:30 EST 2016 ssl.sh: #1704: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:31 EST 2016 ssl.sh: #1705: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:31 EST 2016 ssl.sh: #1706: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32678 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32678 found at Fri Jan 8 11:48:32 EST 2016 ssl.sh: #1707: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 32678 at Fri Jan 8 11:48:32 EST 2016 kill -USR1 32678 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 32678 killed at Fri Jan 8 11:48:32 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:48:32 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:48:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:48:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1708: Waiting for Server - FAILED kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:38 EST 2016 selfserv_9159 with PID 1675 started at Fri Jan 8 11:48:38 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:39 EST 2016 ssl.sh: #1709: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:39 EST 2016 ssl.sh: #1710: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:40 EST 2016 ssl.sh: #1711: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:41 EST 2016 ssl.sh: #1712: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:41 EST 2016 ssl.sh: #1713: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:42 EST 2016 ssl.sh: #1714: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:42 EST 2016 ssl.sh: #1715: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:43 EST 2016 ssl.sh: #1716: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:43 EST 2016 ssl.sh: #1717: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:44 EST 2016 ssl.sh: #1718: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:44 EST 2016 ssl.sh: #1719: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:45 EST 2016 ssl.sh: #1720: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:46 EST 2016 ssl.sh: #1721: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:46 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1722: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:47 EST 2016 ssl.sh: #1723: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:47 EST 2016 ssl.sh: #1724: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:48 EST 2016 ssl.sh: #1725: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:48 EST 2016 ssl.sh: #1726: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:49 EST 2016 ssl.sh: #1727: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:49 EST 2016 ssl.sh: #1728: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:50 EST 2016 ssl.sh: #1729: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:51 EST 2016 ssl.sh: #1730: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:51 EST 2016 ssl.sh: #1731: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:52 EST 2016 ssl.sh: #1732: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:52 EST 2016 ssl.sh: #1733: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:53 EST 2016 ssl.sh: #1734: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:53 EST 2016 ssl.sh: #1735: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:54 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1736: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:54 EST 2016 ssl.sh: #1737: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:55 EST 2016 ssl.sh: #1738: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:56 EST 2016 ssl.sh: #1739: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:56 EST 2016 ssl.sh: #1740: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:57 EST 2016 ssl.sh: #1741: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:57 EST 2016 ssl.sh: #1742: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:58 EST 2016 ssl.sh: #1743: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:58 EST 2016 ssl.sh: #1744: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:59 EST 2016 ssl.sh: #1745: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:48:59 EST 2016 ssl.sh: #1746: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:49:00 EST 2016 ssl.sh: #1747: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:49:01 EST 2016 ssl.sh: #1748: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1675 found at Fri Jan 8 11:49:01 EST 2016 ssl.sh: #1749: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 1675 at Fri Jan 8 11:49:01 EST 2016 kill -USR1 1675 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1675 killed at Fri Jan 8 11:49:02 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:49:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:49:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:49:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1750: Waiting for Server - FAILED kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:08 EST 2016 selfserv_9159 with PID 3111 started at Fri Jan 8 11:49:08 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:08 EST 2016 ssl.sh: #1751: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:09 EST 2016 ssl.sh: #1752: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:09 EST 2016 ssl.sh: #1753: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:10 EST 2016 ssl.sh: #1754: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:10 EST 2016 ssl.sh: #1755: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:11 EST 2016 ssl.sh: #1756: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:11 EST 2016 ssl.sh: #1757: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:12 EST 2016 ssl.sh: #1758: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:13 EST 2016 ssl.sh: #1759: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:13 EST 2016 ssl.sh: #1760: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:14 EST 2016 ssl.sh: #1761: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:14 EST 2016 ssl.sh: #1762: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:15 EST 2016 ssl.sh: #1763: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:15 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1764: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:16 EST 2016 ssl.sh: #1765: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:17 EST 2016 ssl.sh: #1766: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:17 EST 2016 ssl.sh: #1767: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:18 EST 2016 ssl.sh: #1768: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:18 EST 2016 ssl.sh: #1769: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:19 EST 2016 ssl.sh: #1770: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:19 EST 2016 ssl.sh: #1771: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:20 EST 2016 ssl.sh: #1772: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:20 EST 2016 ssl.sh: #1773: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:21 EST 2016 ssl.sh: #1774: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:22 EST 2016 ssl.sh: #1775: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:22 EST 2016 ssl.sh: #1776: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:23 EST 2016 ssl.sh: #1777: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:23 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1778: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:24 EST 2016 ssl.sh: #1779: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:24 EST 2016 ssl.sh: #1780: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:25 EST 2016 ssl.sh: #1781: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:25 EST 2016 ssl.sh: #1782: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:26 EST 2016 ssl.sh: #1783: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:27 EST 2016 ssl.sh: #1784: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:27 EST 2016 ssl.sh: #1785: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:28 EST 2016 ssl.sh: #1786: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:28 EST 2016 ssl.sh: #1787: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:29 EST 2016 ssl.sh: #1788: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:29 EST 2016 ssl.sh: #1789: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:30 EST 2016 ssl.sh: #1790: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3111 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3111 found at Fri Jan 8 11:49:31 EST 2016 ssl.sh: #1791: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 3111 at Fri Jan 8 11:49:31 EST 2016 kill -USR1 3111 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3111 killed at Fri Jan 8 11:49:31 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:49:31 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:49:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:49:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1792: Waiting for Server - FAILED kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:37 EST 2016 selfserv_9159 with PID 4550 started at Fri Jan 8 11:49:37 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:37 EST 2016 ssl.sh: #1793: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:38 EST 2016 ssl.sh: #1794: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:39 EST 2016 ssl.sh: #1795: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:39 EST 2016 ssl.sh: #1796: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:40 EST 2016 ssl.sh: #1797: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:40 EST 2016 ssl.sh: #1798: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:41 EST 2016 ssl.sh: #1799: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:41 EST 2016 ssl.sh: #1800: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:42 EST 2016 ssl.sh: #1801: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:42 EST 2016 ssl.sh: #1802: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:43 EST 2016 ssl.sh: #1803: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:44 EST 2016 ssl.sh: #1804: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:44 EST 2016 ssl.sh: #1805: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:45 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1806: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:45 EST 2016 ssl.sh: #1807: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:46 EST 2016 ssl.sh: #1808: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:46 EST 2016 ssl.sh: #1809: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:47 EST 2016 ssl.sh: #1810: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:47 EST 2016 ssl.sh: #1811: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:48 EST 2016 ssl.sh: #1812: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:49 EST 2016 ssl.sh: #1813: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:49 EST 2016 ssl.sh: #1814: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:50 EST 2016 ssl.sh: #1815: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:50 EST 2016 ssl.sh: #1816: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:51 EST 2016 ssl.sh: #1817: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:51 EST 2016 ssl.sh: #1818: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:52 EST 2016 ssl.sh: #1819: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:52 EST 2016 ================= CRL Reloaded ============= ssl.sh: #1820: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:53 EST 2016 ssl.sh: #1821: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:54 EST 2016 ssl.sh: #1822: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:54 EST 2016 ssl.sh: #1823: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:55 EST 2016 ssl.sh: #1824: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:55 EST 2016 ssl.sh: #1825: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:56 EST 2016 ssl.sh: #1826: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:56 EST 2016 ssl.sh: #1827: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:57 EST 2016 ssl.sh: #1828: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:57 EST 2016 ssl.sh: #1829: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:58 EST 2016 ssl.sh: #1830: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:59 EST 2016 ssl.sh: #1831: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:49:59 EST 2016 ssl.sh: #1832: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4550 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4550 found at Fri Jan 8 11:50:00 EST 2016 ssl.sh: #1833: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 4550 at Fri Jan 8 11:50:00 EST 2016 kill -USR1 4550 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4550 killed at Fri Jan 8 11:50:00 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:50:00 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:50:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:50:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1834: Waiting for Server - FAILED kill -0 5986 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5986 found at Fri Jan 8 11:50:06 EST 2016 selfserv_9159 with PID 5986 started at Fri Jan 8 11:50:06 EST 2016 trying to kill selfserv_9159 with PID 5986 at Fri Jan 8 11:50:06 EST 2016 kill -USR1 5986 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5986 killed at Fri Jan 8 11:50:07 EST 2016 ssl.sh: SSL Cipher Coverage - server bypass/client normal - with ECC =============================== selfserv_9159 starting at Fri Jan 8 11:50:07 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:50:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:50:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #1835: Waiting for Server - FAILED kill -0 6047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:13 EST 2016 selfserv_9159 with PID 6047 started at Fri Jan 8 11:50:13 EST 2016 ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1836: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1837: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1838: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1839: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1840: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1841: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1842: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1843: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1844: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1845: SSL3_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1846: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1847: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1848: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1849: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1850: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1851: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1852: TLS_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1853: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1854: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1855: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1856: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1857: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1858: TLS_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1859: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1860: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1861: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1862: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1863: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1864: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1865: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1866: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1867: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1868: TLS11_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1869: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1870: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1871: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1872: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1873: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1874: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1875: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1876: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1877: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1878: TLS12_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1879: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1880: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1881: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1882: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1883: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1884: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1885: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1886: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1887: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1888: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1889: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1890: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1891: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1892: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1893: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1894: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1895: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1896: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1897: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1898: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1899: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1900: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1901: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1902: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 6047 >/dev/null 2>/dev/null selfserv_9159 with PID 6047 found at Fri Jan 8 11:50:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1903: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 6047 at Fri Jan 8 11:50:49 EST 2016 kill -USR1 6047 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6047 killed at Fri Jan 8 11:50:50 EST 2016 ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 11:50:50 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:50:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:50:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1904: Waiting for Server - FAILED kill -0 8147 >/dev/null 2>/dev/null selfserv_9159 with PID 8147 found at Fri Jan 8 11:50:56 EST 2016 selfserv_9159 with PID 8147 started at Fri Jan 8 11:50:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1905: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 8147 >/dev/null 2>/dev/null selfserv_9159 with PID 8147 found at Fri Jan 8 11:50:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1906: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 8147 >/dev/null 2>/dev/null selfserv_9159 with PID 8147 found at Fri Jan 8 11:50:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1907: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 8147 >/dev/null 2>/dev/null selfserv_9159 with PID 8147 found at Fri Jan 8 11:50:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1908: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 8147 >/dev/null 2>/dev/null selfserv_9159 with PID 8147 found at Fri Jan 8 11:50:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1909: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 8147 at Fri Jan 8 11:50:58 EST 2016 kill -USR1 8147 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8147 killed at Fri Jan 8 11:50:59 EST 2016 ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 11:50:59 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:50:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:51:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1910: Waiting for Server - FAILED kill -0 8312 >/dev/null 2>/dev/null selfserv_9159 with PID 8312 found at Fri Jan 8 11:51:04 EST 2016 selfserv_9159 with PID 8312 started at Fri Jan 8 11:51:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1911: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 8312 >/dev/null 2>/dev/null selfserv_9159 with PID 8312 found at Fri Jan 8 11:51:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1912: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 8312 >/dev/null 2>/dev/null selfserv_9159 with PID 8312 found at Fri Jan 8 11:51:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1913: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 8312 >/dev/null 2>/dev/null selfserv_9159 with PID 8312 found at Fri Jan 8 11:51:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1914: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 8312 >/dev/null 2>/dev/null selfserv_9159 with PID 8312 found at Fri Jan 8 11:51:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1915: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 8312 >/dev/null 2>/dev/null selfserv_9159 with PID 8312 found at Fri Jan 8 11:51:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1916: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 8312 >/dev/null 2>/dev/null selfserv_9159 with PID 8312 found at Fri Jan 8 11:51:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1917: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 8312 >/dev/null 2>/dev/null selfserv_9159 with PID 8312 found at Fri Jan 8 11:51:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1918: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 8312 >/dev/null 2>/dev/null selfserv_9159 with PID 8312 found at Fri Jan 8 11:51:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1919: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 8312 >/dev/null 2>/dev/null selfserv_9159 with PID 8312 found at Fri Jan 8 11:51:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1920: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 8312 >/dev/null 2>/dev/null selfserv_9159 with PID 8312 found at Fri Jan 8 11:51:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1921: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 8312 >/dev/null 2>/dev/null selfserv_9159 with PID 8312 found at Fri Jan 8 11:51:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1922: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 8312 >/dev/null 2>/dev/null selfserv_9159 with PID 8312 found at Fri Jan 8 11:51:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1923: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 8312 >/dev/null 2>/dev/null selfserv_9159 with PID 8312 found at Fri Jan 8 11:51:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1924: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 8312 >/dev/null 2>/dev/null selfserv_9159 with PID 8312 found at Fri Jan 8 11:51:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1925: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 8312 at Fri Jan 8 11:51:12 EST 2016 kill -USR1 8312 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8312 killed at Fri Jan 8 11:51:13 EST 2016 ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 11:51:13 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:51:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:51:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1926: Waiting for Server - FAILED kill -0 8727 >/dev/null 2>/dev/null selfserv_9159 with PID 8727 found at Fri Jan 8 11:51:19 EST 2016 selfserv_9159 with PID 8727 started at Fri Jan 8 11:51:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1927: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 8727 >/dev/null 2>/dev/null selfserv_9159 with PID 8727 found at Fri Jan 8 11:51:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1928: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 8727 >/dev/null 2>/dev/null selfserv_9159 with PID 8727 found at Fri Jan 8 11:51:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1929: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 8727 >/dev/null 2>/dev/null selfserv_9159 with PID 8727 found at Fri Jan 8 11:51:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1930: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 8727 >/dev/null 2>/dev/null selfserv_9159 with PID 8727 found at Fri Jan 8 11:51:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1931: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 8727 at Fri Jan 8 11:51:21 EST 2016 kill -USR1 8727 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8727 killed at Fri Jan 8 11:51:22 EST 2016 ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 11:51:22 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:51:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:51:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1932: Waiting for Server - FAILED kill -0 8892 >/dev/null 2>/dev/null selfserv_9159 with PID 8892 found at Fri Jan 8 11:51:28 EST 2016 selfserv_9159 with PID 8892 started at Fri Jan 8 11:51:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1933: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 8892 >/dev/null 2>/dev/null selfserv_9159 with PID 8892 found at Fri Jan 8 11:51:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1934: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 8892 >/dev/null 2>/dev/null selfserv_9159 with PID 8892 found at Fri Jan 8 11:51:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1935: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 8892 >/dev/null 2>/dev/null selfserv_9159 with PID 8892 found at Fri Jan 8 11:51:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1936: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 8892 >/dev/null 2>/dev/null selfserv_9159 with PID 8892 found at Fri Jan 8 11:51:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1937: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 8892 >/dev/null 2>/dev/null selfserv_9159 with PID 8892 found at Fri Jan 8 11:51:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1938: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 8892 >/dev/null 2>/dev/null selfserv_9159 with PID 8892 found at Fri Jan 8 11:51:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1939: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 8892 >/dev/null 2>/dev/null selfserv_9159 with PID 8892 found at Fri Jan 8 11:51:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1940: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 8892 >/dev/null 2>/dev/null selfserv_9159 with PID 8892 found at Fri Jan 8 11:51:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1941: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 8892 >/dev/null 2>/dev/null selfserv_9159 with PID 8892 found at Fri Jan 8 11:51:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1942: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 8892 >/dev/null 2>/dev/null selfserv_9159 with PID 8892 found at Fri Jan 8 11:51:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1943: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 8892 >/dev/null 2>/dev/null selfserv_9159 with PID 8892 found at Fri Jan 8 11:51:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1944: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 8892 >/dev/null 2>/dev/null selfserv_9159 with PID 8892 found at Fri Jan 8 11:51:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1945: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 8892 >/dev/null 2>/dev/null selfserv_9159 with PID 8892 found at Fri Jan 8 11:51:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1946: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 8892 >/dev/null 2>/dev/null selfserv_9159 with PID 8892 found at Fri Jan 8 11:51:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1947: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 8892 at Fri Jan 8 11:51:35 EST 2016 kill -USR1 8892 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8892 killed at Fri Jan 8 11:51:36 EST 2016 ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 11:51:36 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:51:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:51:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1948: Waiting for Server - FAILED kill -0 9306 >/dev/null 2>/dev/null selfserv_9159 with PID 9306 found at Fri Jan 8 11:51:42 EST 2016 selfserv_9159 with PID 9306 started at Fri Jan 8 11:51:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1949: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 9306 >/dev/null 2>/dev/null selfserv_9159 with PID 9306 found at Fri Jan 8 11:51:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1950: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9306 >/dev/null 2>/dev/null selfserv_9159 with PID 9306 found at Fri Jan 8 11:51:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1951: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 9306 >/dev/null 2>/dev/null selfserv_9159 with PID 9306 found at Fri Jan 8 11:51:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1952: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 9306 >/dev/null 2>/dev/null selfserv_9159 with PID 9306 found at Fri Jan 8 11:51:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1953: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 9306 at Fri Jan 8 11:51:44 EST 2016 kill -USR1 9306 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9306 killed at Fri Jan 8 11:51:45 EST 2016 ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 11:51:45 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:51:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:51:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1954: Waiting for Server - FAILED kill -0 9474 >/dev/null 2>/dev/null selfserv_9159 with PID 9474 found at Fri Jan 8 11:51:51 EST 2016 selfserv_9159 with PID 9474 started at Fri Jan 8 11:51:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1955: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 9474 >/dev/null 2>/dev/null selfserv_9159 with PID 9474 found at Fri Jan 8 11:51:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1956: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9474 >/dev/null 2>/dev/null selfserv_9159 with PID 9474 found at Fri Jan 8 11:51:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1957: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 9474 >/dev/null 2>/dev/null selfserv_9159 with PID 9474 found at Fri Jan 8 11:51:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1958: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 9474 >/dev/null 2>/dev/null selfserv_9159 with PID 9474 found at Fri Jan 8 11:51:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1959: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 9474 >/dev/null 2>/dev/null selfserv_9159 with PID 9474 found at Fri Jan 8 11:51:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1960: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 9474 >/dev/null 2>/dev/null selfserv_9159 with PID 9474 found at Fri Jan 8 11:51:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1961: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 9474 >/dev/null 2>/dev/null selfserv_9159 with PID 9474 found at Fri Jan 8 11:51:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1962: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 9474 >/dev/null 2>/dev/null selfserv_9159 with PID 9474 found at Fri Jan 8 11:51:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1963: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 9474 >/dev/null 2>/dev/null selfserv_9159 with PID 9474 found at Fri Jan 8 11:51:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1964: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 9474 >/dev/null 2>/dev/null selfserv_9159 with PID 9474 found at Fri Jan 8 11:51:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1965: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 9474 >/dev/null 2>/dev/null selfserv_9159 with PID 9474 found at Fri Jan 8 11:51:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1966: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 9474 >/dev/null 2>/dev/null selfserv_9159 with PID 9474 found at Fri Jan 8 11:51:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1967: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 9474 at Fri Jan 8 11:51:57 EST 2016 kill -USR1 9474 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9474 killed at Fri Jan 8 11:51:58 EST 2016 ssl.sh: SSL Client Authentication - server bypass/client normal - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:51:58 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:51:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:52:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1968: Waiting for Server - FAILED kill -0 9882 >/dev/null 2>/dev/null selfserv_9159 with PID 9882 found at Fri Jan 8 11:52:04 EST 2016 selfserv_9159 with PID 9882 started at Fri Jan 8 11:52:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1969: TLS Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 9882 at Fri Jan 8 11:52:04 EST 2016 kill -USR1 9882 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9882 killed at Fri Jan 8 11:52:05 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:52:05 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:52:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:52:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1970: Waiting for Server - FAILED kill -0 9951 >/dev/null 2>/dev/null selfserv_9159 with PID 9951 found at Fri Jan 8 11:52:11 EST 2016 selfserv_9159 with PID 9951 started at Fri Jan 8 11:52:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1971: TLS Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 9951 at Fri Jan 8 11:52:11 EST 2016 kill -USR1 9951 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9951 killed at Fri Jan 8 11:52:12 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:52:12 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:52:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:52:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1972: Waiting for Server - FAILED kill -0 10021 >/dev/null 2>/dev/null selfserv_9159 with PID 10021 found at Fri Jan 8 11:52:18 EST 2016 selfserv_9159 with PID 10021 started at Fri Jan 8 11:52:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1973: TLS Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 10021 at Fri Jan 8 11:52:18 EST 2016 kill -USR1 10021 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10021 killed at Fri Jan 8 11:52:19 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:52:19 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:52:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:52:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1974: Waiting for Server - FAILED kill -0 10090 >/dev/null 2>/dev/null selfserv_9159 with PID 10090 found at Fri Jan 8 11:52:25 EST 2016 selfserv_9159 with PID 10090 started at Fri Jan 8 11:52:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1975: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 10090 at Fri Jan 8 11:52:25 EST 2016 kill -USR1 10090 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10090 killed at Fri Jan 8 11:52:26 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:52:26 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:52:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:52:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1976: Waiting for Server - FAILED kill -0 10159 >/dev/null 2>/dev/null selfserv_9159 with PID 10159 found at Fri Jan 8 11:52:32 EST 2016 selfserv_9159 with PID 10159 started at Fri Jan 8 11:52:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1977: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 10159 at Fri Jan 8 11:52:32 EST 2016 kill -USR1 10159 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10159 killed at Fri Jan 8 11:52:32 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:52:33 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:52:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:52:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1978: Waiting for Server - FAILED kill -0 10229 >/dev/null 2>/dev/null selfserv_9159 with PID 10229 found at Fri Jan 8 11:52:38 EST 2016 selfserv_9159 with PID 10229 started at Fri Jan 8 11:52:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1979: TLS Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 10229 at Fri Jan 8 11:52:39 EST 2016 kill -USR1 10229 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10229 killed at Fri Jan 8 11:52:39 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:52:39 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:52:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:52:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1980: Waiting for Server - FAILED kill -0 10299 >/dev/null 2>/dev/null selfserv_9159 with PID 10299 found at Fri Jan 8 11:52:45 EST 2016 selfserv_9159 with PID 10299 started at Fri Jan 8 11:52:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1981: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 10299 at Fri Jan 8 11:52:46 EST 2016 kill -USR1 10299 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10299 killed at Fri Jan 8 11:52:46 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:52:46 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:52:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:52:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1982: Waiting for Server - FAILED kill -0 10368 >/dev/null 2>/dev/null selfserv_9159 with PID 10368 found at Fri Jan 8 11:52:52 EST 2016 selfserv_9159 with PID 10368 started at Fri Jan 8 11:52:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1983: SSL3 Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 10368 at Fri Jan 8 11:52:53 EST 2016 kill -USR1 10368 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10368 killed at Fri Jan 8 11:52:53 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:52:53 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:52:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:52:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1984: Waiting for Server - FAILED kill -0 10438 >/dev/null 2>/dev/null selfserv_9159 with PID 10438 found at Fri Jan 8 11:52:59 EST 2016 selfserv_9159 with PID 10438 started at Fri Jan 8 11:52:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1985: SSL3 Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 10438 at Fri Jan 8 11:53:00 EST 2016 kill -USR1 10438 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10438 killed at Fri Jan 8 11:53:00 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:53:00 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:53:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:53:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1986: Waiting for Server - FAILED kill -0 10507 >/dev/null 2>/dev/null selfserv_9159 with PID 10507 found at Fri Jan 8 11:53:06 EST 2016 selfserv_9159 with PID 10507 started at Fri Jan 8 11:53:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1987: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 10507 at Fri Jan 8 11:53:07 EST 2016 kill -USR1 10507 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10507 killed at Fri Jan 8 11:53:07 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:53:07 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:53:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:53:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1988: Waiting for Server - FAILED kill -0 10576 >/dev/null 2>/dev/null selfserv_9159 with PID 10576 found at Fri Jan 8 11:53:13 EST 2016 selfserv_9159 with PID 10576 started at Fri Jan 8 11:53:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1989: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 10576 at Fri Jan 8 11:53:13 EST 2016 kill -USR1 10576 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10576 killed at Fri Jan 8 11:53:14 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:53:14 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:53:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:53:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1990: Waiting for Server - FAILED kill -0 10646 >/dev/null 2>/dev/null selfserv_9159 with PID 10646 found at Fri Jan 8 11:53:20 EST 2016 selfserv_9159 with PID 10646 started at Fri Jan 8 11:53:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1991: SSL3 Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 10646 at Fri Jan 8 11:53:20 EST 2016 kill -USR1 10646 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10646 killed at Fri Jan 8 11:53:21 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:53:21 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:53:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:53:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1992: Waiting for Server - FAILED kill -0 10715 >/dev/null 2>/dev/null selfserv_9159 with PID 10715 found at Fri Jan 8 11:53:27 EST 2016 selfserv_9159 with PID 10715 started at Fri Jan 8 11:53:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1993: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 10715 at Fri Jan 8 11:53:27 EST 2016 kill -USR1 10715 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10715 killed at Fri Jan 8 11:53:28 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:53:28 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:53:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:53:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1994: Waiting for Server - FAILED kill -0 10784 >/dev/null 2>/dev/null selfserv_9159 with PID 10784 found at Fri Jan 8 11:53:34 EST 2016 selfserv_9159 with PID 10784 started at Fri Jan 8 11:53:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1995: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 10784 at Fri Jan 8 11:53:34 EST 2016 kill -USR1 10784 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10784 killed at Fri Jan 8 11:53:35 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:53:35 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:53:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:53:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1996: Waiting for Server - FAILED kill -0 10854 >/dev/null 2>/dev/null selfserv_9159 with PID 10854 found at Fri Jan 8 11:53:41 EST 2016 selfserv_9159 with PID 10854 started at Fri Jan 8 11:53:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1997: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 10854 at Fri Jan 8 11:53:41 EST 2016 kill -USR1 10854 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10854 killed at Fri Jan 8 11:53:42 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:53:42 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:53:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:53:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1998: Waiting for Server - FAILED kill -0 10923 >/dev/null 2>/dev/null selfserv_9159 with PID 10923 found at Fri Jan 8 11:53:48 EST 2016 selfserv_9159 with PID 10923 started at Fri Jan 8 11:53:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1999: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 10923 at Fri Jan 8 11:53:48 EST 2016 kill -USR1 10923 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10923 killed at Fri Jan 8 11:53:48 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:53:49 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:53:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:53:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2000: Waiting for Server - FAILED kill -0 10992 >/dev/null 2>/dev/null selfserv_9159 with PID 10992 found at Fri Jan 8 11:53:54 EST 2016 selfserv_9159 with PID 10992 started at Fri Jan 8 11:53:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2001: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 10992 at Fri Jan 8 11:53:55 EST 2016 kill -USR1 10992 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10992 killed at Fri Jan 8 11:53:55 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:53:55 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:53:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:54:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2002: Waiting for Server - FAILED kill -0 11062 >/dev/null 2>/dev/null selfserv_9159 with PID 11062 found at Fri Jan 8 11:54:01 EST 2016 selfserv_9159 with PID 11062 started at Fri Jan 8 11:54:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2003: TLS Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11062 at Fri Jan 8 11:54:02 EST 2016 kill -USR1 11062 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11062 killed at Fri Jan 8 11:54:02 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:54:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:54:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:54:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2004: Waiting for Server - FAILED kill -0 11131 >/dev/null 2>/dev/null selfserv_9159 with PID 11131 found at Fri Jan 8 11:54:08 EST 2016 selfserv_9159 with PID 11131 started at Fri Jan 8 11:54:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2005: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11131 at Fri Jan 8 11:54:09 EST 2016 kill -USR1 11131 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11131 killed at Fri Jan 8 11:54:09 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:54:09 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:54:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:54:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2006: Waiting for Server - FAILED kill -0 11200 >/dev/null 2>/dev/null selfserv_9159 with PID 11200 found at Fri Jan 8 11:54:15 EST 2016 selfserv_9159 with PID 11200 started at Fri Jan 8 11:54:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2007: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11200 at Fri Jan 8 11:54:16 EST 2016 kill -USR1 11200 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11200 killed at Fri Jan 8 11:54:16 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:54:16 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:54:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:54:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2008: Waiting for Server - FAILED kill -0 11270 >/dev/null 2>/dev/null selfserv_9159 with PID 11270 found at Fri Jan 8 11:54:22 EST 2016 selfserv_9159 with PID 11270 started at Fri Jan 8 11:54:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2009: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11270 at Fri Jan 8 11:54:23 EST 2016 kill -USR1 11270 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11270 killed at Fri Jan 8 11:54:23 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:54:23 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:54:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:54:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2010: Waiting for Server - FAILED kill -0 11339 >/dev/null 2>/dev/null selfserv_9159 with PID 11339 found at Fri Jan 8 11:54:29 EST 2016 selfserv_9159 with PID 11339 started at Fri Jan 8 11:54:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2011: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 11339 at Fri Jan 8 11:54:29 EST 2016 kill -USR1 11339 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11339 killed at Fri Jan 8 11:54:30 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:54:30 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:54:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:54:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2012: Waiting for Server - FAILED kill -0 11408 >/dev/null 2>/dev/null selfserv_9159 with PID 11408 found at Fri Jan 8 11:54:36 EST 2016 selfserv_9159 with PID 11408 started at Fri Jan 8 11:54:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2013: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 11408 at Fri Jan 8 11:54:36 EST 2016 kill -USR1 11408 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11408 killed at Fri Jan 8 11:54:37 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:54:37 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:54:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:54:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2014: Waiting for Server - FAILED kill -0 11478 >/dev/null 2>/dev/null selfserv_9159 with PID 11478 found at Fri Jan 8 11:54:43 EST 2016 selfserv_9159 with PID 11478 started at Fri Jan 8 11:54:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2015: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11478 at Fri Jan 8 11:54:43 EST 2016 kill -USR1 11478 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11478 killed at Fri Jan 8 11:54:44 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:54:44 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:54:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:54:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2016: Waiting for Server - FAILED kill -0 11547 >/dev/null 2>/dev/null selfserv_9159 with PID 11547 found at Fri Jan 8 11:54:50 EST 2016 selfserv_9159 with PID 11547 started at Fri Jan 8 11:54:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2017: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11547 at Fri Jan 8 11:54:50 EST 2016 kill -USR1 11547 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11547 killed at Fri Jan 8 11:54:51 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:54:51 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:54:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:54:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2018: Waiting for Server - FAILED kill -0 11616 >/dev/null 2>/dev/null selfserv_9159 with PID 11616 found at Fri Jan 8 11:54:57 EST 2016 selfserv_9159 with PID 11616 started at Fri Jan 8 11:54:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2019: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11616 at Fri Jan 8 11:54:57 EST 2016 kill -USR1 11616 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11616 killed at Fri Jan 8 11:54:58 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:54:58 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:54:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:55:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2020: Waiting for Server - FAILED kill -0 11686 >/dev/null 2>/dev/null selfserv_9159 with PID 11686 found at Fri Jan 8 11:55:03 EST 2016 selfserv_9159 with PID 11686 started at Fri Jan 8 11:55:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2021: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11686 at Fri Jan 8 11:55:04 EST 2016 kill -USR1 11686 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11686 killed at Fri Jan 8 11:55:04 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 11:55:05 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:55:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:55:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2022: Waiting for Server - FAILED kill -0 11755 >/dev/null 2>/dev/null selfserv_9159 with PID 11755 found at Fri Jan 8 11:55:10 EST 2016 selfserv_9159 with PID 11755 started at Fri Jan 8 11:55:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2023: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 11755 at Fri Jan 8 11:55:11 EST 2016 kill -USR1 11755 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11755 killed at Fri Jan 8 11:55:11 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:55:11 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:55:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:55:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2024: Waiting for Server - FAILED kill -0 11825 >/dev/null 2>/dev/null selfserv_9159 with PID 11825 found at Fri Jan 8 11:55:17 EST 2016 selfserv_9159 with PID 11825 started at Fri Jan 8 11:55:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2025: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 11825 at Fri Jan 8 11:55:18 EST 2016 kill -USR1 11825 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11825 killed at Fri Jan 8 11:55:18 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:55:18 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:55:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:55:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2026: Waiting for Server - FAILED kill -0 11895 >/dev/null 2>/dev/null selfserv_9159 with PID 11895 found at Fri Jan 8 11:55:24 EST 2016 selfserv_9159 with PID 11895 started at Fri Jan 8 11:55:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2027: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11895 at Fri Jan 8 11:55:25 EST 2016 kill -USR1 11895 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11895 killed at Fri Jan 8 11:55:25 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:55:25 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:55:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:55:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2028: Waiting for Server - FAILED kill -0 11979 >/dev/null 2>/dev/null selfserv_9159 with PID 11979 found at Fri Jan 8 11:55:31 EST 2016 selfserv_9159 with PID 11979 started at Fri Jan 8 11:55:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2029: TLS Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11979 at Fri Jan 8 11:55:32 EST 2016 kill -USR1 11979 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11979 killed at Fri Jan 8 11:55:32 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:55:32 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:55:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:55:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2030: Waiting for Server - FAILED kill -0 12048 >/dev/null 2>/dev/null selfserv_9159 with PID 12048 found at Fri Jan 8 11:55:38 EST 2016 selfserv_9159 with PID 12048 started at Fri Jan 8 11:55:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2031: TLS Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 12048 at Fri Jan 8 11:55:39 EST 2016 kill -USR1 12048 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12048 killed at Fri Jan 8 11:55:39 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:55:39 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:55:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:55:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2032: Waiting for Server - FAILED kill -0 12118 >/dev/null 2>/dev/null selfserv_9159 with PID 12118 found at Fri Jan 8 11:55:45 EST 2016 selfserv_9159 with PID 12118 started at Fri Jan 8 11:55:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2033: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 12118 at Fri Jan 8 11:55:46 EST 2016 kill -USR1 12118 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12118 killed at Fri Jan 8 11:55:46 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:55:46 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:55:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:55:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2034: Waiting for Server - FAILED kill -0 12187 >/dev/null 2>/dev/null selfserv_9159 with PID 12187 found at Fri Jan 8 11:55:52 EST 2016 selfserv_9159 with PID 12187 started at Fri Jan 8 11:55:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2035: TLS Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 12187 at Fri Jan 8 11:55:52 EST 2016 kill -USR1 12187 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12187 killed at Fri Jan 8 11:55:53 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:55:53 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:55:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:55:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2036: Waiting for Server - FAILED kill -0 12256 >/dev/null 2>/dev/null selfserv_9159 with PID 12256 found at Fri Jan 8 11:55:59 EST 2016 selfserv_9159 with PID 12256 started at Fri Jan 8 11:55:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2037: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 12256 at Fri Jan 8 11:55:59 EST 2016 kill -USR1 12256 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12256 killed at Fri Jan 8 11:56:00 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:56:00 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:56:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:56:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2038: Waiting for Server - FAILED kill -0 12326 >/dev/null 2>/dev/null selfserv_9159 with PID 12326 found at Fri Jan 8 11:56:06 EST 2016 selfserv_9159 with PID 12326 started at Fri Jan 8 11:56:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2039: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 12326 at Fri Jan 8 11:56:06 EST 2016 kill -USR1 12326 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12326 killed at Fri Jan 8 11:56:07 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:56:07 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:56:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:56:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2040: Waiting for Server - FAILED kill -0 12395 >/dev/null 2>/dev/null selfserv_9159 with PID 12395 found at Fri Jan 8 11:56:13 EST 2016 selfserv_9159 with PID 12395 started at Fri Jan 8 11:56:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2041: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 12395 at Fri Jan 8 11:56:13 EST 2016 kill -USR1 12395 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12395 killed at Fri Jan 8 11:56:14 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:56:14 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:56:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:56:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2042: Waiting for Server - FAILED kill -0 12464 >/dev/null 2>/dev/null selfserv_9159 with PID 12464 found at Fri Jan 8 11:56:20 EST 2016 selfserv_9159 with PID 12464 started at Fri Jan 8 11:56:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2043: SSL3 Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 12464 at Fri Jan 8 11:56:20 EST 2016 kill -USR1 12464 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12464 killed at Fri Jan 8 11:56:20 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:56:21 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:56:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:56:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2044: Waiting for Server - FAILED kill -0 12534 >/dev/null 2>/dev/null selfserv_9159 with PID 12534 found at Fri Jan 8 11:56:26 EST 2016 selfserv_9159 with PID 12534 started at Fri Jan 8 11:56:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2045: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 12534 at Fri Jan 8 11:56:27 EST 2016 kill -USR1 12534 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12534 killed at Fri Jan 8 11:56:27 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:56:27 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:56:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:56:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2046: Waiting for Server - FAILED kill -0 12603 >/dev/null 2>/dev/null selfserv_9159 with PID 12603 found at Fri Jan 8 11:56:33 EST 2016 selfserv_9159 with PID 12603 started at Fri Jan 8 11:56:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2047: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 12603 at Fri Jan 8 11:56:34 EST 2016 kill -USR1 12603 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12603 killed at Fri Jan 8 11:56:34 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:56:34 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:56:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:56:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2048: Waiting for Server - FAILED kill -0 12672 >/dev/null 2>/dev/null selfserv_9159 with PID 12672 found at Fri Jan 8 11:56:40 EST 2016 selfserv_9159 with PID 12672 started at Fri Jan 8 11:56:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2049: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 12672 at Fri Jan 8 11:56:41 EST 2016 kill -USR1 12672 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12672 killed at Fri Jan 8 11:56:41 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:56:41 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:56:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:56:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2050: Waiting for Server - FAILED kill -0 12742 >/dev/null 2>/dev/null selfserv_9159 with PID 12742 found at Fri Jan 8 11:56:47 EST 2016 selfserv_9159 with PID 12742 started at Fri Jan 8 11:56:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2051: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 12742 at Fri Jan 8 11:56:48 EST 2016 kill -USR1 12742 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12742 killed at Fri Jan 8 11:56:48 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:56:48 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:56:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:56:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2052: Waiting for Server - FAILED kill -0 12811 >/dev/null 2>/dev/null selfserv_9159 with PID 12811 found at Fri Jan 8 11:56:54 EST 2016 selfserv_9159 with PID 12811 started at Fri Jan 8 11:56:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2053: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 12811 at Fri Jan 8 11:56:55 EST 2016 kill -USR1 12811 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12811 killed at Fri Jan 8 11:56:55 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:56:55 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:56:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:57:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2054: Waiting for Server - FAILED kill -0 12880 >/dev/null 2>/dev/null selfserv_9159 with PID 12880 found at Fri Jan 8 11:57:01 EST 2016 selfserv_9159 with PID 12880 started at Fri Jan 8 11:57:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2055: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 12880 at Fri Jan 8 11:57:01 EST 2016 kill -USR1 12880 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12880 killed at Fri Jan 8 11:57:02 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:57:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:57:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:57:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2056: Waiting for Server - FAILED kill -0 12950 >/dev/null 2>/dev/null selfserv_9159 with PID 12950 found at Fri Jan 8 11:57:08 EST 2016 selfserv_9159 with PID 12950 started at Fri Jan 8 11:57:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2057: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 12950 at Fri Jan 8 11:57:08 EST 2016 kill -USR1 12950 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12950 killed at Fri Jan 8 11:57:09 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:57:09 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:57:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:57:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2058: Waiting for Server - FAILED kill -0 13019 >/dev/null 2>/dev/null selfserv_9159 with PID 13019 found at Fri Jan 8 11:57:15 EST 2016 selfserv_9159 with PID 13019 started at Fri Jan 8 11:57:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2059: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 13019 at Fri Jan 8 11:57:15 EST 2016 kill -USR1 13019 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13019 killed at Fri Jan 8 11:57:16 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:57:16 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:57:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:57:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2060: Waiting for Server - FAILED kill -0 13088 >/dev/null 2>/dev/null selfserv_9159 with PID 13088 found at Fri Jan 8 11:57:22 EST 2016 selfserv_9159 with PID 13088 started at Fri Jan 8 11:57:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2061: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 13088 at Fri Jan 8 11:57:22 EST 2016 kill -USR1 13088 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13088 killed at Fri Jan 8 11:57:23 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:57:23 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:57:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:57:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2062: Waiting for Server - FAILED kill -0 13158 >/dev/null 2>/dev/null selfserv_9159 with PID 13158 found at Fri Jan 8 11:57:29 EST 2016 selfserv_9159 with PID 13158 started at Fri Jan 8 11:57:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2063: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 13158 at Fri Jan 8 11:57:29 EST 2016 kill -USR1 13158 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13158 killed at Fri Jan 8 11:57:30 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 11:57:30 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:57:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:57:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2064: Waiting for Server - FAILED kill -0 13227 >/dev/null 2>/dev/null selfserv_9159 with PID 13227 found at Fri Jan 8 11:57:36 EST 2016 selfserv_9159 with PID 13227 started at Fri Jan 8 11:57:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2065: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 13227 at Fri Jan 8 11:57:36 EST 2016 kill -USR1 13227 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13227 killed at Fri Jan 8 11:57:36 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 11:57:37 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:57:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:57:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2066: Waiting for Server - FAILED kill -0 13296 >/dev/null 2>/dev/null selfserv_9159 with PID 13296 found at Fri Jan 8 11:57:42 EST 2016 selfserv_9159 with PID 13296 started at Fri Jan 8 11:57:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2067: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 13296 at Fri Jan 8 11:57:43 EST 2016 kill -USR1 13296 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13296 killed at Fri Jan 8 11:57:43 EST 2016 ssl.sh: TLS Server hello response without SNI ---- selfserv_9159 starting at Fri Jan 8 11:57:44 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:57:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:57:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2068: Waiting for Server - FAILED kill -0 13387 >/dev/null 2>/dev/null selfserv_9159 with PID 13387 found at Fri Jan 8 11:57:49 EST 2016 selfserv_9159 with PID 13387 started at Fri Jan 8 11:57:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2069: TLS Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 13387 at Fri Jan 8 11:57:50 EST 2016 kill -USR1 13387 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13387 killed at Fri Jan 8 11:57:50 EST 2016 ssl.sh: TLS Server hello response with SNI ---- selfserv_9159 starting at Fri Jan 8 11:57:50 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:57:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:57:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2070: Waiting for Server - FAILED kill -0 13462 >/dev/null 2>/dev/null selfserv_9159 with PID 13462 found at Fri Jan 8 11:57:56 EST 2016 selfserv_9159 with PID 13462 started at Fri Jan 8 11:57:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2071: TLS Server hello response with SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 13462 at Fri Jan 8 11:57:57 EST 2016 kill -USR1 13462 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13462 killed at Fri Jan 8 11:57:57 EST 2016 ssl.sh: TLS Server response with alert ---- selfserv_9159 starting at Fri Jan 8 11:57:57 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:57:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:58:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2072: Waiting for Server - FAILED kill -0 13537 >/dev/null 2>/dev/null selfserv_9159 with PID 13537 found at Fri Jan 8 11:58:03 EST 2016 selfserv_9159 with PID 13537 started at Fri Jan 8 11:58:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2073: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 13537 at Fri Jan 8 11:58:04 EST 2016 kill -USR1 13537 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13537 killed at Fri Jan 8 11:58:04 EST 2016 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9159 starting at Fri Jan 8 11:58:04 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:58:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:58:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2074: Waiting for Server - FAILED kill -0 13613 >/dev/null 2>/dev/null selfserv_9159 with PID 13613 found at Fri Jan 8 11:58:10 EST 2016 selfserv_9159 with PID 13613 started at Fri Jan 8 11:58:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2075: SSL3 Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 13613 at Fri Jan 8 11:58:11 EST 2016 kill -USR1 13613 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13613 killed at Fri Jan 8 11:58:11 EST 2016 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9159 starting at Fri Jan 8 11:58:11 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:58:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:58:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2076: Waiting for Server - FAILED kill -0 13688 >/dev/null 2>/dev/null selfserv_9159 with PID 13688 found at Fri Jan 8 11:58:17 EST 2016 selfserv_9159 with PID 13688 started at Fri Jan 8 11:58:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c vssl3 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2077: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 13688 at Fri Jan 8 11:58:18 EST 2016 kill -USR1 13688 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13688 killed at Fri Jan 8 11:58:18 EST 2016 ssl.sh: TLS Server hello response without SNI ---- selfserv_9159 starting at Fri Jan 8 11:58:18 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:58:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:58:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2078: Waiting for Server - FAILED kill -0 13763 >/dev/null 2>/dev/null selfserv_9159 with PID 13763 found at Fri Jan 8 11:58:24 EST 2016 selfserv_9159 with PID 13763 started at Fri Jan 8 11:58:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2079: TLS Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 13763 at Fri Jan 8 11:58:25 EST 2016 kill -USR1 13763 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13763 killed at Fri Jan 8 11:58:25 EST 2016 ssl.sh: TLS Server hello response with SNI ---- selfserv_9159 starting at Fri Jan 8 11:58:25 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:58:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:58:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2080: Waiting for Server - FAILED kill -0 13839 >/dev/null 2>/dev/null selfserv_9159 with PID 13839 found at Fri Jan 8 11:58:31 EST 2016 selfserv_9159 with PID 13839 started at Fri Jan 8 11:58:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2081: TLS Server hello response with SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 13839 at Fri Jan 8 11:58:32 EST 2016 kill -USR1 13839 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13839 killed at Fri Jan 8 11:58:32 EST 2016 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9159 starting at Fri Jan 8 11:58:32 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:58:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:58:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2082: Waiting for Server - FAILED kill -0 13914 >/dev/null 2>/dev/null selfserv_9159 with PID 13914 found at Fri Jan 8 11:58:38 EST 2016 selfserv_9159 with PID 13914 started at Fri Jan 8 11:58:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2083: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 13914 at Fri Jan 8 11:58:38 EST 2016 kill -USR1 13914 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13914 killed at Fri Jan 8 11:58:39 EST 2016 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9159 starting at Fri Jan 8 11:58:39 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:58:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:58:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2084: Waiting for Server - FAILED kill -0 13989 >/dev/null 2>/dev/null selfserv_9159 with PID 13989 found at Fri Jan 8 11:58:45 EST 2016 selfserv_9159 with PID 13989 started at Fri Jan 8 11:58:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2085: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 13989 at Fri Jan 8 11:58:45 EST 2016 kill -USR1 13989 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13989 killed at Fri Jan 8 11:58:46 EST 2016 ssl.sh: TLS Server response with alert ---- selfserv_9159 starting at Fri Jan 8 11:58:46 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:58:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:58:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2086: Waiting for Server - FAILED kill -0 14065 >/dev/null 2>/dev/null selfserv_9159 with PID 14065 found at Fri Jan 8 11:58:52 EST 2016 selfserv_9159 with PID 14065 started at Fri Jan 8 11:58:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2087: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 14065 at Fri Jan 8 11:58:52 EST 2016 kill -USR1 14065 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14065 killed at Fri Jan 8 11:58:53 EST 2016 ssl.sh: SSL Cert Status (OCSP Stapling) - server bypass/client normal - with ECC =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9159 starting at Fri Jan 8 11:58:53 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T good \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:58:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:58:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2088: Waiting for Server - FAILED kill -0 14126 >/dev/null 2>/dev/null selfserv_9159 with PID 14126 found at Fri Jan 8 11:58:59 EST 2016 selfserv_9159 with PID 14126 started at Fri Jan 8 11:58:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2089: OCSP stapling, signed response, good status produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 14126 at Fri Jan 8 11:58:59 EST 2016 kill -USR1 14126 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14126 killed at Fri Jan 8 11:59:00 EST 2016 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9159 starting at Fri Jan 8 11:59:00 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T revoked \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:59:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:59:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2090: Waiting for Server - FAILED kill -0 14187 >/dev/null 2>/dev/null selfserv_9159 with PID 14187 found at Fri Jan 8 11:59:06 EST 2016 selfserv_9159 with PID 14187 started at Fri Jan 8 11:59:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2091: OCSP stapling, signed response, revoked status produced a returncode of 1, expected is 3 - FAILED trying to kill selfserv_9159 with PID 14187 at Fri Jan 8 11:59:06 EST 2016 kill -USR1 14187 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14187 killed at Fri Jan 8 11:59:07 EST 2016 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9159 starting at Fri Jan 8 11:59:07 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T unknown \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:59:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:59:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2092: Waiting for Server - FAILED kill -0 14249 >/dev/null 2>/dev/null selfserv_9159 with PID 14249 found at Fri Jan 8 11:59:12 EST 2016 selfserv_9159 with PID 14249 started at Fri Jan 8 11:59:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2093: OCSP stapling, signed response, unknown status produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9159 with PID 14249 at Fri Jan 8 11:59:13 EST 2016 kill -USR1 14249 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14249 killed at Fri Jan 8 11:59:13 EST 2016 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9159 starting at Fri Jan 8 11:59:13 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T failure \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:59:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:59:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2094: Waiting for Server - FAILED kill -0 14310 >/dev/null 2>/dev/null selfserv_9159 with PID 14310 found at Fri Jan 8 11:59:19 EST 2016 selfserv_9159 with PID 14310 started at Fri Jan 8 11:59:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2095: OCSP stapling, unsigned failure response produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9159 with PID 14310 at Fri Jan 8 11:59:20 EST 2016 kill -USR1 14310 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14310 killed at Fri Jan 8 11:59:20 EST 2016 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9159 starting at Fri Jan 8 11:59:20 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T badsig \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:59:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:59:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2096: Waiting for Server - FAILED kill -0 14371 >/dev/null 2>/dev/null selfserv_9159 with PID 14371 found at Fri Jan 8 11:59:26 EST 2016 selfserv_9159 with PID 14371 started at Fri Jan 8 11:59:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2097: OCSP stapling, good status, bad signature produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9159 with PID 14371 at Fri Jan 8 11:59:27 EST 2016 kill -USR1 14371 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14371 killed at Fri Jan 8 11:59:27 EST 2016 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9159 starting at Fri Jan 8 11:59:27 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T corrupted \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:59:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:59:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2098: Waiting for Server - FAILED kill -0 14433 >/dev/null 2>/dev/null selfserv_9159 with PID 14433 found at Fri Jan 8 11:59:33 EST 2016 selfserv_9159 with PID 14433 started at Fri Jan 8 11:59:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2099: OCSP stapling, invalid cert status data produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9159 with PID 14433 at Fri Jan 8 11:59:34 EST 2016 kill -USR1 14433 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14433 killed at Fri Jan 8 11:59:34 EST 2016 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9159 starting at Fri Jan 8 11:59:34 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:59:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:59:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2100: Waiting for Server - FAILED kill -0 14494 >/dev/null 2>/dev/null selfserv_9159 with PID 14494 found at Fri Jan 8 11:59:40 EST 2016 selfserv_9159 with PID 14494 started at Fri Jan 8 11:59:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2101: Valid cert, Server doesn't staple produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9159 with PID 14494 at Fri Jan 8 11:59:40 EST 2016 kill -USR1 14494 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14494 killed at Fri Jan 8 11:59:41 EST 2016 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9159 starting at Fri Jan 8 11:59:41 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T random \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:59:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:59:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2102: Waiting for Server - FAILED kill -0 14555 >/dev/null 2>/dev/null selfserv_9159 with PID 14555 found at Fri Jan 8 11:59:47 EST 2016 selfserv_9159 with PID 14555 started at Fri Jan 8 11:59:47 EST 2016 strsclnt -q -p 9159 -d ../client -w nss \ -c 1000 -V ssl3: -N -T localhost.localdomain strsclnt started at Fri Jan 8 11:59:47 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 11:59:47 EST 2016 ssl.sh: #2103: Stress OCSP stapling, server uses random status produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 14555 at Fri Jan 8 11:59:47 EST 2016 kill -USR1 14555 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14555 killed at Fri Jan 8 11:59:48 EST 2016 ssl.sh: SSL Stress Test - server bypass/client normal - with ECC =============================== ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9159 starting at Fri Jan 8 11:59:48 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:59:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 11:59:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2104: Waiting for Server - FAILED kill -0 14708 >/dev/null 2>/dev/null selfserv_9159 with PID 14708 found at Fri Jan 8 11:59:54 EST 2016 selfserv_9159 with PID 14708 started at Fri Jan 8 11:59:54 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -c 1000 -C c -V :ssl3 \ localhost.localdomain strsclnt started at Fri Jan 8 11:59:54 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 11:59:55 EST 2016 ssl.sh: #2105: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 14708 at Fri Jan 8 11:59:55 EST 2016 kill -USR1 14708 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14708 killed at Fri Jan 8 11:59:55 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9159 starting at Fri Jan 8 11:59:55 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 11:59:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:00:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2106: Waiting for Server - FAILED kill -0 14787 >/dev/null 2>/dev/null selfserv_9159 with PID 14787 found at Fri Jan 8 12:00:01 EST 2016 selfserv_9159 with PID 14787 started at Fri Jan 8 12:00:01 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Fri Jan 8 12:00:01 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:00:02 EST 2016 ssl.sh: #2107: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 14787 at Fri Jan 8 12:00:02 EST 2016 kill -USR1 14787 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14787 killed at Fri Jan 8 12:00:02 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9159 starting at Fri Jan 8 12:00:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:00:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:00:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2108: Waiting for Server - FAILED kill -0 14867 >/dev/null 2>/dev/null selfserv_9159 with PID 14867 found at Fri Jan 8 12:00:08 EST 2016 selfserv_9159 with PID 14867 started at Fri Jan 8 12:00:08 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Fri Jan 8 12:00:08 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:00:09 EST 2016 ssl.sh: #2109: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 14867 at Fri Jan 8 12:00:09 EST 2016 kill -USR1 14867 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14867 killed at Fri Jan 8 12:00:09 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9159 starting at Fri Jan 8 12:00:09 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:00:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:00:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2110: Waiting for Server - FAILED kill -0 14946 >/dev/null 2>/dev/null selfserv_9159 with PID 14946 found at Fri Jan 8 12:00:15 EST 2016 selfserv_9159 with PID 14946 started at Fri Jan 8 12:00:15 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 12:00:15 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:00:16 EST 2016 ssl.sh: #2111: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 14946 at Fri Jan 8 12:00:16 EST 2016 kill -USR1 14946 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14946 killed at Fri Jan 8 12:00:16 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9159 starting at Fri Jan 8 12:00:16 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:00:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:00:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2112: Waiting for Server - FAILED kill -0 15025 >/dev/null 2>/dev/null selfserv_9159 with PID 15025 found at Fri Jan 8 12:00:22 EST 2016 selfserv_9159 with PID 15025 started at Fri Jan 8 12:00:22 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Fri Jan 8 12:00:22 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:00:23 EST 2016 ssl.sh: #2113: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 15025 at Fri Jan 8 12:00:23 EST 2016 kill -USR1 15025 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15025 killed at Fri Jan 8 12:00:23 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9159 starting at Fri Jan 8 12:00:23 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:00:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:00:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2114: Waiting for Server - FAILED kill -0 15105 >/dev/null 2>/dev/null selfserv_9159 with PID 15105 found at Fri Jan 8 12:00:29 EST 2016 selfserv_9159 with PID 15105 started at Fri Jan 8 12:00:29 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 12:00:29 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:00:30 EST 2016 ssl.sh: #2115: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 15105 at Fri Jan 8 12:00:30 EST 2016 kill -USR1 15105 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15105 killed at Fri Jan 8 12:00:30 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9159 starting at Fri Jan 8 12:00:30 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:00:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:00:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2116: Waiting for Server - FAILED kill -0 15184 >/dev/null 2>/dev/null selfserv_9159 with PID 15184 found at Fri Jan 8 12:00:36 EST 2016 selfserv_9159 with PID 15184 started at Fri Jan 8 12:00:36 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 12:00:36 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:00:37 EST 2016 ssl.sh: #2117: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 15184 at Fri Jan 8 12:00:37 EST 2016 kill -USR1 15184 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15184 killed at Fri Jan 8 12:00:37 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9159 starting at Fri Jan 8 12:00:37 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:00:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:00:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2118: Waiting for Server - FAILED kill -0 15269 >/dev/null 2>/dev/null selfserv_9159 with PID 15269 found at Fri Jan 8 12:00:43 EST 2016 selfserv_9159 with PID 15269 started at Fri Jan 8 12:00:43 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 12:00:43 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:00:44 EST 2016 ssl.sh: #2119: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 15269 at Fri Jan 8 12:00:44 EST 2016 kill -USR1 15269 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15269 killed at Fri Jan 8 12:00:44 EST 2016 ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:00:45 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:00:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:00:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2120: Waiting for Server - FAILED kill -0 15377 >/dev/null 2>/dev/null selfserv_9159 with PID 15377 found at Fri Jan 8 12:00:50 EST 2016 selfserv_9159 with PID 15377 started at Fri Jan 8 12:00:50 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -c 100 -C c -V :ssl3 -N -n TestUser \ localhost.localdomain strsclnt started at Fri Jan 8 12:00:50 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:00:51 EST 2016 ssl.sh: #2121: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 15377 at Fri Jan 8 12:00:51 EST 2016 kill -USR1 15377 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15377 killed at Fri Jan 8 12:00:51 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:00:52 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:00:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:00:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2122: Waiting for Server - FAILED kill -0 15456 >/dev/null 2>/dev/null selfserv_9159 with PID 15456 found at Fri Jan 8 12:00:57 EST 2016 selfserv_9159 with PID 15456 started at Fri Jan 8 12:00:57 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Fri Jan 8 12:00:57 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:00:58 EST 2016 ssl.sh: #2123: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 15456 at Fri Jan 8 12:00:58 EST 2016 kill -USR1 15456 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15456 killed at Fri Jan 8 12:00:58 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:00:59 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:00:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:01:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2124: Waiting for Server - FAILED kill -0 15535 >/dev/null 2>/dev/null selfserv_9159 with PID 15535 found at Fri Jan 8 12:01:04 EST 2016 selfserv_9159 with PID 15535 started at Fri Jan 8 12:01:05 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Fri Jan 8 12:01:05 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:01:05 EST 2016 ssl.sh: #2125: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 15535 at Fri Jan 8 12:01:05 EST 2016 kill -USR1 15535 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15535 killed at Fri Jan 8 12:01:06 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:01:06 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:01:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:01:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2126: Waiting for Server - FAILED kill -0 15629 >/dev/null 2>/dev/null selfserv_9159 with PID 15629 found at Fri Jan 8 12:01:12 EST 2016 selfserv_9159 with PID 15629 started at Fri Jan 8 12:01:12 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Fri Jan 8 12:01:12 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:01:12 EST 2016 ssl.sh: #2127: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 15629 at Fri Jan 8 12:01:12 EST 2016 kill -USR1 15629 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15629 killed at Fri Jan 8 12:01:13 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9159 starting at Fri Jan 8 12:01:13 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:01:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:01:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2128: Waiting for Server - FAILED kill -0 15708 >/dev/null 2>/dev/null selfserv_9159 with PID 15708 found at Fri Jan 8 12:01:19 EST 2016 selfserv_9159 with PID 15708 started at Fri Jan 8 12:01:19 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 12:01:19 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:01:19 EST 2016 ssl.sh: #2129: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 15708 at Fri Jan 8 12:01:19 EST 2016 kill -USR1 15708 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15708 killed at Fri Jan 8 12:01:20 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:01:20 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:01:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:01:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2130: Waiting for Server - FAILED kill -0 15787 >/dev/null 2>/dev/null selfserv_9159 with PID 15787 found at Fri Jan 8 12:01:26 EST 2016 selfserv_9159 with PID 15787 started at Fri Jan 8 12:01:26 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 12:01:26 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:01:26 EST 2016 ssl.sh: #2131: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 15787 at Fri Jan 8 12:01:26 EST 2016 kill -USR1 15787 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15787 killed at Fri Jan 8 12:01:27 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9159 starting at Fri Jan 8 12:01:27 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:01:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:01:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2132: Waiting for Server - FAILED kill -0 15867 >/dev/null 2>/dev/null selfserv_9159 with PID 15867 found at Fri Jan 8 12:01:33 EST 2016 selfserv_9159 with PID 15867 started at Fri Jan 8 12:01:33 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 12:01:33 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:01:33 EST 2016 ssl.sh: #2133: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 15867 at Fri Jan 8 12:01:33 EST 2016 kill -USR1 15867 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15867 killed at Fri Jan 8 12:01:34 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9159 starting at Fri Jan 8 12:01:34 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:01:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:01:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2134: Waiting for Server - FAILED kill -0 15952 >/dev/null 2>/dev/null selfserv_9159 with PID 15952 found at Fri Jan 8 12:01:40 EST 2016 selfserv_9159 with PID 15952 started at Fri Jan 8 12:01:40 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 12:01:40 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:01:40 EST 2016 ssl.sh: #2135: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 15952 at Fri Jan 8 12:01:40 EST 2016 kill -USR1 15952 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15952 killed at Fri Jan 8 12:01:41 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9159 starting at Fri Jan 8 12:01:41 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:01:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:01:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2136: Waiting for Server - FAILED kill -0 16037 >/dev/null 2>/dev/null selfserv_9159 with PID 16037 found at Fri Jan 8 12:01:47 EST 2016 selfserv_9159 with PID 16037 started at Fri Jan 8 12:01:47 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V tls1.0: -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Fri Jan 8 12:01:47 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:01:47 EST 2016 ssl.sh: #2137: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 16037 at Fri Jan 8 12:01:47 EST 2016 kill -USR1 16037 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16037 killed at Fri Jan 8 12:01:48 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:01:48 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:01:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:01:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2138: Waiting for Server - FAILED kill -0 16138 >/dev/null 2>/dev/null selfserv_9159 with PID 16138 found at Fri Jan 8 12:01:54 EST 2016 selfserv_9159 with PID 16138 started at Fri Jan 8 12:01:54 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:01:54 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:01:54 EST 2016 ssl.sh: #2139: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 16138 at Fri Jan 8 12:01:54 EST 2016 kill -USR1 16138 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16138 killed at Fri Jan 8 12:01:55 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:01:55 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:01:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:02:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2140: Waiting for Server - FAILED kill -0 16217 >/dev/null 2>/dev/null selfserv_9159 with PID 16217 found at Fri Jan 8 12:02:01 EST 2016 selfserv_9159 with PID 16217 started at Fri Jan 8 12:02:01 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:02:01 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:02:01 EST 2016 ssl.sh: #2141: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 16217 at Fri Jan 8 12:02:01 EST 2016 kill -USR1 16217 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16217 killed at Fri Jan 8 12:02:02 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:02:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:02:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:02:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2142: Waiting for Server - FAILED kill -0 16296 >/dev/null 2>/dev/null selfserv_9159 with PID 16296 found at Fri Jan 8 12:02:08 EST 2016 selfserv_9159 with PID 16296 started at Fri Jan 8 12:02:08 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:02:08 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:02:08 EST 2016 ssl.sh: #2143: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 16296 at Fri Jan 8 12:02:08 EST 2016 kill -USR1 16296 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16296 killed at Fri Jan 8 12:02:09 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:02:09 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:02:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:02:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2144: Waiting for Server - FAILED kill -0 16376 >/dev/null 2>/dev/null selfserv_9159 with PID 16376 found at Fri Jan 8 12:02:15 EST 2016 selfserv_9159 with PID 16376 started at Fri Jan 8 12:02:15 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:02:15 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:02:15 EST 2016 ssl.sh: #2145: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 16376 at Fri Jan 8 12:02:15 EST 2016 kill -USR1 16376 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16376 killed at Fri Jan 8 12:02:16 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:02:16 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:02:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:02:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2146: Waiting for Server - FAILED kill -0 16455 >/dev/null 2>/dev/null selfserv_9159 with PID 16455 found at Fri Jan 8 12:02:22 EST 2016 selfserv_9159 with PID 16455 started at Fri Jan 8 12:02:22 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:02:22 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:02:22 EST 2016 ssl.sh: #2147: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 16455 at Fri Jan 8 12:02:22 EST 2016 kill -USR1 16455 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16455 killed at Fri Jan 8 12:02:23 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9159 starting at Fri Jan 8 12:02:23 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:02:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:02:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2148: Waiting for Server - FAILED kill -0 16534 >/dev/null 2>/dev/null selfserv_9159 with PID 16534 found at Fri Jan 8 12:02:29 EST 2016 selfserv_9159 with PID 16534 started at Fri Jan 8 12:02:29 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Fri Jan 8 12:02:29 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:02:29 EST 2016 ssl.sh: #2149: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 16534 at Fri Jan 8 12:02:29 EST 2016 kill -USR1 16534 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16534 killed at Fri Jan 8 12:02:30 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9159 starting at Fri Jan 8 12:02:30 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:02:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:02:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2150: Waiting for Server - FAILED kill -0 16614 >/dev/null 2>/dev/null selfserv_9159 with PID 16614 found at Fri Jan 8 12:02:36 EST 2016 selfserv_9159 with PID 16614 started at Fri Jan 8 12:02:36 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Fri Jan 8 12:02:36 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:02:36 EST 2016 ssl.sh: #2151: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 16614 at Fri Jan 8 12:02:36 EST 2016 kill -USR1 16614 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16614 killed at Fri Jan 8 12:02:37 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9159 starting at Fri Jan 8 12:02:37 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:02:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:02:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2152: Waiting for Server - FAILED kill -0 16693 >/dev/null 2>/dev/null selfserv_9159 with PID 16693 found at Fri Jan 8 12:02:43 EST 2016 selfserv_9159 with PID 16693 started at Fri Jan 8 12:02:43 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Fri Jan 8 12:02:43 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:02:43 EST 2016 ssl.sh: #2153: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 16693 at Fri Jan 8 12:02:43 EST 2016 kill -USR1 16693 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16693 killed at Fri Jan 8 12:02:44 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9159 starting at Fri Jan 8 12:02:44 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:02:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:02:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2154: Waiting for Server - FAILED kill -0 16772 >/dev/null 2>/dev/null selfserv_9159 with PID 16772 found at Fri Jan 8 12:02:50 EST 2016 selfserv_9159 with PID 16772 started at Fri Jan 8 12:02:50 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Fri Jan 8 12:02:50 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:02:50 EST 2016 ssl.sh: #2155: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 16772 at Fri Jan 8 12:02:51 EST 2016 kill -USR1 16772 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16772 killed at Fri Jan 8 12:02:51 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9159 starting at Fri Jan 8 12:02:51 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:02:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:02:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2156: Waiting for Server - FAILED kill -0 16852 >/dev/null 2>/dev/null selfserv_9159 with PID 16852 found at Fri Jan 8 12:02:57 EST 2016 selfserv_9159 with PID 16852 started at Fri Jan 8 12:02:57 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Fri Jan 8 12:02:57 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:02:57 EST 2016 ssl.sh: #2157: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 16852 at Fri Jan 8 12:02:58 EST 2016 kill -USR1 16852 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16852 killed at Fri Jan 8 12:02:58 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:02:58 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:02:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:03:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2158: Waiting for Server - FAILED kill -0 16952 >/dev/null 2>/dev/null selfserv_9159 with PID 16952 found at Fri Jan 8 12:03:04 EST 2016 selfserv_9159 with PID 16952 started at Fri Jan 8 12:03:04 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 10 -C :C009 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 12:03:04 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:03:05 EST 2016 ssl.sh: #2159: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 16952 at Fri Jan 8 12:03:05 EST 2016 kill -USR1 16952 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16952 killed at Fri Jan 8 12:03:05 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:03:05 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:03:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:03:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2160: Waiting for Server - FAILED kill -0 17031 >/dev/null 2>/dev/null selfserv_9159 with PID 17031 found at Fri Jan 8 12:03:11 EST 2016 selfserv_9159 with PID 17031 started at Fri Jan 8 12:03:11 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 12:03:11 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:03:12 EST 2016 ssl.sh: #2161: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 17031 at Fri Jan 8 12:03:12 EST 2016 kill -USR1 17031 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17031 killed at Fri Jan 8 12:03:12 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:03:12 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:03:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:03:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2162: Waiting for Server - FAILED kill -0 17111 >/dev/null 2>/dev/null selfserv_9159 with PID 17111 found at Fri Jan 8 12:03:18 EST 2016 selfserv_9159 with PID 17111 started at Fri Jan 8 12:03:18 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 10 -C :C004 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 12:03:18 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:03:19 EST 2016 ssl.sh: #2163: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 17111 at Fri Jan 8 12:03:19 EST 2016 kill -USR1 17111 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17111 killed at Fri Jan 8 12:03:19 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:03:19 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:03:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:03:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2164: Waiting for Server - FAILED kill -0 17190 >/dev/null 2>/dev/null selfserv_9159 with PID 17190 found at Fri Jan 8 12:03:25 EST 2016 selfserv_9159 with PID 17190 started at Fri Jan 8 12:03:25 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 10 -C :C00E -N -n TestUser-ecmixed \ localhost.localdomain strsclnt started at Fri Jan 8 12:03:25 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:03:26 EST 2016 ssl.sh: #2165: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 17190 at Fri Jan 8 12:03:26 EST 2016 kill -USR1 17190 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17190 killed at Fri Jan 8 12:03:26 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9159 starting at Fri Jan 8 12:03:26 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:03:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:03:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2166: Waiting for Server - FAILED kill -0 17269 >/dev/null 2>/dev/null selfserv_9159 with PID 17269 found at Fri Jan 8 12:03:32 EST 2016 selfserv_9159 with PID 17269 started at Fri Jan 8 12:03:32 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 12:03:32 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:03:33 EST 2016 ssl.sh: #2167: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 17269 at Fri Jan 8 12:03:33 EST 2016 kill -USR1 17269 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17269 killed at Fri Jan 8 12:03:33 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:03:33 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:03:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:03:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2168: Waiting for Server - FAILED kill -0 17349 >/dev/null 2>/dev/null selfserv_9159 with PID 17349 found at Fri Jan 8 12:03:39 EST 2016 selfserv_9159 with PID 17349 started at Fri Jan 8 12:03:39 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \ localhost.localdomain strsclnt started at Fri Jan 8 12:03:39 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:03:40 EST 2016 ssl.sh: #2169: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 17349 at Fri Jan 8 12:03:40 EST 2016 kill -USR1 17349 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17349 killed at Fri Jan 8 12:03:40 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:03:40 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:03:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:03:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2170: Waiting for Server - FAILED kill -0 17449 >/dev/null 2>/dev/null selfserv_9159 with PID 17449 found at Fri Jan 8 12:03:46 EST 2016 selfserv_9159 with PID 17449 started at Fri Jan 8 12:03:46 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:03:46 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:03:47 EST 2016 ssl.sh: #2171: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 17449 at Fri Jan 8 12:03:47 EST 2016 kill -USR1 17449 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17449 killed at Fri Jan 8 12:03:47 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9159 starting at Fri Jan 8 12:03:47 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:03:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:03:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2172: Waiting for Server - FAILED kill -0 17528 >/dev/null 2>/dev/null selfserv_9159 with PID 17528 found at Fri Jan 8 12:03:53 EST 2016 selfserv_9159 with PID 17528 started at Fri Jan 8 12:03:53 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Fri Jan 8 12:03:53 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:03:54 EST 2016 ssl.sh: #2173: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 17528 at Fri Jan 8 12:03:54 EST 2016 kill -USR1 17528 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17528 killed at Fri Jan 8 12:03:54 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:03:54 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:03:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:04:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2174: Waiting for Server - FAILED kill -0 17608 >/dev/null 2>/dev/null selfserv_9159 with PID 17608 found at Fri Jan 8 12:04:00 EST 2016 selfserv_9159 with PID 17608 started at Fri Jan 8 12:04:00 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:04:00 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:04:01 EST 2016 ssl.sh: #2175: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 17608 at Fri Jan 8 12:04:01 EST 2016 kill -USR1 17608 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17608 killed at Fri Jan 8 12:04:01 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:04:01 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:04:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:04:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2176: Waiting for Server - FAILED kill -0 17687 >/dev/null 2>/dev/null selfserv_9159 with PID 17687 found at Fri Jan 8 12:04:07 EST 2016 selfserv_9159 with PID 17687 started at Fri Jan 8 12:04:07 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:04:07 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:04:08 EST 2016 ssl.sh: #2177: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 17687 at Fri Jan 8 12:04:08 EST 2016 kill -USR1 17687 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17687 killed at Fri Jan 8 12:04:08 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:04:08 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:04:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:04:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2178: Waiting for Server - FAILED kill -0 17781 >/dev/null 2>/dev/null selfserv_9159 with PID 17781 found at Fri Jan 8 12:04:14 EST 2016 selfserv_9159 with PID 17781 started at Fri Jan 8 12:04:14 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:04:14 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:04:15 EST 2016 ssl.sh: #2179: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 17781 at Fri Jan 8 12:04:15 EST 2016 kill -USR1 17781 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17781 killed at Fri Jan 8 12:04:15 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9159 starting at Fri Jan 8 12:04:16 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:04:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:04:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2180: Waiting for Server - FAILED kill -0 17875 >/dev/null 2>/dev/null selfserv_9159 with PID 17875 found at Fri Jan 8 12:04:21 EST 2016 selfserv_9159 with PID 17875 started at Fri Jan 8 12:04:21 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:04:21 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:04:22 EST 2016 ssl.sh: #2181: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 17875 at Fri Jan 8 12:04:22 EST 2016 kill -USR1 17875 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17875 killed at Fri Jan 8 12:04:22 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:04:23 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:04:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:04:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2182: Waiting for Server - FAILED kill -0 17954 >/dev/null 2>/dev/null selfserv_9159 with PID 17954 found at Fri Jan 8 12:04:28 EST 2016 selfserv_9159 with PID 17954 started at Fri Jan 8 12:04:28 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:04:29 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:04:29 EST 2016 ssl.sh: #2183: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 17954 at Fri Jan 8 12:04:29 EST 2016 kill -USR1 17954 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17954 killed at Fri Jan 8 12:04:29 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:04:30 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:04:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:04:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2184: Waiting for Server - FAILED kill -0 18034 >/dev/null 2>/dev/null selfserv_9159 with PID 18034 found at Fri Jan 8 12:04:35 EST 2016 selfserv_9159 with PID 18034 started at Fri Jan 8 12:04:36 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:04:36 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:04:36 EST 2016 ssl.sh: #2185: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 18034 at Fri Jan 8 12:04:36 EST 2016 kill -USR1 18034 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18034 killed at Fri Jan 8 12:04:36 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:04:37 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:04:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:04:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2186: Waiting for Server - FAILED kill -0 18134 >/dev/null 2>/dev/null selfserv_9159 with PID 18134 found at Fri Jan 8 12:04:43 EST 2016 selfserv_9159 with PID 18134 started at Fri Jan 8 12:04:43 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :0032 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 12:04:43 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:04:43 EST 2016 ssl.sh: #2187: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 18134 at Fri Jan 8 12:04:43 EST 2016 kill -USR1 18134 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18134 killed at Fri Jan 8 12:04:44 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:04:44 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:04:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:04:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2188: Waiting for Server - FAILED kill -0 18213 >/dev/null 2>/dev/null selfserv_9159 with PID 18213 found at Fri Jan 8 12:04:50 EST 2016 selfserv_9159 with PID 18213 started at Fri Jan 8 12:04:50 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 1000 -C :0067 -n TestUser-dsamixed \ localhost.localdomain strsclnt started at Fri Jan 8 12:04:50 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:04:50 EST 2016 ssl.sh: #2189: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 18213 at Fri Jan 8 12:04:50 EST 2016 kill -USR1 18213 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18213 killed at Fri Jan 8 12:04:51 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:04:51 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:04:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:04:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2190: Waiting for Server - FAILED kill -0 18307 >/dev/null 2>/dev/null selfserv_9159 with PID 18307 found at Fri Jan 8 12:04:57 EST 2016 selfserv_9159 with PID 18307 started at Fri Jan 8 12:04:57 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 1000 -C :00A2 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 12:04:57 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:04:57 EST 2016 ssl.sh: #2191: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 18307 at Fri Jan 8 12:04:57 EST 2016 kill -USR1 18307 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18307 killed at Fri Jan 8 12:04:58 EST 2016 ssl.sh: SSL Cipher Coverage Extended Test - server bypass/client normal - with ECC =============================== selfserv_9159 starting at Fri Jan 8 12:04:58 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:04:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:05:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2192: Waiting for Server - FAILED kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:04 EST 2016 selfserv_9159 with PID 18373 started at Fri Jan 8 12:05:04 EST 2016 ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping A SSL2_RC4_128_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping B SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping C SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping D SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping E SSL2_DES_64_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping F SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping B SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping C SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping E SSL2_DES_64_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2193: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2194: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2195: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2196: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2197: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2198: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2199: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2200: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2201: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2202: SSL3_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2203: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2204: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2205: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2206: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2207: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2208: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2209: TLS_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2210: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2211: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2212: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2213: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2214: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2215: TLS_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2216: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2217: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2218: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2219: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2220: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2221: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2222: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2223: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2224: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2225: TLS11_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2226: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2227: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2228: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2229: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2230: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2231: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2232: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2233: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2234: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2235: TLS12_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2236: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2237: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2238: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2239: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2240: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2241: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2242: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2243: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2244: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2245: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2246: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2247: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2248: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2249: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2250: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2251: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2252: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2253: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2254: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2255: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2256: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2257: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2258: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2259: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 18373 >/dev/null 2>/dev/null selfserv_9159 with PID 18373 found at Fri Jan 8 12:05:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2260: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 18373 at Fri Jan 8 12:05:40 EST 2016 kill -USR1 18373 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18373 killed at Fri Jan 8 12:05:41 EST 2016 ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 12:05:41 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:05:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:05:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2261: Waiting for Server - FAILED kill -0 20453 >/dev/null 2>/dev/null selfserv_9159 with PID 20453 found at Fri Jan 8 12:05:47 EST 2016 selfserv_9159 with PID 20453 started at Fri Jan 8 12:05:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2262: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 20453 >/dev/null 2>/dev/null selfserv_9159 with PID 20453 found at Fri Jan 8 12:05:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2263: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 20453 >/dev/null 2>/dev/null selfserv_9159 with PID 20453 found at Fri Jan 8 12:05:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2264: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 20453 >/dev/null 2>/dev/null selfserv_9159 with PID 20453 found at Fri Jan 8 12:05:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2265: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 20453 >/dev/null 2>/dev/null selfserv_9159 with PID 20453 found at Fri Jan 8 12:05:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2266: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 20453 at Fri Jan 8 12:05:49 EST 2016 kill -USR1 20453 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20453 killed at Fri Jan 8 12:05:50 EST 2016 ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 12:05:50 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:05:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:05:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2267: Waiting for Server - FAILED kill -0 20618 >/dev/null 2>/dev/null selfserv_9159 with PID 20618 found at Fri Jan 8 12:05:56 EST 2016 selfserv_9159 with PID 20618 started at Fri Jan 8 12:05:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2268: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 20618 >/dev/null 2>/dev/null selfserv_9159 with PID 20618 found at Fri Jan 8 12:05:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2269: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 20618 >/dev/null 2>/dev/null selfserv_9159 with PID 20618 found at Fri Jan 8 12:05:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2270: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 20618 >/dev/null 2>/dev/null selfserv_9159 with PID 20618 found at Fri Jan 8 12:05:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2271: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 20618 >/dev/null 2>/dev/null selfserv_9159 with PID 20618 found at Fri Jan 8 12:05:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2272: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 20618 >/dev/null 2>/dev/null selfserv_9159 with PID 20618 found at Fri Jan 8 12:05:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2273: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 20618 >/dev/null 2>/dev/null selfserv_9159 with PID 20618 found at Fri Jan 8 12:05:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2274: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 20618 >/dev/null 2>/dev/null selfserv_9159 with PID 20618 found at Fri Jan 8 12:05:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2275: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 20618 >/dev/null 2>/dev/null selfserv_9159 with PID 20618 found at Fri Jan 8 12:06:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2276: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 20618 >/dev/null 2>/dev/null selfserv_9159 with PID 20618 found at Fri Jan 8 12:06:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2277: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 20618 >/dev/null 2>/dev/null selfserv_9159 with PID 20618 found at Fri Jan 8 12:06:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2278: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 20618 >/dev/null 2>/dev/null selfserv_9159 with PID 20618 found at Fri Jan 8 12:06:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2279: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 20618 >/dev/null 2>/dev/null selfserv_9159 with PID 20618 found at Fri Jan 8 12:06:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2280: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 20618 >/dev/null 2>/dev/null selfserv_9159 with PID 20618 found at Fri Jan 8 12:06:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2281: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 20618 >/dev/null 2>/dev/null selfserv_9159 with PID 20618 found at Fri Jan 8 12:06:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2282: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 20618 at Fri Jan 8 12:06:03 EST 2016 kill -USR1 20618 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20618 killed at Fri Jan 8 12:06:04 EST 2016 ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 12:06:04 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:06:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:06:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2283: Waiting for Server - FAILED kill -0 21032 >/dev/null 2>/dev/null selfserv_9159 with PID 21032 found at Fri Jan 8 12:06:10 EST 2016 selfserv_9159 with PID 21032 started at Fri Jan 8 12:06:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2284: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 21032 >/dev/null 2>/dev/null selfserv_9159 with PID 21032 found at Fri Jan 8 12:06:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2285: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 21032 >/dev/null 2>/dev/null selfserv_9159 with PID 21032 found at Fri Jan 8 12:06:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2286: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 21032 >/dev/null 2>/dev/null selfserv_9159 with PID 21032 found at Fri Jan 8 12:06:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2287: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 21032 >/dev/null 2>/dev/null selfserv_9159 with PID 21032 found at Fri Jan 8 12:06:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2288: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 21032 at Fri Jan 8 12:06:12 EST 2016 kill -USR1 21032 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21032 killed at Fri Jan 8 12:06:13 EST 2016 ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 12:06:13 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:06:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:06:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2289: Waiting for Server - FAILED kill -0 21198 >/dev/null 2>/dev/null selfserv_9159 with PID 21198 found at Fri Jan 8 12:06:19 EST 2016 selfserv_9159 with PID 21198 started at Fri Jan 8 12:06:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2290: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 21198 >/dev/null 2>/dev/null selfserv_9159 with PID 21198 found at Fri Jan 8 12:06:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2291: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 21198 >/dev/null 2>/dev/null selfserv_9159 with PID 21198 found at Fri Jan 8 12:06:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2292: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 21198 >/dev/null 2>/dev/null selfserv_9159 with PID 21198 found at Fri Jan 8 12:06:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2293: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 21198 >/dev/null 2>/dev/null selfserv_9159 with PID 21198 found at Fri Jan 8 12:06:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2294: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 21198 >/dev/null 2>/dev/null selfserv_9159 with PID 21198 found at Fri Jan 8 12:06:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2295: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 21198 >/dev/null 2>/dev/null selfserv_9159 with PID 21198 found at Fri Jan 8 12:06:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2296: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 21198 >/dev/null 2>/dev/null selfserv_9159 with PID 21198 found at Fri Jan 8 12:06:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2297: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 21198 >/dev/null 2>/dev/null selfserv_9159 with PID 21198 found at Fri Jan 8 12:06:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2298: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 21198 >/dev/null 2>/dev/null selfserv_9159 with PID 21198 found at Fri Jan 8 12:06:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2299: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 21198 >/dev/null 2>/dev/null selfserv_9159 with PID 21198 found at Fri Jan 8 12:06:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2300: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 21198 >/dev/null 2>/dev/null selfserv_9159 with PID 21198 found at Fri Jan 8 12:06:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2301: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 21198 >/dev/null 2>/dev/null selfserv_9159 with PID 21198 found at Fri Jan 8 12:06:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2302: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 21198 >/dev/null 2>/dev/null selfserv_9159 with PID 21198 found at Fri Jan 8 12:06:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2303: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 21198 >/dev/null 2>/dev/null selfserv_9159 with PID 21198 found at Fri Jan 8 12:06:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2304: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 21198 at Fri Jan 8 12:06:27 EST 2016 kill -USR1 21198 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21198 killed at Fri Jan 8 12:06:27 EST 2016 ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 12:06:27 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:06:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:06:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2305: Waiting for Server - FAILED kill -0 21611 >/dev/null 2>/dev/null selfserv_9159 with PID 21611 found at Fri Jan 8 12:06:33 EST 2016 selfserv_9159 with PID 21611 started at Fri Jan 8 12:06:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2306: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 21611 >/dev/null 2>/dev/null selfserv_9159 with PID 21611 found at Fri Jan 8 12:06:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2307: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 21611 >/dev/null 2>/dev/null selfserv_9159 with PID 21611 found at Fri Jan 8 12:06:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2308: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 21611 >/dev/null 2>/dev/null selfserv_9159 with PID 21611 found at Fri Jan 8 12:06:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2309: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 21611 >/dev/null 2>/dev/null selfserv_9159 with PID 21611 found at Fri Jan 8 12:06:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2310: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 21611 at Fri Jan 8 12:06:36 EST 2016 kill -USR1 21611 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21611 killed at Fri Jan 8 12:06:36 EST 2016 ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 12:06:36 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:06:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:06:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2311: Waiting for Server - FAILED kill -0 21777 >/dev/null 2>/dev/null selfserv_9159 with PID 21777 found at Fri Jan 8 12:06:42 EST 2016 selfserv_9159 with PID 21777 started at Fri Jan 8 12:06:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2312: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 21777 >/dev/null 2>/dev/null selfserv_9159 with PID 21777 found at Fri Jan 8 12:06:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2313: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 21777 >/dev/null 2>/dev/null selfserv_9159 with PID 21777 found at Fri Jan 8 12:06:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2314: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 21777 >/dev/null 2>/dev/null selfserv_9159 with PID 21777 found at Fri Jan 8 12:06:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2315: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 21777 >/dev/null 2>/dev/null selfserv_9159 with PID 21777 found at Fri Jan 8 12:06:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2316: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 21777 >/dev/null 2>/dev/null selfserv_9159 with PID 21777 found at Fri Jan 8 12:06:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2317: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 21777 >/dev/null 2>/dev/null selfserv_9159 with PID 21777 found at Fri Jan 8 12:06:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2318: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 21777 >/dev/null 2>/dev/null selfserv_9159 with PID 21777 found at Fri Jan 8 12:06:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2319: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 21777 >/dev/null 2>/dev/null selfserv_9159 with PID 21777 found at Fri Jan 8 12:06:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2320: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 21777 >/dev/null 2>/dev/null selfserv_9159 with PID 21777 found at Fri Jan 8 12:06:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2321: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 21777 >/dev/null 2>/dev/null selfserv_9159 with PID 21777 found at Fri Jan 8 12:06:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2322: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 21777 >/dev/null 2>/dev/null selfserv_9159 with PID 21777 found at Fri Jan 8 12:06:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2323: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 21777 >/dev/null 2>/dev/null selfserv_9159 with PID 21777 found at Fri Jan 8 12:06:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2324: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 21777 at Fri Jan 8 12:06:49 EST 2016 kill -USR1 21777 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21777 killed at Fri Jan 8 12:06:49 EST 2016 ssl.sh: SSL Client Authentication Extended Test - server bypass/client normal - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:06:49 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:06:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:06:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2325: Waiting for Server - FAILED kill -0 22184 >/dev/null 2>/dev/null selfserv_9159 with PID 22184 found at Fri Jan 8 12:06:55 EST 2016 selfserv_9159 with PID 22184 started at Fri Jan 8 12:06:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2326: TLS Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 22184 at Fri Jan 8 12:06:56 EST 2016 kill -USR1 22184 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22184 killed at Fri Jan 8 12:06:56 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:06:56 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:06:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:07:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2327: Waiting for Server - FAILED kill -0 22254 >/dev/null 2>/dev/null selfserv_9159 with PID 22254 found at Fri Jan 8 12:07:02 EST 2016 selfserv_9159 with PID 22254 started at Fri Jan 8 12:07:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2328: TLS Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 22254 at Fri Jan 8 12:07:03 EST 2016 kill -USR1 22254 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22254 killed at Fri Jan 8 12:07:03 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:07:03 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:07:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:07:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2329: Waiting for Server - FAILED kill -0 22323 >/dev/null 2>/dev/null selfserv_9159 with PID 22323 found at Fri Jan 8 12:07:09 EST 2016 selfserv_9159 with PID 22323 started at Fri Jan 8 12:07:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2330: TLS Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 22323 at Fri Jan 8 12:07:10 EST 2016 kill -USR1 22323 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22323 killed at Fri Jan 8 12:07:10 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:07:10 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:07:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:07:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2331: Waiting for Server - FAILED kill -0 22392 >/dev/null 2>/dev/null selfserv_9159 with PID 22392 found at Fri Jan 8 12:07:16 EST 2016 selfserv_9159 with PID 22392 started at Fri Jan 8 12:07:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2332: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 22392 at Fri Jan 8 12:07:16 EST 2016 kill -USR1 22392 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22392 killed at Fri Jan 8 12:07:17 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:07:17 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:07:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:07:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2333: Waiting for Server - FAILED kill -0 22462 >/dev/null 2>/dev/null selfserv_9159 with PID 22462 found at Fri Jan 8 12:07:23 EST 2016 selfserv_9159 with PID 22462 started at Fri Jan 8 12:07:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2334: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 22462 at Fri Jan 8 12:07:23 EST 2016 kill -USR1 22462 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22462 killed at Fri Jan 8 12:07:24 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:07:24 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:07:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:07:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2335: Waiting for Server - FAILED kill -0 22531 >/dev/null 2>/dev/null selfserv_9159 with PID 22531 found at Fri Jan 8 12:07:30 EST 2016 selfserv_9159 with PID 22531 started at Fri Jan 8 12:07:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2336: TLS Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 22531 at Fri Jan 8 12:07:30 EST 2016 kill -USR1 22531 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22531 killed at Fri Jan 8 12:07:31 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:07:31 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:07:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:07:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2337: Waiting for Server - FAILED kill -0 22600 >/dev/null 2>/dev/null selfserv_9159 with PID 22600 found at Fri Jan 8 12:07:37 EST 2016 selfserv_9159 with PID 22600 started at Fri Jan 8 12:07:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2338: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 22600 at Fri Jan 8 12:07:37 EST 2016 kill -USR1 22600 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22600 killed at Fri Jan 8 12:07:38 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:07:38 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:07:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:07:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2339: Waiting for Server - FAILED kill -0 22670 >/dev/null 2>/dev/null selfserv_9159 with PID 22670 found at Fri Jan 8 12:07:44 EST 2016 selfserv_9159 with PID 22670 started at Fri Jan 8 12:07:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2340: SSL3 Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 22670 at Fri Jan 8 12:07:44 EST 2016 kill -USR1 22670 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22670 killed at Fri Jan 8 12:07:44 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:07:45 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:07:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:07:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2341: Waiting for Server - FAILED kill -0 22739 >/dev/null 2>/dev/null selfserv_9159 with PID 22739 found at Fri Jan 8 12:07:50 EST 2016 selfserv_9159 with PID 22739 started at Fri Jan 8 12:07:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2342: SSL3 Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 22739 at Fri Jan 8 12:07:51 EST 2016 kill -USR1 22739 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22739 killed at Fri Jan 8 12:07:51 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:07:51 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:07:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:07:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2343: Waiting for Server - FAILED kill -0 22808 >/dev/null 2>/dev/null selfserv_9159 with PID 22808 found at Fri Jan 8 12:07:57 EST 2016 selfserv_9159 with PID 22808 started at Fri Jan 8 12:07:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2344: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 22808 at Fri Jan 8 12:07:58 EST 2016 kill -USR1 22808 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22808 killed at Fri Jan 8 12:07:58 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:07:58 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:07:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:08:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2345: Waiting for Server - FAILED kill -0 22878 >/dev/null 2>/dev/null selfserv_9159 with PID 22878 found at Fri Jan 8 12:08:04 EST 2016 selfserv_9159 with PID 22878 started at Fri Jan 8 12:08:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2346: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 22878 at Fri Jan 8 12:08:05 EST 2016 kill -USR1 22878 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22878 killed at Fri Jan 8 12:08:05 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:08:05 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:08:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:08:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2347: Waiting for Server - FAILED kill -0 22947 >/dev/null 2>/dev/null selfserv_9159 with PID 22947 found at Fri Jan 8 12:08:11 EST 2016 selfserv_9159 with PID 22947 started at Fri Jan 8 12:08:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2348: SSL3 Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 22947 at Fri Jan 8 12:08:12 EST 2016 kill -USR1 22947 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22947 killed at Fri Jan 8 12:08:12 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:08:12 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:08:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:08:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2349: Waiting for Server - FAILED kill -0 23016 >/dev/null 2>/dev/null selfserv_9159 with PID 23016 found at Fri Jan 8 12:08:18 EST 2016 selfserv_9159 with PID 23016 started at Fri Jan 8 12:08:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2350: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23016 at Fri Jan 8 12:08:19 EST 2016 kill -USR1 23016 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23016 killed at Fri Jan 8 12:08:19 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:08:19 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:08:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:08:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2351: Waiting for Server - FAILED kill -0 23086 >/dev/null 2>/dev/null selfserv_9159 with PID 23086 found at Fri Jan 8 12:08:25 EST 2016 selfserv_9159 with PID 23086 started at Fri Jan 8 12:08:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2352: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23086 at Fri Jan 8 12:08:26 EST 2016 kill -USR1 23086 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23086 killed at Fri Jan 8 12:08:26 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:08:26 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:08:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:08:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2353: Waiting for Server - FAILED kill -0 23156 >/dev/null 2>/dev/null selfserv_9159 with PID 23156 found at Fri Jan 8 12:08:32 EST 2016 selfserv_9159 with PID 23156 started at Fri Jan 8 12:08:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2354: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23156 at Fri Jan 8 12:08:32 EST 2016 kill -USR1 23156 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23156 killed at Fri Jan 8 12:08:33 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:08:33 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:08:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:08:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2355: Waiting for Server - FAILED kill -0 23225 >/dev/null 2>/dev/null selfserv_9159 with PID 23225 found at Fri Jan 8 12:08:39 EST 2016 selfserv_9159 with PID 23225 started at Fri Jan 8 12:08:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2356: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 23225 at Fri Jan 8 12:08:39 EST 2016 kill -USR1 23225 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23225 killed at Fri Jan 8 12:08:40 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:08:40 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:08:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:08:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2357: Waiting for Server - FAILED kill -0 23295 >/dev/null 2>/dev/null selfserv_9159 with PID 23295 found at Fri Jan 8 12:08:46 EST 2016 selfserv_9159 with PID 23295 started at Fri Jan 8 12:08:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2358: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 23295 at Fri Jan 8 12:08:46 EST 2016 kill -USR1 23295 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23295 killed at Fri Jan 8 12:08:47 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:08:47 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:08:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:08:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2359: Waiting for Server - FAILED kill -0 23364 >/dev/null 2>/dev/null selfserv_9159 with PID 23364 found at Fri Jan 8 12:08:53 EST 2016 selfserv_9159 with PID 23364 started at Fri Jan 8 12:08:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2360: TLS Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23364 at Fri Jan 8 12:08:53 EST 2016 kill -USR1 23364 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23364 killed at Fri Jan 8 12:08:54 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:08:54 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:08:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:08:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2361: Waiting for Server - FAILED kill -0 23433 >/dev/null 2>/dev/null selfserv_9159 with PID 23433 found at Fri Jan 8 12:09:00 EST 2016 selfserv_9159 with PID 23433 started at Fri Jan 8 12:09:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2362: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23433 at Fri Jan 8 12:09:00 EST 2016 kill -USR1 23433 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23433 killed at Fri Jan 8 12:09:01 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:09:01 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:09:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:09:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2363: Waiting for Server - FAILED kill -0 23503 >/dev/null 2>/dev/null selfserv_9159 with PID 23503 found at Fri Jan 8 12:09:07 EST 2016 selfserv_9159 with PID 23503 started at Fri Jan 8 12:09:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2364: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23503 at Fri Jan 8 12:09:07 EST 2016 kill -USR1 23503 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23503 killed at Fri Jan 8 12:09:07 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:09:08 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:09:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:09:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2365: Waiting for Server - FAILED kill -0 23572 >/dev/null 2>/dev/null selfserv_9159 with PID 23572 found at Fri Jan 8 12:09:13 EST 2016 selfserv_9159 with PID 23572 started at Fri Jan 8 12:09:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2366: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23572 at Fri Jan 8 12:09:14 EST 2016 kill -USR1 23572 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23572 killed at Fri Jan 8 12:09:14 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:09:14 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:09:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:09:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2367: Waiting for Server - FAILED kill -0 23641 >/dev/null 2>/dev/null selfserv_9159 with PID 23641 found at Fri Jan 8 12:09:20 EST 2016 selfserv_9159 with PID 23641 started at Fri Jan 8 12:09:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2368: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 23641 at Fri Jan 8 12:09:21 EST 2016 kill -USR1 23641 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23641 killed at Fri Jan 8 12:09:21 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:09:21 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:09:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:09:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2369: Waiting for Server - FAILED kill -0 23711 >/dev/null 2>/dev/null selfserv_9159 with PID 23711 found at Fri Jan 8 12:09:27 EST 2016 selfserv_9159 with PID 23711 started at Fri Jan 8 12:09:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2370: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 23711 at Fri Jan 8 12:09:28 EST 2016 kill -USR1 23711 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23711 killed at Fri Jan 8 12:09:28 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:09:28 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:09:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:09:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2371: Waiting for Server - FAILED kill -0 23780 >/dev/null 2>/dev/null selfserv_9159 with PID 23780 found at Fri Jan 8 12:09:34 EST 2016 selfserv_9159 with PID 23780 started at Fri Jan 8 12:09:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2372: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23780 at Fri Jan 8 12:09:35 EST 2016 kill -USR1 23780 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23780 killed at Fri Jan 8 12:09:35 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:09:35 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:09:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:09:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2373: Waiting for Server - FAILED kill -0 23849 >/dev/null 2>/dev/null selfserv_9159 with PID 23849 found at Fri Jan 8 12:09:41 EST 2016 selfserv_9159 with PID 23849 started at Fri Jan 8 12:09:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2374: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23849 at Fri Jan 8 12:09:42 EST 2016 kill -USR1 23849 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23849 killed at Fri Jan 8 12:09:42 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:09:42 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:09:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:09:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2375: Waiting for Server - FAILED kill -0 23919 >/dev/null 2>/dev/null selfserv_9159 with PID 23919 found at Fri Jan 8 12:09:48 EST 2016 selfserv_9159 with PID 23919 started at Fri Jan 8 12:09:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2376: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23919 at Fri Jan 8 12:09:48 EST 2016 kill -USR1 23919 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23919 killed at Fri Jan 8 12:09:49 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:09:49 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:09:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:09:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2377: Waiting for Server - FAILED kill -0 23988 >/dev/null 2>/dev/null selfserv_9159 with PID 23988 found at Fri Jan 8 12:09:55 EST 2016 selfserv_9159 with PID 23988 started at Fri Jan 8 12:09:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2378: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23988 at Fri Jan 8 12:09:55 EST 2016 kill -USR1 23988 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23988 killed at Fri Jan 8 12:09:56 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:09:56 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:09:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:10:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2379: Waiting for Server - FAILED kill -0 24057 >/dev/null 2>/dev/null selfserv_9159 with PID 24057 found at Fri Jan 8 12:10:02 EST 2016 selfserv_9159 with PID 24057 started at Fri Jan 8 12:10:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2380: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 24057 at Fri Jan 8 12:10:02 EST 2016 kill -USR1 24057 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24057 killed at Fri Jan 8 12:10:03 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:10:03 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:10:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:10:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2381: Waiting for Server - FAILED kill -0 24127 >/dev/null 2>/dev/null selfserv_9159 with PID 24127 found at Fri Jan 8 12:10:09 EST 2016 selfserv_9159 with PID 24127 started at Fri Jan 8 12:10:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2382: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 24127 at Fri Jan 8 12:10:09 EST 2016 kill -USR1 24127 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24127 killed at Fri Jan 8 12:10:10 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:10:10 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:10:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:10:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2383: Waiting for Server - FAILED kill -0 24196 >/dev/null 2>/dev/null selfserv_9159 with PID 24196 found at Fri Jan 8 12:10:16 EST 2016 selfserv_9159 with PID 24196 started at Fri Jan 8 12:10:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2384: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 24196 at Fri Jan 8 12:10:16 EST 2016 kill -USR1 24196 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24196 killed at Fri Jan 8 12:10:17 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:10:17 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:10:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:10:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2385: Waiting for Server - FAILED kill -0 24280 >/dev/null 2>/dev/null selfserv_9159 with PID 24280 found at Fri Jan 8 12:10:23 EST 2016 selfserv_9159 with PID 24280 started at Fri Jan 8 12:10:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2386: TLS Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 24280 at Fri Jan 8 12:10:23 EST 2016 kill -USR1 24280 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24280 killed at Fri Jan 8 12:10:24 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:10:24 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:10:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:10:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2387: Waiting for Server - FAILED kill -0 24350 >/dev/null 2>/dev/null selfserv_9159 with PID 24350 found at Fri Jan 8 12:10:29 EST 2016 selfserv_9159 with PID 24350 started at Fri Jan 8 12:10:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2388: TLS Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 24350 at Fri Jan 8 12:10:30 EST 2016 kill -USR1 24350 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24350 killed at Fri Jan 8 12:10:30 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:10:31 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:10:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:10:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2389: Waiting for Server - FAILED kill -0 24419 >/dev/null 2>/dev/null selfserv_9159 with PID 24419 found at Fri Jan 8 12:10:36 EST 2016 selfserv_9159 with PID 24419 started at Fri Jan 8 12:10:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2390: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 24419 at Fri Jan 8 12:10:37 EST 2016 kill -USR1 24419 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24419 killed at Fri Jan 8 12:10:37 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:10:37 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:10:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:10:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2391: Waiting for Server - FAILED kill -0 24488 >/dev/null 2>/dev/null selfserv_9159 with PID 24488 found at Fri Jan 8 12:10:43 EST 2016 selfserv_9159 with PID 24488 started at Fri Jan 8 12:10:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2392: TLS Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 24488 at Fri Jan 8 12:10:44 EST 2016 kill -USR1 24488 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24488 killed at Fri Jan 8 12:10:44 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:10:44 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:10:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:10:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2393: Waiting for Server - FAILED kill -0 24558 >/dev/null 2>/dev/null selfserv_9159 with PID 24558 found at Fri Jan 8 12:10:50 EST 2016 selfserv_9159 with PID 24558 started at Fri Jan 8 12:10:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2394: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 24558 at Fri Jan 8 12:10:51 EST 2016 kill -USR1 24558 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24558 killed at Fri Jan 8 12:10:51 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:10:51 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:10:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:10:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2395: Waiting for Server - FAILED kill -0 24627 >/dev/null 2>/dev/null selfserv_9159 with PID 24627 found at Fri Jan 8 12:10:57 EST 2016 selfserv_9159 with PID 24627 started at Fri Jan 8 12:10:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2396: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 24627 at Fri Jan 8 12:10:58 EST 2016 kill -USR1 24627 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24627 killed at Fri Jan 8 12:10:58 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:10:58 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:10:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:11:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2397: Waiting for Server - FAILED kill -0 24696 >/dev/null 2>/dev/null selfserv_9159 with PID 24696 found at Fri Jan 8 12:11:04 EST 2016 selfserv_9159 with PID 24696 started at Fri Jan 8 12:11:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2398: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 24696 at Fri Jan 8 12:11:05 EST 2016 kill -USR1 24696 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24696 killed at Fri Jan 8 12:11:05 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:11:05 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:11:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:11:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2399: Waiting for Server - FAILED kill -0 24766 >/dev/null 2>/dev/null selfserv_9159 with PID 24766 found at Fri Jan 8 12:11:11 EST 2016 selfserv_9159 with PID 24766 started at Fri Jan 8 12:11:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2400: SSL3 Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 24766 at Fri Jan 8 12:11:11 EST 2016 kill -USR1 24766 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24766 killed at Fri Jan 8 12:11:12 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:11:12 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:11:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:11:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2401: Waiting for Server - FAILED kill -0 24837 >/dev/null 2>/dev/null selfserv_9159 with PID 24837 found at Fri Jan 8 12:11:18 EST 2016 selfserv_9159 with PID 24837 started at Fri Jan 8 12:11:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2402: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 24837 at Fri Jan 8 12:11:18 EST 2016 kill -USR1 24837 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24837 killed at Fri Jan 8 12:11:19 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:11:19 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:11:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:11:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2403: Waiting for Server - FAILED kill -0 24906 >/dev/null 2>/dev/null selfserv_9159 with PID 24906 found at Fri Jan 8 12:11:25 EST 2016 selfserv_9159 with PID 24906 started at Fri Jan 8 12:11:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2404: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 24906 at Fri Jan 8 12:11:25 EST 2016 kill -USR1 24906 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24906 killed at Fri Jan 8 12:11:26 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:11:26 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:11:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:11:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2405: Waiting for Server - FAILED kill -0 24976 >/dev/null 2>/dev/null selfserv_9159 with PID 24976 found at Fri Jan 8 12:11:32 EST 2016 selfserv_9159 with PID 24976 started at Fri Jan 8 12:11:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2406: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 24976 at Fri Jan 8 12:11:32 EST 2016 kill -USR1 24976 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24976 killed at Fri Jan 8 12:11:33 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:11:33 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:11:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:11:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2407: Waiting for Server - FAILED kill -0 25047 >/dev/null 2>/dev/null selfserv_9159 with PID 25047 found at Fri Jan 8 12:11:39 EST 2016 selfserv_9159 with PID 25047 started at Fri Jan 8 12:11:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2408: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 25047 at Fri Jan 8 12:11:39 EST 2016 kill -USR1 25047 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25047 killed at Fri Jan 8 12:11:40 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:11:40 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:11:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:11:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2409: Waiting for Server - FAILED kill -0 25116 >/dev/null 2>/dev/null selfserv_9159 with PID 25116 found at Fri Jan 8 12:11:46 EST 2016 selfserv_9159 with PID 25116 started at Fri Jan 8 12:11:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2410: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 25116 at Fri Jan 8 12:11:46 EST 2016 kill -USR1 25116 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25116 killed at Fri Jan 8 12:11:46 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:11:47 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:11:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:11:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2411: Waiting for Server - FAILED kill -0 25188 >/dev/null 2>/dev/null selfserv_9159 with PID 25188 found at Fri Jan 8 12:11:52 EST 2016 selfserv_9159 with PID 25188 started at Fri Jan 8 12:11:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2412: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 25188 at Fri Jan 8 12:11:53 EST 2016 kill -USR1 25188 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25188 killed at Fri Jan 8 12:11:53 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:11:53 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:11:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:11:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2413: Waiting for Server - FAILED kill -0 25258 >/dev/null 2>/dev/null selfserv_9159 with PID 25258 found at Fri Jan 8 12:11:59 EST 2016 selfserv_9159 with PID 25258 started at Fri Jan 8 12:11:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2414: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 25258 at Fri Jan 8 12:12:00 EST 2016 kill -USR1 25258 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25258 killed at Fri Jan 8 12:12:00 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:12:00 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:12:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:12:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2415: Waiting for Server - FAILED kill -0 25327 >/dev/null 2>/dev/null selfserv_9159 with PID 25327 found at Fri Jan 8 12:12:06 EST 2016 selfserv_9159 with PID 25327 started at Fri Jan 8 12:12:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2416: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 25327 at Fri Jan 8 12:12:07 EST 2016 kill -USR1 25327 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25327 killed at Fri Jan 8 12:12:07 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:12:07 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:12:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:12:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2417: Waiting for Server - FAILED kill -0 25397 >/dev/null 2>/dev/null selfserv_9159 with PID 25397 found at Fri Jan 8 12:12:13 EST 2016 selfserv_9159 with PID 25397 started at Fri Jan 8 12:12:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2418: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 25397 at Fri Jan 8 12:12:14 EST 2016 kill -USR1 25397 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25397 killed at Fri Jan 8 12:12:14 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:12:14 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:12:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:12:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2419: Waiting for Server - FAILED kill -0 25466 >/dev/null 2>/dev/null selfserv_9159 with PID 25466 found at Fri Jan 8 12:12:20 EST 2016 selfserv_9159 with PID 25466 started at Fri Jan 8 12:12:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2420: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 25466 at Fri Jan 8 12:12:21 EST 2016 kill -USR1 25466 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25466 killed at Fri Jan 8 12:12:21 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:12:21 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:12:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:12:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2421: Waiting for Server - FAILED kill -0 25535 >/dev/null 2>/dev/null selfserv_9159 with PID 25535 found at Fri Jan 8 12:12:27 EST 2016 selfserv_9159 with PID 25535 started at Fri Jan 8 12:12:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2422: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 25535 at Fri Jan 8 12:12:27 EST 2016 kill -USR1 25535 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25535 killed at Fri Jan 8 12:12:28 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:12:28 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:12:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:12:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2423: Waiting for Server - FAILED kill -0 25605 >/dev/null 2>/dev/null selfserv_9159 with PID 25605 found at Fri Jan 8 12:12:34 EST 2016 selfserv_9159 with PID 25605 started at Fri Jan 8 12:12:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2424: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 25605 at Fri Jan 8 12:12:34 EST 2016 kill -USR1 25605 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25605 killed at Fri Jan 8 12:12:35 EST 2016 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server bypass/client normal - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Stress Test Extended Test - server bypass/client normal - with ECC =============================== ssl.sh: skipping -c_1000_-C_A Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9159 starting at Fri Jan 8 12:12:35 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:12:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:12:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2425: Waiting for Server - FAILED kill -0 25788 >/dev/null 2>/dev/null selfserv_9159 with PID 25788 found at Fri Jan 8 12:12:41 EST 2016 selfserv_9159 with PID 25788 started at Fri Jan 8 12:12:41 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -c 1000 -C c -V :ssl3 \ localhost.localdomain strsclnt started at Fri Jan 8 12:12:41 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:12:42 EST 2016 ssl.sh: #2426: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 25788 at Fri Jan 8 12:12:42 EST 2016 kill -USR1 25788 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25788 killed at Fri Jan 8 12:12:42 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9159 starting at Fri Jan 8 12:12:42 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:12:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:12:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2427: Waiting for Server - FAILED kill -0 25868 >/dev/null 2>/dev/null selfserv_9159 with PID 25868 found at Fri Jan 8 12:12:48 EST 2016 selfserv_9159 with PID 25868 started at Fri Jan 8 12:12:48 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Fri Jan 8 12:12:48 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:12:49 EST 2016 ssl.sh: #2428: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 25868 at Fri Jan 8 12:12:49 EST 2016 kill -USR1 25868 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25868 killed at Fri Jan 8 12:12:49 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9159 starting at Fri Jan 8 12:12:49 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:12:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:12:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2429: Waiting for Server - FAILED kill -0 25947 >/dev/null 2>/dev/null selfserv_9159 with PID 25947 found at Fri Jan 8 12:12:55 EST 2016 selfserv_9159 with PID 25947 started at Fri Jan 8 12:12:55 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Fri Jan 8 12:12:55 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:12:56 EST 2016 ssl.sh: #2430: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 25947 at Fri Jan 8 12:12:56 EST 2016 kill -USR1 25947 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25947 killed at Fri Jan 8 12:12:56 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9159 starting at Fri Jan 8 12:12:56 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:12:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:13:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2431: Waiting for Server - FAILED kill -0 26026 >/dev/null 2>/dev/null selfserv_9159 with PID 26026 found at Fri Jan 8 12:13:02 EST 2016 selfserv_9159 with PID 26026 started at Fri Jan 8 12:13:02 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 12:13:02 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:13:03 EST 2016 ssl.sh: #2432: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 26026 at Fri Jan 8 12:13:03 EST 2016 kill -USR1 26026 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26026 killed at Fri Jan 8 12:13:03 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9159 starting at Fri Jan 8 12:13:03 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:13:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:13:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2433: Waiting for Server - FAILED kill -0 26106 >/dev/null 2>/dev/null selfserv_9159 with PID 26106 found at Fri Jan 8 12:13:09 EST 2016 selfserv_9159 with PID 26106 started at Fri Jan 8 12:13:09 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Fri Jan 8 12:13:09 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:13:10 EST 2016 ssl.sh: #2434: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 26106 at Fri Jan 8 12:13:10 EST 2016 kill -USR1 26106 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26106 killed at Fri Jan 8 12:13:10 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9159 starting at Fri Jan 8 12:13:10 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:13:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:13:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2435: Waiting for Server - FAILED kill -0 26185 >/dev/null 2>/dev/null selfserv_9159 with PID 26185 found at Fri Jan 8 12:13:16 EST 2016 selfserv_9159 with PID 26185 started at Fri Jan 8 12:13:16 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 12:13:16 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:13:17 EST 2016 ssl.sh: #2436: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 26185 at Fri Jan 8 12:13:17 EST 2016 kill -USR1 26185 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26185 killed at Fri Jan 8 12:13:17 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9159 starting at Fri Jan 8 12:13:18 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:13:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:13:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2437: Waiting for Server - FAILED kill -0 26264 >/dev/null 2>/dev/null selfserv_9159 with PID 26264 found at Fri Jan 8 12:13:23 EST 2016 selfserv_9159 with PID 26264 started at Fri Jan 8 12:13:23 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 12:13:23 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:13:24 EST 2016 ssl.sh: #2438: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 26264 at Fri Jan 8 12:13:24 EST 2016 kill -USR1 26264 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26264 killed at Fri Jan 8 12:13:24 EST 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping -c_100_-C_A_-N_-n_TestUser Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:13:25 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:13:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:13:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2439: Waiting for Server - FAILED kill -0 26373 >/dev/null 2>/dev/null selfserv_9159 with PID 26373 found at Fri Jan 8 12:13:31 EST 2016 selfserv_9159 with PID 26373 started at Fri Jan 8 12:13:31 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Fri Jan 8 12:13:31 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:13:31 EST 2016 ssl.sh: #2440: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 26373 at Fri Jan 8 12:13:31 EST 2016 kill -USR1 26373 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26373 killed at Fri Jan 8 12:13:32 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:13:32 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:13:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:13:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2441: Waiting for Server - FAILED kill -0 26452 >/dev/null 2>/dev/null selfserv_9159 with PID 26452 found at Fri Jan 8 12:13:38 EST 2016 selfserv_9159 with PID 26452 started at Fri Jan 8 12:13:38 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Fri Jan 8 12:13:38 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:13:38 EST 2016 ssl.sh: #2442: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 26452 at Fri Jan 8 12:13:38 EST 2016 kill -USR1 26452 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26452 killed at Fri Jan 8 12:13:39 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:13:39 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:13:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:13:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2443: Waiting for Server - FAILED kill -0 26531 >/dev/null 2>/dev/null selfserv_9159 with PID 26531 found at Fri Jan 8 12:13:45 EST 2016 selfserv_9159 with PID 26531 started at Fri Jan 8 12:13:45 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Fri Jan 8 12:13:45 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:13:45 EST 2016 ssl.sh: #2444: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 26531 at Fri Jan 8 12:13:45 EST 2016 kill -USR1 26531 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26531 killed at Fri Jan 8 12:13:46 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:13:46 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:13:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:13:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2445: Waiting for Server - FAILED kill -0 26611 >/dev/null 2>/dev/null selfserv_9159 with PID 26611 found at Fri Jan 8 12:13:52 EST 2016 selfserv_9159 with PID 26611 started at Fri Jan 8 12:13:52 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Fri Jan 8 12:13:52 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:13:52 EST 2016 ssl.sh: #2446: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 26611 at Fri Jan 8 12:13:52 EST 2016 kill -USR1 26611 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26611 killed at Fri Jan 8 12:13:53 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9159 starting at Fri Jan 8 12:13:53 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:13:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:13:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2447: Waiting for Server - FAILED kill -0 26690 >/dev/null 2>/dev/null selfserv_9159 with PID 26690 found at Fri Jan 8 12:13:59 EST 2016 selfserv_9159 with PID 26690 started at Fri Jan 8 12:13:59 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 12:13:59 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:13:59 EST 2016 ssl.sh: #2448: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 26690 at Fri Jan 8 12:13:59 EST 2016 kill -USR1 26690 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26690 killed at Fri Jan 8 12:14:00 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:14:00 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:14:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:14:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2449: Waiting for Server - FAILED kill -0 26769 >/dev/null 2>/dev/null selfserv_9159 with PID 26769 found at Fri Jan 8 12:14:06 EST 2016 selfserv_9159 with PID 26769 started at Fri Jan 8 12:14:06 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 12:14:06 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:14:06 EST 2016 ssl.sh: #2450: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 26769 at Fri Jan 8 12:14:06 EST 2016 kill -USR1 26769 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26769 killed at Fri Jan 8 12:14:07 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9159 starting at Fri Jan 8 12:14:07 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:14:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:14:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2451: Waiting for Server - FAILED kill -0 26849 >/dev/null 2>/dev/null selfserv_9159 with PID 26849 found at Fri Jan 8 12:14:13 EST 2016 selfserv_9159 with PID 26849 started at Fri Jan 8 12:14:13 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 12:14:13 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:14:13 EST 2016 ssl.sh: #2452: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 26849 at Fri Jan 8 12:14:13 EST 2016 kill -USR1 26849 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26849 killed at Fri Jan 8 12:14:14 EST 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:14:14 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:14:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:14:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2453: Waiting for Server - FAILED kill -0 26957 >/dev/null 2>/dev/null selfserv_9159 with PID 26957 found at Fri Jan 8 12:14:20 EST 2016 selfserv_9159 with PID 26957 started at Fri Jan 8 12:14:20 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:14:20 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:14:20 EST 2016 ssl.sh: #2454: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 26957 at Fri Jan 8 12:14:20 EST 2016 kill -USR1 26957 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26957 killed at Fri Jan 8 12:14:21 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:14:21 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:14:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:14:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2455: Waiting for Server - FAILED kill -0 27037 >/dev/null 2>/dev/null selfserv_9159 with PID 27037 found at Fri Jan 8 12:14:27 EST 2016 selfserv_9159 with PID 27037 started at Fri Jan 8 12:14:27 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:14:27 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:14:27 EST 2016 ssl.sh: #2456: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 27037 at Fri Jan 8 12:14:27 EST 2016 kill -USR1 27037 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27037 killed at Fri Jan 8 12:14:28 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:14:28 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:14:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:14:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2457: Waiting for Server - FAILED kill -0 27118 >/dev/null 2>/dev/null selfserv_9159 with PID 27118 found at Fri Jan 8 12:14:34 EST 2016 selfserv_9159 with PID 27118 started at Fri Jan 8 12:14:34 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:14:34 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:14:34 EST 2016 ssl.sh: #2458: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 27118 at Fri Jan 8 12:14:34 EST 2016 kill -USR1 27118 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27118 killed at Fri Jan 8 12:14:35 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:14:35 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:14:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:14:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2459: Waiting for Server - FAILED kill -0 27199 >/dev/null 2>/dev/null selfserv_9159 with PID 27199 found at Fri Jan 8 12:14:41 EST 2016 selfserv_9159 with PID 27199 started at Fri Jan 8 12:14:41 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:14:41 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:14:41 EST 2016 ssl.sh: #2460: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 27199 at Fri Jan 8 12:14:41 EST 2016 kill -USR1 27199 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27199 killed at Fri Jan 8 12:14:42 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:14:42 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:14:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:14:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2461: Waiting for Server - FAILED kill -0 27278 >/dev/null 2>/dev/null selfserv_9159 with PID 27278 found at Fri Jan 8 12:14:48 EST 2016 selfserv_9159 with PID 27278 started at Fri Jan 8 12:14:48 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:14:48 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:14:48 EST 2016 ssl.sh: #2462: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 27278 at Fri Jan 8 12:14:48 EST 2016 kill -USR1 27278 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27278 killed at Fri Jan 8 12:14:49 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9159 starting at Fri Jan 8 12:14:49 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:14:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:14:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2463: Waiting for Server - FAILED kill -0 27358 >/dev/null 2>/dev/null selfserv_9159 with PID 27358 found at Fri Jan 8 12:14:55 EST 2016 selfserv_9159 with PID 27358 started at Fri Jan 8 12:14:55 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Fri Jan 8 12:14:55 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:14:55 EST 2016 ssl.sh: #2464: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 27358 at Fri Jan 8 12:14:55 EST 2016 kill -USR1 27358 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27358 killed at Fri Jan 8 12:14:56 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9159 starting at Fri Jan 8 12:14:56 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:14:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:15:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2465: Waiting for Server - FAILED kill -0 27437 >/dev/null 2>/dev/null selfserv_9159 with PID 27437 found at Fri Jan 8 12:15:02 EST 2016 selfserv_9159 with PID 27437 started at Fri Jan 8 12:15:02 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Fri Jan 8 12:15:02 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:15:02 EST 2016 ssl.sh: #2466: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 27437 at Fri Jan 8 12:15:03 EST 2016 kill -USR1 27437 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27437 killed at Fri Jan 8 12:15:03 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9159 starting at Fri Jan 8 12:15:03 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:15:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:15:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2467: Waiting for Server - FAILED kill -0 27516 >/dev/null 2>/dev/null selfserv_9159 with PID 27516 found at Fri Jan 8 12:15:09 EST 2016 selfserv_9159 with PID 27516 started at Fri Jan 8 12:15:09 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Fri Jan 8 12:15:09 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:15:09 EST 2016 ssl.sh: #2468: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 27516 at Fri Jan 8 12:15:10 EST 2016 kill -USR1 27516 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27516 killed at Fri Jan 8 12:15:10 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9159 starting at Fri Jan 8 12:15:10 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:15:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:15:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2469: Waiting for Server - FAILED kill -0 27596 >/dev/null 2>/dev/null selfserv_9159 with PID 27596 found at Fri Jan 8 12:15:16 EST 2016 selfserv_9159 with PID 27596 started at Fri Jan 8 12:15:16 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Fri Jan 8 12:15:16 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:15:16 EST 2016 ssl.sh: #2470: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 27596 at Fri Jan 8 12:15:17 EST 2016 kill -USR1 27596 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27596 killed at Fri Jan 8 12:15:17 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9159 starting at Fri Jan 8 12:15:17 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:15:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:15:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2471: Waiting for Server - FAILED kill -0 27675 >/dev/null 2>/dev/null selfserv_9159 with PID 27675 found at Fri Jan 8 12:15:23 EST 2016 selfserv_9159 with PID 27675 started at Fri Jan 8 12:15:23 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Fri Jan 8 12:15:23 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:15:24 EST 2016 ssl.sh: #2472: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 27675 at Fri Jan 8 12:15:24 EST 2016 kill -USR1 27675 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27675 killed at Fri Jan 8 12:15:24 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:15:24 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:15:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:15:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2473: Waiting for Server - FAILED kill -0 27775 >/dev/null 2>/dev/null selfserv_9159 with PID 27775 found at Fri Jan 8 12:15:30 EST 2016 selfserv_9159 with PID 27775 started at Fri Jan 8 12:15:30 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 10 -C :C009 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 12:15:30 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:15:31 EST 2016 ssl.sh: #2474: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 27775 at Fri Jan 8 12:15:31 EST 2016 kill -USR1 27775 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27775 killed at Fri Jan 8 12:15:31 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:15:31 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:15:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:15:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2475: Waiting for Server - FAILED kill -0 27855 >/dev/null 2>/dev/null selfserv_9159 with PID 27855 found at Fri Jan 8 12:15:37 EST 2016 selfserv_9159 with PID 27855 started at Fri Jan 8 12:15:37 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 12:15:37 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:15:38 EST 2016 ssl.sh: #2476: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 27855 at Fri Jan 8 12:15:38 EST 2016 kill -USR1 27855 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27855 killed at Fri Jan 8 12:15:38 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:15:38 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:15:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:15:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2477: Waiting for Server - FAILED kill -0 27934 >/dev/null 2>/dev/null selfserv_9159 with PID 27934 found at Fri Jan 8 12:15:44 EST 2016 selfserv_9159 with PID 27934 started at Fri Jan 8 12:15:44 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 10 -C :C004 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 12:15:44 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:15:45 EST 2016 ssl.sh: #2478: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 27934 at Fri Jan 8 12:15:45 EST 2016 kill -USR1 27934 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27934 killed at Fri Jan 8 12:15:45 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:15:45 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:15:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:15:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2479: Waiting for Server - FAILED kill -0 28013 >/dev/null 2>/dev/null selfserv_9159 with PID 28013 found at Fri Jan 8 12:15:51 EST 2016 selfserv_9159 with PID 28013 started at Fri Jan 8 12:15:51 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \ localhost.localdomain strsclnt started at Fri Jan 8 12:15:51 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:15:52 EST 2016 ssl.sh: #2480: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 28013 at Fri Jan 8 12:15:52 EST 2016 kill -USR1 28013 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28013 killed at Fri Jan 8 12:15:52 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9159 starting at Fri Jan 8 12:15:52 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:15:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:15:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2481: Waiting for Server - FAILED kill -0 28093 >/dev/null 2>/dev/null selfserv_9159 with PID 28093 found at Fri Jan 8 12:15:58 EST 2016 selfserv_9159 with PID 28093 started at Fri Jan 8 12:15:58 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 12:15:58 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:15:59 EST 2016 ssl.sh: #2482: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 28093 at Fri Jan 8 12:15:59 EST 2016 kill -USR1 28093 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28093 killed at Fri Jan 8 12:15:59 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:15:59 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:15:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:16:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2483: Waiting for Server - FAILED kill -0 28172 >/dev/null 2>/dev/null selfserv_9159 with PID 28172 found at Fri Jan 8 12:16:05 EST 2016 selfserv_9159 with PID 28172 started at Fri Jan 8 12:16:05 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \ localhost.localdomain strsclnt started at Fri Jan 8 12:16:05 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:16:06 EST 2016 ssl.sh: #2484: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 28172 at Fri Jan 8 12:16:06 EST 2016 kill -USR1 28172 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28172 killed at Fri Jan 8 12:16:06 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:16:06 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:16:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:16:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2485: Waiting for Server - FAILED kill -0 28272 >/dev/null 2>/dev/null selfserv_9159 with PID 28272 found at Fri Jan 8 12:16:12 EST 2016 selfserv_9159 with PID 28272 started at Fri Jan 8 12:16:12 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:16:12 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:16:13 EST 2016 ssl.sh: #2486: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 28272 at Fri Jan 8 12:16:13 EST 2016 kill -USR1 28272 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28272 killed at Fri Jan 8 12:16:13 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9159 starting at Fri Jan 8 12:16:13 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:16:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:16:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2487: Waiting for Server - FAILED kill -0 28352 >/dev/null 2>/dev/null selfserv_9159 with PID 28352 found at Fri Jan 8 12:16:19 EST 2016 selfserv_9159 with PID 28352 started at Fri Jan 8 12:16:19 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Fri Jan 8 12:16:19 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:16:20 EST 2016 ssl.sh: #2488: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 28352 at Fri Jan 8 12:16:20 EST 2016 kill -USR1 28352 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28352 killed at Fri Jan 8 12:16:20 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:16:20 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:16:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:16:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2489: Waiting for Server - FAILED kill -0 28431 >/dev/null 2>/dev/null selfserv_9159 with PID 28431 found at Fri Jan 8 12:16:26 EST 2016 selfserv_9159 with PID 28431 started at Fri Jan 8 12:16:26 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:16:26 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:16:27 EST 2016 ssl.sh: #2490: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 28431 at Fri Jan 8 12:16:27 EST 2016 kill -USR1 28431 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28431 killed at Fri Jan 8 12:16:27 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:16:27 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:16:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:16:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2491: Waiting for Server - FAILED kill -0 28510 >/dev/null 2>/dev/null selfserv_9159 with PID 28510 found at Fri Jan 8 12:16:33 EST 2016 selfserv_9159 with PID 28510 started at Fri Jan 8 12:16:33 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:16:33 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:16:34 EST 2016 ssl.sh: #2492: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 28510 at Fri Jan 8 12:16:34 EST 2016 kill -USR1 28510 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28510 killed at Fri Jan 8 12:16:34 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:16:35 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:16:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:16:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2493: Waiting for Server - FAILED kill -0 28604 >/dev/null 2>/dev/null selfserv_9159 with PID 28604 found at Fri Jan 8 12:16:40 EST 2016 selfserv_9159 with PID 28604 started at Fri Jan 8 12:16:40 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:16:40 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:16:41 EST 2016 ssl.sh: #2494: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 28604 at Fri Jan 8 12:16:41 EST 2016 kill -USR1 28604 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28604 killed at Fri Jan 8 12:16:41 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9159 starting at Fri Jan 8 12:16:42 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:16:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:16:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2495: Waiting for Server - FAILED kill -0 28697 >/dev/null 2>/dev/null selfserv_9159 with PID 28697 found at Fri Jan 8 12:16:48 EST 2016 selfserv_9159 with PID 28697 started at Fri Jan 8 12:16:48 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:16:48 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:16:48 EST 2016 ssl.sh: #2496: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 28697 at Fri Jan 8 12:16:48 EST 2016 kill -USR1 28697 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28697 killed at Fri Jan 8 12:16:49 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:16:49 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:16:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:16:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2497: Waiting for Server - FAILED kill -0 28776 >/dev/null 2>/dev/null selfserv_9159 with PID 28776 found at Fri Jan 8 12:16:55 EST 2016 selfserv_9159 with PID 28776 started at Fri Jan 8 12:16:55 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:16:55 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:16:55 EST 2016 ssl.sh: #2498: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 28776 at Fri Jan 8 12:16:55 EST 2016 kill -USR1 28776 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28776 killed at Fri Jan 8 12:16:56 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:16:56 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:16:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:17:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2499: Waiting for Server - FAILED kill -0 28856 >/dev/null 2>/dev/null selfserv_9159 with PID 28856 found at Fri Jan 8 12:17:02 EST 2016 selfserv_9159 with PID 28856 started at Fri Jan 8 12:17:02 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:17:02 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:17:02 EST 2016 ssl.sh: #2500: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 28856 at Fri Jan 8 12:17:02 EST 2016 kill -USR1 28856 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28856 killed at Fri Jan 8 12:17:03 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:17:03 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:17:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:17:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2501: Waiting for Server - FAILED kill -0 28956 >/dev/null 2>/dev/null selfserv_9159 with PID 28956 found at Fri Jan 8 12:17:09 EST 2016 selfserv_9159 with PID 28956 started at Fri Jan 8 12:17:09 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 12:17:09 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:17:09 EST 2016 ssl.sh: #2502: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 28956 at Fri Jan 8 12:17:09 EST 2016 kill -USR1 28956 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28956 killed at Fri Jan 8 12:17:10 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:17:10 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:17:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:17:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2503: Waiting for Server - FAILED kill -0 29036 >/dev/null 2>/dev/null selfserv_9159 with PID 29036 found at Fri Jan 8 12:17:16 EST 2016 selfserv_9159 with PID 29036 started at Fri Jan 8 12:17:16 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \ localhost.localdomain strsclnt started at Fri Jan 8 12:17:16 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:17:16 EST 2016 ssl.sh: #2504: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 29036 at Fri Jan 8 12:17:16 EST 2016 kill -USR1 29036 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 29036 killed at Fri Jan 8 12:17:17 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:17:17 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:17:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:17:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2505: Waiting for Server - FAILED kill -0 29129 >/dev/null 2>/dev/null selfserv_9159 with PID 29129 found at Fri Jan 8 12:17:23 EST 2016 selfserv_9159 with PID 29129 started at Fri Jan 8 12:17:23 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 12:17:23 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:17:23 EST 2016 ssl.sh: #2506: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 29129 at Fri Jan 8 12:17:23 EST 2016 kill -USR1 29129 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 29129 killed at Fri Jan 8 12:17:24 EST 2016 ssl.sh: SSL Cipher Coverage - server normal/client bypass - with ECC =============================== selfserv_9159 starting at Fri Jan 8 12:17:24 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:17:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:17:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2507: Waiting for Server - FAILED kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:30 EST 2016 selfserv_9159 with PID 29201 started at Fri Jan 8 12:17:30 EST 2016 ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2508: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2509: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2510: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2511: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2512: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2513: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2514: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2515: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2516: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2517: SSL3_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2518: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2519: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2520: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2521: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2522: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2523: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2524: TLS_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2525: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2526: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2527: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2528: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2529: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2530: TLS_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2531: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2532: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2533: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2534: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2535: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2536: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2537: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2538: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2539: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2540: TLS11_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2541: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2542: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2543: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2544: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2545: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2546: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2547: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2548: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2549: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2550: TLS12_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2551: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2552: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2553: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2554: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2555: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2556: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2557: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2558: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2559: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2560: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2561: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:17:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2562: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:18:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2563: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:18:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2564: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:18:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2565: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:18:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2566: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:18:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2567: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:18:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2568: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:18:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2569: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:18:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2570: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:18:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2571: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:18:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2572: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:18:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2573: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:18:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2574: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 29201 >/dev/null 2>/dev/null selfserv_9159 with PID 29201 found at Fri Jan 8 12:18:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2575: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 29201 at Fri Jan 8 12:18:07 EST 2016 kill -USR1 29201 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 29201 killed at Fri Jan 8 12:18:07 EST 2016 ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 12:18:07 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:18:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:18:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2576: Waiting for Server - FAILED kill -0 31300 >/dev/null 2>/dev/null selfserv_9159 with PID 31300 found at Fri Jan 8 12:18:13 EST 2016 selfserv_9159 with PID 31300 started at Fri Jan 8 12:18:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2577: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 31300 >/dev/null 2>/dev/null selfserv_9159 with PID 31300 found at Fri Jan 8 12:18:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2578: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 31300 >/dev/null 2>/dev/null selfserv_9159 with PID 31300 found at Fri Jan 8 12:18:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2579: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 31300 >/dev/null 2>/dev/null selfserv_9159 with PID 31300 found at Fri Jan 8 12:18:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2580: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 31300 >/dev/null 2>/dev/null selfserv_9159 with PID 31300 found at Fri Jan 8 12:18:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2581: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 31300 at Fri Jan 8 12:18:16 EST 2016 kill -USR1 31300 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 31300 killed at Fri Jan 8 12:18:16 EST 2016 ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 12:18:16 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:18:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:18:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2582: Waiting for Server - FAILED kill -0 31466 >/dev/null 2>/dev/null selfserv_9159 with PID 31466 found at Fri Jan 8 12:18:22 EST 2016 selfserv_9159 with PID 31466 started at Fri Jan 8 12:18:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2583: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 31466 >/dev/null 2>/dev/null selfserv_9159 with PID 31466 found at Fri Jan 8 12:18:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2584: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 31466 >/dev/null 2>/dev/null selfserv_9159 with PID 31466 found at Fri Jan 8 12:18:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2585: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 31466 >/dev/null 2>/dev/null selfserv_9159 with PID 31466 found at Fri Jan 8 12:18:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2586: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 31466 >/dev/null 2>/dev/null selfserv_9159 with PID 31466 found at Fri Jan 8 12:18:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2587: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 31466 >/dev/null 2>/dev/null selfserv_9159 with PID 31466 found at Fri Jan 8 12:18:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2588: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 31466 >/dev/null 2>/dev/null selfserv_9159 with PID 31466 found at Fri Jan 8 12:18:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2589: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 31466 >/dev/null 2>/dev/null selfserv_9159 with PID 31466 found at Fri Jan 8 12:18:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2590: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 31466 >/dev/null 2>/dev/null selfserv_9159 with PID 31466 found at Fri Jan 8 12:18:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2591: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 31466 >/dev/null 2>/dev/null selfserv_9159 with PID 31466 found at Fri Jan 8 12:18:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2592: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 31466 >/dev/null 2>/dev/null selfserv_9159 with PID 31466 found at Fri Jan 8 12:18:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2593: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 31466 >/dev/null 2>/dev/null selfserv_9159 with PID 31466 found at Fri Jan 8 12:18:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2594: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 31466 >/dev/null 2>/dev/null selfserv_9159 with PID 31466 found at Fri Jan 8 12:18:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2595: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 31466 >/dev/null 2>/dev/null selfserv_9159 with PID 31466 found at Fri Jan 8 12:18:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2596: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 31466 >/dev/null 2>/dev/null selfserv_9159 with PID 31466 found at Fri Jan 8 12:18:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2597: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 31466 at Fri Jan 8 12:18:30 EST 2016 kill -USR1 31466 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 31466 killed at Fri Jan 8 12:18:30 EST 2016 ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 12:18:30 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:18:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:18:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2598: Waiting for Server - FAILED kill -0 31879 >/dev/null 2>/dev/null selfserv_9159 with PID 31879 found at Fri Jan 8 12:18:36 EST 2016 selfserv_9159 with PID 31879 started at Fri Jan 8 12:18:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2599: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 31879 >/dev/null 2>/dev/null selfserv_9159 with PID 31879 found at Fri Jan 8 12:18:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2600: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 31879 >/dev/null 2>/dev/null selfserv_9159 with PID 31879 found at Fri Jan 8 12:18:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2601: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 31879 >/dev/null 2>/dev/null selfserv_9159 with PID 31879 found at Fri Jan 8 12:18:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2602: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 31879 >/dev/null 2>/dev/null selfserv_9159 with PID 31879 found at Fri Jan 8 12:18:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2603: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 31879 at Fri Jan 8 12:18:39 EST 2016 kill -USR1 31879 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 31879 killed at Fri Jan 8 12:18:39 EST 2016 ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 12:18:39 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:18:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:18:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2604: Waiting for Server - FAILED kill -0 32045 >/dev/null 2>/dev/null selfserv_9159 with PID 32045 found at Fri Jan 8 12:18:45 EST 2016 selfserv_9159 with PID 32045 started at Fri Jan 8 12:18:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2605: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 32045 >/dev/null 2>/dev/null selfserv_9159 with PID 32045 found at Fri Jan 8 12:18:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2606: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 32045 >/dev/null 2>/dev/null selfserv_9159 with PID 32045 found at Fri Jan 8 12:18:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2607: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 32045 >/dev/null 2>/dev/null selfserv_9159 with PID 32045 found at Fri Jan 8 12:18:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2608: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 32045 >/dev/null 2>/dev/null selfserv_9159 with PID 32045 found at Fri Jan 8 12:18:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2609: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 32045 >/dev/null 2>/dev/null selfserv_9159 with PID 32045 found at Fri Jan 8 12:18:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2610: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 32045 >/dev/null 2>/dev/null selfserv_9159 with PID 32045 found at Fri Jan 8 12:18:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2611: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 32045 >/dev/null 2>/dev/null selfserv_9159 with PID 32045 found at Fri Jan 8 12:18:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2612: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 32045 >/dev/null 2>/dev/null selfserv_9159 with PID 32045 found at Fri Jan 8 12:18:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2613: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 32045 >/dev/null 2>/dev/null selfserv_9159 with PID 32045 found at Fri Jan 8 12:18:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2614: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 32045 >/dev/null 2>/dev/null selfserv_9159 with PID 32045 found at Fri Jan 8 12:18:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2615: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 32045 >/dev/null 2>/dev/null selfserv_9159 with PID 32045 found at Fri Jan 8 12:18:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2616: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 32045 >/dev/null 2>/dev/null selfserv_9159 with PID 32045 found at Fri Jan 8 12:18:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2617: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 32045 >/dev/null 2>/dev/null selfserv_9159 with PID 32045 found at Fri Jan 8 12:18:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2618: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 32045 >/dev/null 2>/dev/null selfserv_9159 with PID 32045 found at Fri Jan 8 12:18:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2619: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 32045 at Fri Jan 8 12:18:53 EST 2016 kill -USR1 32045 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 32045 killed at Fri Jan 8 12:18:53 EST 2016 ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 12:18:53 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:18:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:18:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2620: Waiting for Server - FAILED kill -0 32459 >/dev/null 2>/dev/null selfserv_9159 with PID 32459 found at Fri Jan 8 12:18:59 EST 2016 selfserv_9159 with PID 32459 started at Fri Jan 8 12:18:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2621: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 32459 >/dev/null 2>/dev/null selfserv_9159 with PID 32459 found at Fri Jan 8 12:19:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2622: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 32459 >/dev/null 2>/dev/null selfserv_9159 with PID 32459 found at Fri Jan 8 12:19:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2623: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 32459 >/dev/null 2>/dev/null selfserv_9159 with PID 32459 found at Fri Jan 8 12:19:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2624: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 32459 >/dev/null 2>/dev/null selfserv_9159 with PID 32459 found at Fri Jan 8 12:19:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2625: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 32459 at Fri Jan 8 12:19:02 EST 2016 kill -USR1 32459 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 32459 killed at Fri Jan 8 12:19:02 EST 2016 ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 12:19:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:19:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:19:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2626: Waiting for Server - FAILED kill -0 32624 >/dev/null 2>/dev/null selfserv_9159 with PID 32624 found at Fri Jan 8 12:19:08 EST 2016 selfserv_9159 with PID 32624 started at Fri Jan 8 12:19:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2627: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 32624 >/dev/null 2>/dev/null selfserv_9159 with PID 32624 found at Fri Jan 8 12:19:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2628: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 32624 >/dev/null 2>/dev/null selfserv_9159 with PID 32624 found at Fri Jan 8 12:19:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2629: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 32624 >/dev/null 2>/dev/null selfserv_9159 with PID 32624 found at Fri Jan 8 12:19:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2630: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 32624 >/dev/null 2>/dev/null selfserv_9159 with PID 32624 found at Fri Jan 8 12:19:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2631: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 32624 >/dev/null 2>/dev/null selfserv_9159 with PID 32624 found at Fri Jan 8 12:19:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2632: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 32624 >/dev/null 2>/dev/null selfserv_9159 with PID 32624 found at Fri Jan 8 12:19:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2633: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 32624 >/dev/null 2>/dev/null selfserv_9159 with PID 32624 found at Fri Jan 8 12:19:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2634: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 32624 >/dev/null 2>/dev/null selfserv_9159 with PID 32624 found at Fri Jan 8 12:19:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2635: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 32624 >/dev/null 2>/dev/null selfserv_9159 with PID 32624 found at Fri Jan 8 12:19:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2636: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 32624 >/dev/null 2>/dev/null selfserv_9159 with PID 32624 found at Fri Jan 8 12:19:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2637: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 32624 >/dev/null 2>/dev/null selfserv_9159 with PID 32624 found at Fri Jan 8 12:19:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2638: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 32624 >/dev/null 2>/dev/null selfserv_9159 with PID 32624 found at Fri Jan 8 12:19:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2639: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 32624 at Fri Jan 8 12:19:15 EST 2016 kill -USR1 32624 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 32624 killed at Fri Jan 8 12:19:15 EST 2016 ssl.sh: SSL Client Authentication - server normal/client bypass - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:19:16 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:19:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:19:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2640: Waiting for Server - FAILED kill -0 589 >/dev/null 2>/dev/null selfserv_9159 with PID 589 found at Fri Jan 8 12:19:22 EST 2016 selfserv_9159 with PID 589 started at Fri Jan 8 12:19:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2641: TLS Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 589 at Fri Jan 8 12:19:22 EST 2016 kill -USR1 589 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 589 killed at Fri Jan 8 12:19:23 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:19:23 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:19:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:19:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2642: Waiting for Server - FAILED kill -0 662 >/dev/null 2>/dev/null selfserv_9159 with PID 662 found at Fri Jan 8 12:19:29 EST 2016 selfserv_9159 with PID 662 started at Fri Jan 8 12:19:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2643: TLS Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 662 at Fri Jan 8 12:19:29 EST 2016 kill -USR1 662 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 662 killed at Fri Jan 8 12:19:30 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:19:30 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:19:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:19:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2644: Waiting for Server - FAILED kill -0 731 >/dev/null 2>/dev/null selfserv_9159 with PID 731 found at Fri Jan 8 12:19:36 EST 2016 selfserv_9159 with PID 731 started at Fri Jan 8 12:19:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2645: TLS Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 731 at Fri Jan 8 12:19:36 EST 2016 kill -USR1 731 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 731 killed at Fri Jan 8 12:19:36 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:19:37 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:19:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:19:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2646: Waiting for Server - FAILED kill -0 801 >/dev/null 2>/dev/null selfserv_9159 with PID 801 found at Fri Jan 8 12:19:42 EST 2016 selfserv_9159 with PID 801 started at Fri Jan 8 12:19:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2647: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 801 at Fri Jan 8 12:19:43 EST 2016 kill -USR1 801 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 801 killed at Fri Jan 8 12:19:43 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:19:43 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:19:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:19:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2648: Waiting for Server - FAILED kill -0 870 >/dev/null 2>/dev/null selfserv_9159 with PID 870 found at Fri Jan 8 12:19:49 EST 2016 selfserv_9159 with PID 870 started at Fri Jan 8 12:19:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2649: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 870 at Fri Jan 8 12:19:50 EST 2016 kill -USR1 870 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 870 killed at Fri Jan 8 12:19:50 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:19:50 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:19:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:19:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2650: Waiting for Server - FAILED kill -0 939 >/dev/null 2>/dev/null selfserv_9159 with PID 939 found at Fri Jan 8 12:19:56 EST 2016 selfserv_9159 with PID 939 started at Fri Jan 8 12:19:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2651: TLS Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 939 at Fri Jan 8 12:19:57 EST 2016 kill -USR1 939 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 939 killed at Fri Jan 8 12:19:57 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:19:57 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:19:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:20:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2652: Waiting for Server - FAILED kill -0 1009 >/dev/null 2>/dev/null selfserv_9159 with PID 1009 found at Fri Jan 8 12:20:03 EST 2016 selfserv_9159 with PID 1009 started at Fri Jan 8 12:20:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2653: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 1009 at Fri Jan 8 12:20:04 EST 2016 kill -USR1 1009 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1009 killed at Fri Jan 8 12:20:04 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:20:04 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:20:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:20:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2654: Waiting for Server - FAILED kill -0 1078 >/dev/null 2>/dev/null selfserv_9159 with PID 1078 found at Fri Jan 8 12:20:10 EST 2016 selfserv_9159 with PID 1078 started at Fri Jan 8 12:20:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2655: SSL3 Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 1078 at Fri Jan 8 12:20:11 EST 2016 kill -USR1 1078 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1078 killed at Fri Jan 8 12:20:11 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:20:11 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:20:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:20:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2656: Waiting for Server - FAILED kill -0 1147 >/dev/null 2>/dev/null selfserv_9159 with PID 1147 found at Fri Jan 8 12:20:17 EST 2016 selfserv_9159 with PID 1147 started at Fri Jan 8 12:20:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2657: SSL3 Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 1147 at Fri Jan 8 12:20:18 EST 2016 kill -USR1 1147 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1147 killed at Fri Jan 8 12:20:18 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:20:18 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:20:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:20:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2658: Waiting for Server - FAILED kill -0 1217 >/dev/null 2>/dev/null selfserv_9159 with PID 1217 found at Fri Jan 8 12:20:24 EST 2016 selfserv_9159 with PID 1217 started at Fri Jan 8 12:20:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2659: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 1217 at Fri Jan 8 12:20:24 EST 2016 kill -USR1 1217 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1217 killed at Fri Jan 8 12:20:25 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:20:25 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:20:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:20:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2660: Waiting for Server - FAILED kill -0 1286 >/dev/null 2>/dev/null selfserv_9159 with PID 1286 found at Fri Jan 8 12:20:31 EST 2016 selfserv_9159 with PID 1286 started at Fri Jan 8 12:20:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2661: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 1286 at Fri Jan 8 12:20:31 EST 2016 kill -USR1 1286 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1286 killed at Fri Jan 8 12:20:32 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:20:32 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:20:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:20:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2662: Waiting for Server - FAILED kill -0 1355 >/dev/null 2>/dev/null selfserv_9159 with PID 1355 found at Fri Jan 8 12:20:38 EST 2016 selfserv_9159 with PID 1355 started at Fri Jan 8 12:20:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2663: SSL3 Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 1355 at Fri Jan 8 12:20:38 EST 2016 kill -USR1 1355 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1355 killed at Fri Jan 8 12:20:39 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:20:39 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:20:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:20:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2664: Waiting for Server - FAILED kill -0 1425 >/dev/null 2>/dev/null selfserv_9159 with PID 1425 found at Fri Jan 8 12:20:45 EST 2016 selfserv_9159 with PID 1425 started at Fri Jan 8 12:20:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2665: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 1425 at Fri Jan 8 12:20:45 EST 2016 kill -USR1 1425 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1425 killed at Fri Jan 8 12:20:46 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:20:46 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:20:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:20:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2666: Waiting for Server - FAILED kill -0 1494 >/dev/null 2>/dev/null selfserv_9159 with PID 1494 found at Fri Jan 8 12:20:52 EST 2016 selfserv_9159 with PID 1494 started at Fri Jan 8 12:20:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2667: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 1494 at Fri Jan 8 12:20:52 EST 2016 kill -USR1 1494 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1494 killed at Fri Jan 8 12:20:52 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:20:53 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:20:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:20:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2668: Waiting for Server - FAILED kill -0 1564 >/dev/null 2>/dev/null selfserv_9159 with PID 1564 found at Fri Jan 8 12:20:58 EST 2016 selfserv_9159 with PID 1564 started at Fri Jan 8 12:20:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2669: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 1564 at Fri Jan 8 12:20:59 EST 2016 kill -USR1 1564 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1564 killed at Fri Jan 8 12:20:59 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:20:59 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:20:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:21:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2670: Waiting for Server - FAILED kill -0 1634 >/dev/null 2>/dev/null selfserv_9159 with PID 1634 found at Fri Jan 8 12:21:05 EST 2016 selfserv_9159 with PID 1634 started at Fri Jan 8 12:21:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2671: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 1634 at Fri Jan 8 12:21:06 EST 2016 kill -USR1 1634 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1634 killed at Fri Jan 8 12:21:06 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:21:06 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:21:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:21:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2672: Waiting for Server - FAILED kill -0 1703 >/dev/null 2>/dev/null selfserv_9159 with PID 1703 found at Fri Jan 8 12:21:12 EST 2016 selfserv_9159 with PID 1703 started at Fri Jan 8 12:21:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2673: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 1703 at Fri Jan 8 12:21:13 EST 2016 kill -USR1 1703 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1703 killed at Fri Jan 8 12:21:13 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:21:13 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:21:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:21:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2674: Waiting for Server - FAILED kill -0 1772 >/dev/null 2>/dev/null selfserv_9159 with PID 1772 found at Fri Jan 8 12:21:19 EST 2016 selfserv_9159 with PID 1772 started at Fri Jan 8 12:21:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2675: TLS Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 1772 at Fri Jan 8 12:21:20 EST 2016 kill -USR1 1772 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1772 killed at Fri Jan 8 12:21:20 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:21:20 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:21:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:21:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2676: Waiting for Server - FAILED kill -0 1842 >/dev/null 2>/dev/null selfserv_9159 with PID 1842 found at Fri Jan 8 12:21:26 EST 2016 selfserv_9159 with PID 1842 started at Fri Jan 8 12:21:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2677: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 1842 at Fri Jan 8 12:21:27 EST 2016 kill -USR1 1842 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1842 killed at Fri Jan 8 12:21:27 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:21:27 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:21:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:21:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2678: Waiting for Server - FAILED kill -0 1911 >/dev/null 2>/dev/null selfserv_9159 with PID 1911 found at Fri Jan 8 12:21:33 EST 2016 selfserv_9159 with PID 1911 started at Fri Jan 8 12:21:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2679: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 1911 at Fri Jan 8 12:21:34 EST 2016 kill -USR1 1911 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1911 killed at Fri Jan 8 12:21:34 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:21:34 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:21:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:21:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2680: Waiting for Server - FAILED kill -0 1980 >/dev/null 2>/dev/null selfserv_9159 with PID 1980 found at Fri Jan 8 12:21:40 EST 2016 selfserv_9159 with PID 1980 started at Fri Jan 8 12:21:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2681: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 1980 at Fri Jan 8 12:21:40 EST 2016 kill -USR1 1980 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1980 killed at Fri Jan 8 12:21:41 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:21:41 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:21:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:21:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2682: Waiting for Server - FAILED kill -0 2050 >/dev/null 2>/dev/null selfserv_9159 with PID 2050 found at Fri Jan 8 12:21:47 EST 2016 selfserv_9159 with PID 2050 started at Fri Jan 8 12:21:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2683: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 2050 at Fri Jan 8 12:21:47 EST 2016 kill -USR1 2050 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2050 killed at Fri Jan 8 12:21:48 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:21:48 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:21:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:21:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2684: Waiting for Server - FAILED kill -0 2119 >/dev/null 2>/dev/null selfserv_9159 with PID 2119 found at Fri Jan 8 12:21:54 EST 2016 selfserv_9159 with PID 2119 started at Fri Jan 8 12:21:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2685: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 2119 at Fri Jan 8 12:21:54 EST 2016 kill -USR1 2119 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2119 killed at Fri Jan 8 12:21:55 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:21:55 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:21:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:22:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2686: Waiting for Server - FAILED kill -0 2188 >/dev/null 2>/dev/null selfserv_9159 with PID 2188 found at Fri Jan 8 12:22:01 EST 2016 selfserv_9159 with PID 2188 started at Fri Jan 8 12:22:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2687: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 2188 at Fri Jan 8 12:22:01 EST 2016 kill -USR1 2188 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2188 killed at Fri Jan 8 12:22:02 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:22:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:22:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:22:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2688: Waiting for Server - FAILED kill -0 2258 >/dev/null 2>/dev/null selfserv_9159 with PID 2258 found at Fri Jan 8 12:22:08 EST 2016 selfserv_9159 with PID 2258 started at Fri Jan 8 12:22:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2689: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 2258 at Fri Jan 8 12:22:08 EST 2016 kill -USR1 2258 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2258 killed at Fri Jan 8 12:22:09 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:22:09 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:22:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:22:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2690: Waiting for Server - FAILED kill -0 2327 >/dev/null 2>/dev/null selfserv_9159 with PID 2327 found at Fri Jan 8 12:22:15 EST 2016 selfserv_9159 with PID 2327 started at Fri Jan 8 12:22:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2691: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 2327 at Fri Jan 8 12:22:15 EST 2016 kill -USR1 2327 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2327 killed at Fri Jan 8 12:22:15 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:22:16 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:22:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:22:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2692: Waiting for Server - FAILED kill -0 2396 >/dev/null 2>/dev/null selfserv_9159 with PID 2396 found at Fri Jan 8 12:22:21 EST 2016 selfserv_9159 with PID 2396 started at Fri Jan 8 12:22:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2693: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 2396 at Fri Jan 8 12:22:22 EST 2016 kill -USR1 2396 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2396 killed at Fri Jan 8 12:22:22 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:22:22 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:22:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:22:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2694: Waiting for Server - FAILED kill -0 2466 >/dev/null 2>/dev/null selfserv_9159 with PID 2466 found at Fri Jan 8 12:22:28 EST 2016 selfserv_9159 with PID 2466 started at Fri Jan 8 12:22:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2695: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 2466 at Fri Jan 8 12:22:29 EST 2016 kill -USR1 2466 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2466 killed at Fri Jan 8 12:22:29 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:22:29 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:22:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:22:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2696: Waiting for Server - FAILED kill -0 2535 >/dev/null 2>/dev/null selfserv_9159 with PID 2535 found at Fri Jan 8 12:22:35 EST 2016 selfserv_9159 with PID 2535 started at Fri Jan 8 12:22:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2697: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 2535 at Fri Jan 8 12:22:36 EST 2016 kill -USR1 2535 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2535 killed at Fri Jan 8 12:22:36 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:22:36 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:22:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:22:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2698: Waiting for Server - FAILED kill -0 2604 >/dev/null 2>/dev/null selfserv_9159 with PID 2604 found at Fri Jan 8 12:22:42 EST 2016 selfserv_9159 with PID 2604 started at Fri Jan 8 12:22:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2699: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 2604 at Fri Jan 8 12:22:43 EST 2016 kill -USR1 2604 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2604 killed at Fri Jan 8 12:22:43 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:22:43 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:22:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:22:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2700: Waiting for Server - FAILED kill -0 2689 >/dev/null 2>/dev/null selfserv_9159 with PID 2689 found at Fri Jan 8 12:22:49 EST 2016 selfserv_9159 with PID 2689 started at Fri Jan 8 12:22:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2701: TLS Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 2689 at Fri Jan 8 12:22:50 EST 2016 kill -USR1 2689 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2689 killed at Fri Jan 8 12:22:50 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:22:50 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:22:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:22:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2702: Waiting for Server - FAILED kill -0 2759 >/dev/null 2>/dev/null selfserv_9159 with PID 2759 found at Fri Jan 8 12:22:56 EST 2016 selfserv_9159 with PID 2759 started at Fri Jan 8 12:22:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2703: TLS Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 2759 at Fri Jan 8 12:22:57 EST 2016 kill -USR1 2759 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2759 killed at Fri Jan 8 12:22:57 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:22:57 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:22:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:23:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2704: Waiting for Server - FAILED kill -0 2828 >/dev/null 2>/dev/null selfserv_9159 with PID 2828 found at Fri Jan 8 12:23:03 EST 2016 selfserv_9159 with PID 2828 started at Fri Jan 8 12:23:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2705: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 2828 at Fri Jan 8 12:23:04 EST 2016 kill -USR1 2828 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2828 killed at Fri Jan 8 12:23:04 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:23:04 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:23:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:23:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2706: Waiting for Server - FAILED kill -0 2898 >/dev/null 2>/dev/null selfserv_9159 with PID 2898 found at Fri Jan 8 12:23:10 EST 2016 selfserv_9159 with PID 2898 started at Fri Jan 8 12:23:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2707: TLS Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 2898 at Fri Jan 8 12:23:11 EST 2016 kill -USR1 2898 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2898 killed at Fri Jan 8 12:23:11 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:23:11 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:23:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:23:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2708: Waiting for Server - FAILED kill -0 2967 >/dev/null 2>/dev/null selfserv_9159 with PID 2967 found at Fri Jan 8 12:23:17 EST 2016 selfserv_9159 with PID 2967 started at Fri Jan 8 12:23:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2709: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 2967 at Fri Jan 8 12:23:18 EST 2016 kill -USR1 2967 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2967 killed at Fri Jan 8 12:23:18 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:23:18 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:23:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:23:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2710: Waiting for Server - FAILED kill -0 3036 >/dev/null 2>/dev/null selfserv_9159 with PID 3036 found at Fri Jan 8 12:23:24 EST 2016 selfserv_9159 with PID 3036 started at Fri Jan 8 12:23:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2711: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 3036 at Fri Jan 8 12:23:24 EST 2016 kill -USR1 3036 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3036 killed at Fri Jan 8 12:23:25 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:23:25 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:23:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:23:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2712: Waiting for Server - FAILED kill -0 3106 >/dev/null 2>/dev/null selfserv_9159 with PID 3106 found at Fri Jan 8 12:23:31 EST 2016 selfserv_9159 with PID 3106 started at Fri Jan 8 12:23:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2713: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 3106 at Fri Jan 8 12:23:31 EST 2016 kill -USR1 3106 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3106 killed at Fri Jan 8 12:23:32 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:23:32 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:23:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:23:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2714: Waiting for Server - FAILED kill -0 3175 >/dev/null 2>/dev/null selfserv_9159 with PID 3175 found at Fri Jan 8 12:23:38 EST 2016 selfserv_9159 with PID 3175 started at Fri Jan 8 12:23:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2715: SSL3 Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 3175 at Fri Jan 8 12:23:38 EST 2016 kill -USR1 3175 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3175 killed at Fri Jan 8 12:23:39 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:23:39 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:23:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:23:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2716: Waiting for Server - FAILED kill -0 3244 >/dev/null 2>/dev/null selfserv_9159 with PID 3244 found at Fri Jan 8 12:23:45 EST 2016 selfserv_9159 with PID 3244 started at Fri Jan 8 12:23:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2717: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 3244 at Fri Jan 8 12:23:45 EST 2016 kill -USR1 3244 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3244 killed at Fri Jan 8 12:23:46 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:23:46 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:23:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:23:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2718: Waiting for Server - FAILED kill -0 3314 >/dev/null 2>/dev/null selfserv_9159 with PID 3314 found at Fri Jan 8 12:23:52 EST 2016 selfserv_9159 with PID 3314 started at Fri Jan 8 12:23:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2719: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 3314 at Fri Jan 8 12:23:52 EST 2016 kill -USR1 3314 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3314 killed at Fri Jan 8 12:23:53 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:23:53 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:23:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:23:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2720: Waiting for Server - FAILED kill -0 3383 >/dev/null 2>/dev/null selfserv_9159 with PID 3383 found at Fri Jan 8 12:23:59 EST 2016 selfserv_9159 with PID 3383 started at Fri Jan 8 12:23:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2721: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 3383 at Fri Jan 8 12:23:59 EST 2016 kill -USR1 3383 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3383 killed at Fri Jan 8 12:24:00 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:24:00 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:24:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:24:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2722: Waiting for Server - FAILED kill -0 3452 >/dev/null 2>/dev/null selfserv_9159 with PID 3452 found at Fri Jan 8 12:24:06 EST 2016 selfserv_9159 with PID 3452 started at Fri Jan 8 12:24:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2723: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 3452 at Fri Jan 8 12:24:06 EST 2016 kill -USR1 3452 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3452 killed at Fri Jan 8 12:24:06 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:24:07 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:24:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:24:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2724: Waiting for Server - FAILED kill -0 3522 >/dev/null 2>/dev/null selfserv_9159 with PID 3522 found at Fri Jan 8 12:24:12 EST 2016 selfserv_9159 with PID 3522 started at Fri Jan 8 12:24:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2725: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 3522 at Fri Jan 8 12:24:13 EST 2016 kill -USR1 3522 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3522 killed at Fri Jan 8 12:24:13 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:24:13 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:24:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:24:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2726: Waiting for Server - FAILED kill -0 3591 >/dev/null 2>/dev/null selfserv_9159 with PID 3591 found at Fri Jan 8 12:24:19 EST 2016 selfserv_9159 with PID 3591 started at Fri Jan 8 12:24:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2727: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 3591 at Fri Jan 8 12:24:20 EST 2016 kill -USR1 3591 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3591 killed at Fri Jan 8 12:24:20 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:24:20 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:24:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:24:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2728: Waiting for Server - FAILED kill -0 3660 >/dev/null 2>/dev/null selfserv_9159 with PID 3660 found at Fri Jan 8 12:24:26 EST 2016 selfserv_9159 with PID 3660 started at Fri Jan 8 12:24:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2729: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 3660 at Fri Jan 8 12:24:27 EST 2016 kill -USR1 3660 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3660 killed at Fri Jan 8 12:24:27 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:24:27 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:24:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:24:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2730: Waiting for Server - FAILED kill -0 3730 >/dev/null 2>/dev/null selfserv_9159 with PID 3730 found at Fri Jan 8 12:24:33 EST 2016 selfserv_9159 with PID 3730 started at Fri Jan 8 12:24:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2731: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 3730 at Fri Jan 8 12:24:34 EST 2016 kill -USR1 3730 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3730 killed at Fri Jan 8 12:24:34 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:24:34 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:24:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:24:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2732: Waiting for Server - FAILED kill -0 3799 >/dev/null 2>/dev/null selfserv_9159 with PID 3799 found at Fri Jan 8 12:24:40 EST 2016 selfserv_9159 with PID 3799 started at Fri Jan 8 12:24:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2733: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 3799 at Fri Jan 8 12:24:41 EST 2016 kill -USR1 3799 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3799 killed at Fri Jan 8 12:24:41 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:24:41 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:24:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:24:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2734: Waiting for Server - FAILED kill -0 3868 >/dev/null 2>/dev/null selfserv_9159 with PID 3868 found at Fri Jan 8 12:24:47 EST 2016 selfserv_9159 with PID 3868 started at Fri Jan 8 12:24:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2735: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 3868 at Fri Jan 8 12:24:48 EST 2016 kill -USR1 3868 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3868 killed at Fri Jan 8 12:24:48 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:24:48 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:24:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:24:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2736: Waiting for Server - FAILED kill -0 3938 >/dev/null 2>/dev/null selfserv_9159 with PID 3938 found at Fri Jan 8 12:24:54 EST 2016 selfserv_9159 with PID 3938 started at Fri Jan 8 12:24:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2737: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 3938 at Fri Jan 8 12:24:54 EST 2016 kill -USR1 3938 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3938 killed at Fri Jan 8 12:24:55 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:24:55 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:24:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:25:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2738: Waiting for Server - FAILED kill -0 4008 >/dev/null 2>/dev/null selfserv_9159 with PID 4008 found at Fri Jan 8 12:25:01 EST 2016 selfserv_9159 with PID 4008 started at Fri Jan 8 12:25:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2739: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4008 at Fri Jan 8 12:25:01 EST 2016 kill -USR1 4008 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4008 killed at Fri Jan 8 12:25:02 EST 2016 ssl.sh: TLS Server hello response without SNI ---- selfserv_9159 starting at Fri Jan 8 12:25:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:25:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:25:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2740: Waiting for Server - FAILED kill -0 4098 >/dev/null 2>/dev/null selfserv_9159 with PID 4098 found at Fri Jan 8 12:25:08 EST 2016 selfserv_9159 with PID 4098 started at Fri Jan 8 12:25:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2741: TLS Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4098 at Fri Jan 8 12:25:08 EST 2016 kill -USR1 4098 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4098 killed at Fri Jan 8 12:25:09 EST 2016 ssl.sh: TLS Server hello response with SNI ---- selfserv_9159 starting at Fri Jan 8 12:25:09 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:25:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:25:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2742: Waiting for Server - FAILED kill -0 4174 >/dev/null 2>/dev/null selfserv_9159 with PID 4174 found at Fri Jan 8 12:25:15 EST 2016 selfserv_9159 with PID 4174 started at Fri Jan 8 12:25:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2743: TLS Server hello response with SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4174 at Fri Jan 8 12:25:15 EST 2016 kill -USR1 4174 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4174 killed at Fri Jan 8 12:25:16 EST 2016 ssl.sh: TLS Server response with alert ---- selfserv_9159 starting at Fri Jan 8 12:25:16 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:25:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:25:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2744: Waiting for Server - FAILED kill -0 4249 >/dev/null 2>/dev/null selfserv_9159 with PID 4249 found at Fri Jan 8 12:25:22 EST 2016 selfserv_9159 with PID 4249 started at Fri Jan 8 12:25:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2745: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 4249 at Fri Jan 8 12:25:22 EST 2016 kill -USR1 4249 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4249 killed at Fri Jan 8 12:25:23 EST 2016 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9159 starting at Fri Jan 8 12:25:23 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:25:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:25:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2746: Waiting for Server - FAILED kill -0 4325 >/dev/null 2>/dev/null selfserv_9159 with PID 4325 found at Fri Jan 8 12:25:29 EST 2016 selfserv_9159 with PID 4325 started at Fri Jan 8 12:25:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2747: SSL3 Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4325 at Fri Jan 8 12:25:29 EST 2016 kill -USR1 4325 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4325 killed at Fri Jan 8 12:25:30 EST 2016 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9159 starting at Fri Jan 8 12:25:30 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:25:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:25:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2748: Waiting for Server - FAILED kill -0 4402 >/dev/null 2>/dev/null selfserv_9159 with PID 4402 found at Fri Jan 8 12:25:36 EST 2016 selfserv_9159 with PID 4402 started at Fri Jan 8 12:25:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c vssl3 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2749: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 4402 at Fri Jan 8 12:25:36 EST 2016 kill -USR1 4402 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4402 killed at Fri Jan 8 12:25:37 EST 2016 ssl.sh: TLS Server hello response without SNI ---- selfserv_9159 starting at Fri Jan 8 12:25:37 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:25:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:25:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2750: Waiting for Server - FAILED kill -0 4477 >/dev/null 2>/dev/null selfserv_9159 with PID 4477 found at Fri Jan 8 12:25:43 EST 2016 selfserv_9159 with PID 4477 started at Fri Jan 8 12:25:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2751: TLS Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4477 at Fri Jan 8 12:25:43 EST 2016 kill -USR1 4477 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4477 killed at Fri Jan 8 12:25:43 EST 2016 ssl.sh: TLS Server hello response with SNI ---- selfserv_9159 starting at Fri Jan 8 12:25:44 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:25:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:25:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2752: Waiting for Server - FAILED kill -0 4553 >/dev/null 2>/dev/null selfserv_9159 with PID 4553 found at Fri Jan 8 12:25:49 EST 2016 selfserv_9159 with PID 4553 started at Fri Jan 8 12:25:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2753: TLS Server hello response with SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4553 at Fri Jan 8 12:25:50 EST 2016 kill -USR1 4553 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4553 killed at Fri Jan 8 12:25:50 EST 2016 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9159 starting at Fri Jan 8 12:25:50 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:25:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:25:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2754: Waiting for Server - FAILED kill -0 4629 >/dev/null 2>/dev/null selfserv_9159 with PID 4629 found at Fri Jan 8 12:25:56 EST 2016 selfserv_9159 with PID 4629 started at Fri Jan 8 12:25:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2755: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 4629 at Fri Jan 8 12:25:57 EST 2016 kill -USR1 4629 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4629 killed at Fri Jan 8 12:25:57 EST 2016 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9159 starting at Fri Jan 8 12:25:57 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:25:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:26:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2756: Waiting for Server - FAILED kill -0 4704 >/dev/null 2>/dev/null selfserv_9159 with PID 4704 found at Fri Jan 8 12:26:03 EST 2016 selfserv_9159 with PID 4704 started at Fri Jan 8 12:26:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2757: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 4704 at Fri Jan 8 12:26:04 EST 2016 kill -USR1 4704 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4704 killed at Fri Jan 8 12:26:04 EST 2016 ssl.sh: TLS Server response with alert ---- selfserv_9159 starting at Fri Jan 8 12:26:04 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:26:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:26:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2758: Waiting for Server - FAILED kill -0 4780 >/dev/null 2>/dev/null selfserv_9159 with PID 4780 found at Fri Jan 8 12:26:10 EST 2016 selfserv_9159 with PID 4780 started at Fri Jan 8 12:26:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2759: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 4780 at Fri Jan 8 12:26:11 EST 2016 kill -USR1 4780 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4780 killed at Fri Jan 8 12:26:11 EST 2016 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client bypass - with ECC =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9159 starting at Fri Jan 8 12:26:11 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:26:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:26:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2760: Waiting for Server - FAILED kill -0 4841 >/dev/null 2>/dev/null selfserv_9159 with PID 4841 found at Fri Jan 8 12:26:17 EST 2016 selfserv_9159 with PID 4841 started at Fri Jan 8 12:26:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2761: OCSP stapling, signed response, good status produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4841 at Fri Jan 8 12:26:18 EST 2016 kill -USR1 4841 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4841 killed at Fri Jan 8 12:26:18 EST 2016 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9159 starting at Fri Jan 8 12:26:18 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:26:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:26:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2762: Waiting for Server - FAILED kill -0 4902 >/dev/null 2>/dev/null selfserv_9159 with PID 4902 found at Fri Jan 8 12:26:24 EST 2016 selfserv_9159 with PID 4902 started at Fri Jan 8 12:26:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2763: OCSP stapling, signed response, revoked status produced a returncode of 1, expected is 3 - FAILED trying to kill selfserv_9159 with PID 4902 at Fri Jan 8 12:26:25 EST 2016 kill -USR1 4902 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4902 killed at Fri Jan 8 12:26:25 EST 2016 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9159 starting at Fri Jan 8 12:26:25 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:26:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:26:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2764: Waiting for Server - FAILED kill -0 4964 >/dev/null 2>/dev/null selfserv_9159 with PID 4964 found at Fri Jan 8 12:26:31 EST 2016 selfserv_9159 with PID 4964 started at Fri Jan 8 12:26:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2765: OCSP stapling, signed response, unknown status produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9159 with PID 4964 at Fri Jan 8 12:26:31 EST 2016 kill -USR1 4964 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4964 killed at Fri Jan 8 12:26:32 EST 2016 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9159 starting at Fri Jan 8 12:26:32 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:26:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:26:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2766: Waiting for Server - FAILED kill -0 5025 >/dev/null 2>/dev/null selfserv_9159 with PID 5025 found at Fri Jan 8 12:26:38 EST 2016 selfserv_9159 with PID 5025 started at Fri Jan 8 12:26:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2767: OCSP stapling, unsigned failure response produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9159 with PID 5025 at Fri Jan 8 12:26:38 EST 2016 kill -USR1 5025 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5025 killed at Fri Jan 8 12:26:39 EST 2016 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9159 starting at Fri Jan 8 12:26:39 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:26:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:26:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2768: Waiting for Server - FAILED kill -0 5086 >/dev/null 2>/dev/null selfserv_9159 with PID 5086 found at Fri Jan 8 12:26:45 EST 2016 selfserv_9159 with PID 5086 started at Fri Jan 8 12:26:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2769: OCSP stapling, good status, bad signature produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9159 with PID 5086 at Fri Jan 8 12:26:45 EST 2016 kill -USR1 5086 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5086 killed at Fri Jan 8 12:26:46 EST 2016 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9159 starting at Fri Jan 8 12:26:46 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:26:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:26:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2770: Waiting for Server - FAILED kill -0 5148 >/dev/null 2>/dev/null selfserv_9159 with PID 5148 found at Fri Jan 8 12:26:52 EST 2016 selfserv_9159 with PID 5148 started at Fri Jan 8 12:26:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2771: OCSP stapling, invalid cert status data produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9159 with PID 5148 at Fri Jan 8 12:26:52 EST 2016 kill -USR1 5148 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5148 killed at Fri Jan 8 12:26:52 EST 2016 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9159 starting at Fri Jan 8 12:26:53 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:26:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:26:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2772: Waiting for Server - FAILED kill -0 5209 >/dev/null 2>/dev/null selfserv_9159 with PID 5209 found at Fri Jan 8 12:26:58 EST 2016 selfserv_9159 with PID 5209 started at Fri Jan 8 12:26:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2773: Valid cert, Server doesn't staple produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9159 with PID 5209 at Fri Jan 8 12:26:59 EST 2016 kill -USR1 5209 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5209 killed at Fri Jan 8 12:26:59 EST 2016 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9159 starting at Fri Jan 8 12:26:59 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:26:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:27:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2774: Waiting for Server - FAILED kill -0 5270 >/dev/null 2>/dev/null selfserv_9159 with PID 5270 found at Fri Jan 8 12:27:05 EST 2016 selfserv_9159 with PID 5270 started at Fri Jan 8 12:27:05 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss \ -c 1000 -V ssl3: -N -T localhost.localdomain strsclnt started at Fri Jan 8 12:27:05 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:27:06 EST 2016 ssl.sh: #2775: Stress OCSP stapling, server uses random status produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 5270 at Fri Jan 8 12:27:06 EST 2016 kill -USR1 5270 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5270 killed at Fri Jan 8 12:27:06 EST 2016 ssl.sh: SSL Stress Test - server normal/client bypass - with ECC =============================== ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9159 starting at Fri Jan 8 12:27:07 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:27:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:27:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2776: Waiting for Server - FAILED kill -0 5423 >/dev/null 2>/dev/null selfserv_9159 with PID 5423 found at Fri Jan 8 12:27:13 EST 2016 selfserv_9159 with PID 5423 started at Fri Jan 8 12:27:13 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -c 1000 -C c -V :ssl3 \ localhost.localdomain strsclnt started at Fri Jan 8 12:27:13 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:27:13 EST 2016 ssl.sh: #2777: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 5423 at Fri Jan 8 12:27:13 EST 2016 kill -USR1 5423 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5423 killed at Fri Jan 8 12:27:14 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9159 starting at Fri Jan 8 12:27:14 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:27:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:27:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2778: Waiting for Server - FAILED kill -0 5502 >/dev/null 2>/dev/null selfserv_9159 with PID 5502 found at Fri Jan 8 12:27:20 EST 2016 selfserv_9159 with PID 5502 started at Fri Jan 8 12:27:20 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Fri Jan 8 12:27:20 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:27:20 EST 2016 ssl.sh: #2779: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 5502 at Fri Jan 8 12:27:20 EST 2016 kill -USR1 5502 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5502 killed at Fri Jan 8 12:27:21 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9159 starting at Fri Jan 8 12:27:21 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:27:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:27:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2780: Waiting for Server - FAILED kill -0 5581 >/dev/null 2>/dev/null selfserv_9159 with PID 5581 found at Fri Jan 8 12:27:27 EST 2016 selfserv_9159 with PID 5581 started at Fri Jan 8 12:27:27 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Fri Jan 8 12:27:27 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:27:27 EST 2016 ssl.sh: #2781: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 5581 at Fri Jan 8 12:27:27 EST 2016 kill -USR1 5581 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5581 killed at Fri Jan 8 12:27:28 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9159 starting at Fri Jan 8 12:27:28 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:27:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:27:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2782: Waiting for Server - FAILED kill -0 5661 >/dev/null 2>/dev/null selfserv_9159 with PID 5661 found at Fri Jan 8 12:27:34 EST 2016 selfserv_9159 with PID 5661 started at Fri Jan 8 12:27:34 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 12:27:34 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:27:34 EST 2016 ssl.sh: #2783: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 5661 at Fri Jan 8 12:27:34 EST 2016 kill -USR1 5661 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5661 killed at Fri Jan 8 12:27:35 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9159 starting at Fri Jan 8 12:27:35 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:27:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:27:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2784: Waiting for Server - FAILED kill -0 5742 >/dev/null 2>/dev/null selfserv_9159 with PID 5742 found at Fri Jan 8 12:27:41 EST 2016 selfserv_9159 with PID 5742 started at Fri Jan 8 12:27:41 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Fri Jan 8 12:27:41 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:27:41 EST 2016 ssl.sh: #2785: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 5742 at Fri Jan 8 12:27:41 EST 2016 kill -USR1 5742 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5742 killed at Fri Jan 8 12:27:42 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9159 starting at Fri Jan 8 12:27:42 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:27:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:27:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2786: Waiting for Server - FAILED kill -0 5827 >/dev/null 2>/dev/null selfserv_9159 with PID 5827 found at Fri Jan 8 12:27:48 EST 2016 selfserv_9159 with PID 5827 started at Fri Jan 8 12:27:48 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 12:27:48 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:27:48 EST 2016 ssl.sh: #2787: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 5827 at Fri Jan 8 12:27:48 EST 2016 kill -USR1 5827 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5827 killed at Fri Jan 8 12:27:49 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9159 starting at Fri Jan 8 12:27:49 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:27:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:27:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2788: Waiting for Server - FAILED kill -0 5911 >/dev/null 2>/dev/null selfserv_9159 with PID 5911 found at Fri Jan 8 12:27:55 EST 2016 selfserv_9159 with PID 5911 started at Fri Jan 8 12:27:55 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 12:27:55 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:27:55 EST 2016 ssl.sh: #2789: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 5911 at Fri Jan 8 12:27:55 EST 2016 kill -USR1 5911 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5911 killed at Fri Jan 8 12:27:56 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9159 starting at Fri Jan 8 12:27:56 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:27:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:28:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2790: Waiting for Server - FAILED kill -0 6004 >/dev/null 2>/dev/null selfserv_9159 with PID 6004 found at Fri Jan 8 12:28:02 EST 2016 selfserv_9159 with PID 6004 started at Fri Jan 8 12:28:02 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 12:28:02 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:28:02 EST 2016 ssl.sh: #2791: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 6004 at Fri Jan 8 12:28:02 EST 2016 kill -USR1 6004 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6004 killed at Fri Jan 8 12:28:03 EST 2016 ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:28:03 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:28:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:28:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2792: Waiting for Server - FAILED kill -0 6121 >/dev/null 2>/dev/null selfserv_9159 with PID 6121 found at Fri Jan 8 12:28:09 EST 2016 selfserv_9159 with PID 6121 started at Fri Jan 8 12:28:09 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -c 100 -C c -V :ssl3 -N -n TestUser \ localhost.localdomain strsclnt started at Fri Jan 8 12:28:09 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:28:09 EST 2016 ssl.sh: #2793: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 6121 at Fri Jan 8 12:28:10 EST 2016 kill -USR1 6121 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6121 killed at Fri Jan 8 12:28:10 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:28:10 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:28:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:28:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2794: Waiting for Server - FAILED kill -0 6201 >/dev/null 2>/dev/null selfserv_9159 with PID 6201 found at Fri Jan 8 12:28:16 EST 2016 selfserv_9159 with PID 6201 started at Fri Jan 8 12:28:16 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Fri Jan 8 12:28:16 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:28:17 EST 2016 ssl.sh: #2795: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 6201 at Fri Jan 8 12:28:17 EST 2016 kill -USR1 6201 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6201 killed at Fri Jan 8 12:28:17 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:28:17 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:28:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:28:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2796: Waiting for Server - FAILED kill -0 6280 >/dev/null 2>/dev/null selfserv_9159 with PID 6280 found at Fri Jan 8 12:28:23 EST 2016 selfserv_9159 with PID 6280 started at Fri Jan 8 12:28:23 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Fri Jan 8 12:28:23 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:28:24 EST 2016 ssl.sh: #2797: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 6280 at Fri Jan 8 12:28:24 EST 2016 kill -USR1 6280 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6280 killed at Fri Jan 8 12:28:24 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:28:24 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:28:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:28:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2798: Waiting for Server - FAILED kill -0 6359 >/dev/null 2>/dev/null selfserv_9159 with PID 6359 found at Fri Jan 8 12:28:30 EST 2016 selfserv_9159 with PID 6359 started at Fri Jan 8 12:28:30 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Fri Jan 8 12:28:30 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:28:31 EST 2016 ssl.sh: #2799: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 6359 at Fri Jan 8 12:28:31 EST 2016 kill -USR1 6359 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6359 killed at Fri Jan 8 12:28:31 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9159 starting at Fri Jan 8 12:28:31 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:28:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:28:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2800: Waiting for Server - FAILED kill -0 6440 >/dev/null 2>/dev/null selfserv_9159 with PID 6440 found at Fri Jan 8 12:28:37 EST 2016 selfserv_9159 with PID 6440 started at Fri Jan 8 12:28:37 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 12:28:37 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:28:38 EST 2016 ssl.sh: #2801: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 6440 at Fri Jan 8 12:28:38 EST 2016 kill -USR1 6440 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6440 killed at Fri Jan 8 12:28:38 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:28:38 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:28:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:28:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2802: Waiting for Server - FAILED kill -0 6519 >/dev/null 2>/dev/null selfserv_9159 with PID 6519 found at Fri Jan 8 12:28:44 EST 2016 selfserv_9159 with PID 6519 started at Fri Jan 8 12:28:44 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 12:28:44 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:28:45 EST 2016 ssl.sh: #2803: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 6519 at Fri Jan 8 12:28:45 EST 2016 kill -USR1 6519 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6519 killed at Fri Jan 8 12:28:45 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9159 starting at Fri Jan 8 12:28:45 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:28:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:28:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2804: Waiting for Server - FAILED kill -0 6598 >/dev/null 2>/dev/null selfserv_9159 with PID 6598 found at Fri Jan 8 12:28:51 EST 2016 selfserv_9159 with PID 6598 started at Fri Jan 8 12:28:51 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 12:28:51 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:28:52 EST 2016 ssl.sh: #2805: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 6598 at Fri Jan 8 12:28:52 EST 2016 kill -USR1 6598 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6598 killed at Fri Jan 8 12:28:52 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9159 starting at Fri Jan 8 12:28:52 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:28:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:28:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2806: Waiting for Server - FAILED kill -0 6684 >/dev/null 2>/dev/null selfserv_9159 with PID 6684 found at Fri Jan 8 12:28:58 EST 2016 selfserv_9159 with PID 6684 started at Fri Jan 8 12:28:58 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 12:28:58 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:28:59 EST 2016 ssl.sh: #2807: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 6684 at Fri Jan 8 12:28:59 EST 2016 kill -USR1 6684 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6684 killed at Fri Jan 8 12:28:59 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9159 starting at Fri Jan 8 12:28:59 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:28:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:29:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2808: Waiting for Server - FAILED kill -0 6769 >/dev/null 2>/dev/null selfserv_9159 with PID 6769 found at Fri Jan 8 12:29:05 EST 2016 selfserv_9159 with PID 6769 started at Fri Jan 8 12:29:05 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Fri Jan 8 12:29:05 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:29:06 EST 2016 ssl.sh: #2809: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 6769 at Fri Jan 8 12:29:06 EST 2016 kill -USR1 6769 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6769 killed at Fri Jan 8 12:29:06 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:29:06 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:29:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:29:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2810: Waiting for Server - FAILED kill -0 6869 >/dev/null 2>/dev/null selfserv_9159 with PID 6869 found at Fri Jan 8 12:29:12 EST 2016 selfserv_9159 with PID 6869 started at Fri Jan 8 12:29:12 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:29:12 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:29:13 EST 2016 ssl.sh: #2811: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 6869 at Fri Jan 8 12:29:13 EST 2016 kill -USR1 6869 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6869 killed at Fri Jan 8 12:29:13 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:29:13 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:29:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:29:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2812: Waiting for Server - FAILED kill -0 6949 >/dev/null 2>/dev/null selfserv_9159 with PID 6949 found at Fri Jan 8 12:29:19 EST 2016 selfserv_9159 with PID 6949 started at Fri Jan 8 12:29:19 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:29:19 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:29:20 EST 2016 ssl.sh: #2813: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 6949 at Fri Jan 8 12:29:20 EST 2016 kill -USR1 6949 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6949 killed at Fri Jan 8 12:29:20 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:29:20 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:29:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:29:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2814: Waiting for Server - FAILED kill -0 7028 >/dev/null 2>/dev/null selfserv_9159 with PID 7028 found at Fri Jan 8 12:29:26 EST 2016 selfserv_9159 with PID 7028 started at Fri Jan 8 12:29:26 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:29:26 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:29:27 EST 2016 ssl.sh: #2815: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 7028 at Fri Jan 8 12:29:27 EST 2016 kill -USR1 7028 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7028 killed at Fri Jan 8 12:29:27 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:29:27 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:29:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:29:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2816: Waiting for Server - FAILED kill -0 7107 >/dev/null 2>/dev/null selfserv_9159 with PID 7107 found at Fri Jan 8 12:29:33 EST 2016 selfserv_9159 with PID 7107 started at Fri Jan 8 12:29:33 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:29:33 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:29:34 EST 2016 ssl.sh: #2817: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 7107 at Fri Jan 8 12:29:34 EST 2016 kill -USR1 7107 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7107 killed at Fri Jan 8 12:29:34 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:29:35 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:29:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:29:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2818: Waiting for Server - FAILED kill -0 7187 >/dev/null 2>/dev/null selfserv_9159 with PID 7187 found at Fri Jan 8 12:29:40 EST 2016 selfserv_9159 with PID 7187 started at Fri Jan 8 12:29:40 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:29:40 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:29:41 EST 2016 ssl.sh: #2819: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 7187 at Fri Jan 8 12:29:41 EST 2016 kill -USR1 7187 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7187 killed at Fri Jan 8 12:29:41 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9159 starting at Fri Jan 8 12:29:42 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:29:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:29:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2820: Waiting for Server - FAILED kill -0 7266 >/dev/null 2>/dev/null selfserv_9159 with PID 7266 found at Fri Jan 8 12:29:47 EST 2016 selfserv_9159 with PID 7266 started at Fri Jan 8 12:29:47 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Fri Jan 8 12:29:47 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:29:48 EST 2016 ssl.sh: #2821: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 7266 at Fri Jan 8 12:29:48 EST 2016 kill -USR1 7266 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7266 killed at Fri Jan 8 12:29:48 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9159 starting at Fri Jan 8 12:29:49 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:29:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:29:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2822: Waiting for Server - FAILED kill -0 7345 >/dev/null 2>/dev/null selfserv_9159 with PID 7345 found at Fri Jan 8 12:29:54 EST 2016 selfserv_9159 with PID 7345 started at Fri Jan 8 12:29:54 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Fri Jan 8 12:29:54 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:29:55 EST 2016 ssl.sh: #2823: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 7345 at Fri Jan 8 12:29:55 EST 2016 kill -USR1 7345 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7345 killed at Fri Jan 8 12:29:55 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9159 starting at Fri Jan 8 12:29:56 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:29:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:30:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2824: Waiting for Server - FAILED kill -0 7425 >/dev/null 2>/dev/null selfserv_9159 with PID 7425 found at Fri Jan 8 12:30:01 EST 2016 selfserv_9159 with PID 7425 started at Fri Jan 8 12:30:01 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Fri Jan 8 12:30:02 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:30:02 EST 2016 ssl.sh: #2825: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 7425 at Fri Jan 8 12:30:02 EST 2016 kill -USR1 7425 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7425 killed at Fri Jan 8 12:30:02 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9159 starting at Fri Jan 8 12:30:03 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:30:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:30:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2826: Waiting for Server - FAILED kill -0 7504 >/dev/null 2>/dev/null selfserv_9159 with PID 7504 found at Fri Jan 8 12:30:09 EST 2016 selfserv_9159 with PID 7504 started at Fri Jan 8 12:30:09 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Fri Jan 8 12:30:09 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:30:09 EST 2016 ssl.sh: #2827: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 7504 at Fri Jan 8 12:30:09 EST 2016 kill -USR1 7504 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7504 killed at Fri Jan 8 12:30:10 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9159 starting at Fri Jan 8 12:30:10 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:30:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:30:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2828: Waiting for Server - FAILED kill -0 7583 >/dev/null 2>/dev/null selfserv_9159 with PID 7583 found at Fri Jan 8 12:30:16 EST 2016 selfserv_9159 with PID 7583 started at Fri Jan 8 12:30:16 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Fri Jan 8 12:30:16 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:30:16 EST 2016 ssl.sh: #2829: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 7583 at Fri Jan 8 12:30:16 EST 2016 kill -USR1 7583 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7583 killed at Fri Jan 8 12:30:17 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:30:17 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:30:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:30:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2830: Waiting for Server - FAILED kill -0 7684 >/dev/null 2>/dev/null selfserv_9159 with PID 7684 found at Fri Jan 8 12:30:23 EST 2016 selfserv_9159 with PID 7684 started at Fri Jan 8 12:30:23 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C009 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 12:30:23 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:30:23 EST 2016 ssl.sh: #2831: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 7684 at Fri Jan 8 12:30:23 EST 2016 kill -USR1 7684 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7684 killed at Fri Jan 8 12:30:24 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:30:24 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:30:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:30:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2832: Waiting for Server - FAILED kill -0 7763 >/dev/null 2>/dev/null selfserv_9159 with PID 7763 found at Fri Jan 8 12:30:30 EST 2016 selfserv_9159 with PID 7763 started at Fri Jan 8 12:30:30 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 12:30:30 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:30:30 EST 2016 ssl.sh: #2833: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 7763 at Fri Jan 8 12:30:30 EST 2016 kill -USR1 7763 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7763 killed at Fri Jan 8 12:30:31 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:30:31 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:30:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:30:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2834: Waiting for Server - FAILED kill -0 7842 >/dev/null 2>/dev/null selfserv_9159 with PID 7842 found at Fri Jan 8 12:30:37 EST 2016 selfserv_9159 with PID 7842 started at Fri Jan 8 12:30:37 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C004 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 12:30:37 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:30:37 EST 2016 ssl.sh: #2835: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 7842 at Fri Jan 8 12:30:37 EST 2016 kill -USR1 7842 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7842 killed at Fri Jan 8 12:30:38 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:30:38 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:30:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:30:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2836: Waiting for Server - FAILED kill -0 7922 >/dev/null 2>/dev/null selfserv_9159 with PID 7922 found at Fri Jan 8 12:30:44 EST 2016 selfserv_9159 with PID 7922 started at Fri Jan 8 12:30:44 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C00E -N -n TestUser-ecmixed \ localhost.localdomain strsclnt started at Fri Jan 8 12:30:44 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:30:44 EST 2016 ssl.sh: #2837: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 7922 at Fri Jan 8 12:30:44 EST 2016 kill -USR1 7922 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7922 killed at Fri Jan 8 12:30:45 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9159 starting at Fri Jan 8 12:30:45 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:30:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:30:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2838: Waiting for Server - FAILED kill -0 8001 >/dev/null 2>/dev/null selfserv_9159 with PID 8001 found at Fri Jan 8 12:30:51 EST 2016 selfserv_9159 with PID 8001 started at Fri Jan 8 12:30:51 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 12:30:51 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:30:51 EST 2016 ssl.sh: #2839: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 8001 at Fri Jan 8 12:30:51 EST 2016 kill -USR1 8001 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8001 killed at Fri Jan 8 12:30:52 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:30:52 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:30:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:30:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2840: Waiting for Server - FAILED kill -0 8080 >/dev/null 2>/dev/null selfserv_9159 with PID 8080 found at Fri Jan 8 12:30:58 EST 2016 selfserv_9159 with PID 8080 started at Fri Jan 8 12:30:58 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \ localhost.localdomain strsclnt started at Fri Jan 8 12:30:58 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:30:58 EST 2016 ssl.sh: #2841: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 8080 at Fri Jan 8 12:30:58 EST 2016 kill -USR1 8080 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8080 killed at Fri Jan 8 12:30:59 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:30:59 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:30:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:31:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2842: Waiting for Server - FAILED kill -0 8181 >/dev/null 2>/dev/null selfserv_9159 with PID 8181 found at Fri Jan 8 12:31:05 EST 2016 selfserv_9159 with PID 8181 started at Fri Jan 8 12:31:05 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:31:05 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:31:05 EST 2016 ssl.sh: #2843: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 8181 at Fri Jan 8 12:31:05 EST 2016 kill -USR1 8181 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8181 killed at Fri Jan 8 12:31:06 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9159 starting at Fri Jan 8 12:31:06 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:31:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:31:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2844: Waiting for Server - FAILED kill -0 8260 >/dev/null 2>/dev/null selfserv_9159 with PID 8260 found at Fri Jan 8 12:31:12 EST 2016 selfserv_9159 with PID 8260 started at Fri Jan 8 12:31:12 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Fri Jan 8 12:31:12 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:31:12 EST 2016 ssl.sh: #2845: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 8260 at Fri Jan 8 12:31:12 EST 2016 kill -USR1 8260 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8260 killed at Fri Jan 8 12:31:13 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:31:13 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:31:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:31:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2846: Waiting for Server - FAILED kill -0 8339 >/dev/null 2>/dev/null selfserv_9159 with PID 8339 found at Fri Jan 8 12:31:19 EST 2016 selfserv_9159 with PID 8339 started at Fri Jan 8 12:31:19 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:31:19 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:31:19 EST 2016 ssl.sh: #2847: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 8339 at Fri Jan 8 12:31:20 EST 2016 kill -USR1 8339 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8339 killed at Fri Jan 8 12:31:20 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:31:20 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:31:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:31:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2848: Waiting for Server - FAILED kill -0 8420 >/dev/null 2>/dev/null selfserv_9159 with PID 8420 found at Fri Jan 8 12:31:26 EST 2016 selfserv_9159 with PID 8420 started at Fri Jan 8 12:31:26 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:31:26 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:31:26 EST 2016 ssl.sh: #2849: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 8420 at Fri Jan 8 12:31:27 EST 2016 kill -USR1 8420 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8420 killed at Fri Jan 8 12:31:27 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:31:27 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:31:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:31:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2850: Waiting for Server - FAILED kill -0 8513 >/dev/null 2>/dev/null selfserv_9159 with PID 8513 found at Fri Jan 8 12:31:33 EST 2016 selfserv_9159 with PID 8513 started at Fri Jan 8 12:31:33 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:31:33 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:31:34 EST 2016 ssl.sh: #2851: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 8513 at Fri Jan 8 12:31:34 EST 2016 kill -USR1 8513 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8513 killed at Fri Jan 8 12:31:34 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9159 starting at Fri Jan 8 12:31:34 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:31:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:31:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2852: Waiting for Server - FAILED kill -0 8607 >/dev/null 2>/dev/null selfserv_9159 with PID 8607 found at Fri Jan 8 12:31:40 EST 2016 selfserv_9159 with PID 8607 started at Fri Jan 8 12:31:40 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:31:40 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:31:41 EST 2016 ssl.sh: #2853: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 8607 at Fri Jan 8 12:31:41 EST 2016 kill -USR1 8607 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8607 killed at Fri Jan 8 12:31:41 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:31:41 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:31:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:31:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2854: Waiting for Server - FAILED kill -0 8686 >/dev/null 2>/dev/null selfserv_9159 with PID 8686 found at Fri Jan 8 12:31:47 EST 2016 selfserv_9159 with PID 8686 started at Fri Jan 8 12:31:47 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:31:47 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:31:48 EST 2016 ssl.sh: #2855: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 8686 at Fri Jan 8 12:31:48 EST 2016 kill -USR1 8686 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8686 killed at Fri Jan 8 12:31:48 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:31:48 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:31:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:31:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2856: Waiting for Server - FAILED kill -0 8765 >/dev/null 2>/dev/null selfserv_9159 with PID 8765 found at Fri Jan 8 12:31:54 EST 2016 selfserv_9159 with PID 8765 started at Fri Jan 8 12:31:54 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:31:54 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:31:55 EST 2016 ssl.sh: #2857: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 8765 at Fri Jan 8 12:31:55 EST 2016 kill -USR1 8765 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8765 killed at Fri Jan 8 12:31:55 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:31:55 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:31:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:32:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2858: Waiting for Server - FAILED kill -0 8866 >/dev/null 2>/dev/null selfserv_9159 with PID 8866 found at Fri Jan 8 12:32:01 EST 2016 selfserv_9159 with PID 8866 started at Fri Jan 8 12:32:01 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0032 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 12:32:01 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:32:02 EST 2016 ssl.sh: #2859: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 8866 at Fri Jan 8 12:32:02 EST 2016 kill -USR1 8866 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8866 killed at Fri Jan 8 12:32:02 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:32:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:32:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:32:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2860: Waiting for Server - FAILED kill -0 8945 >/dev/null 2>/dev/null selfserv_9159 with PID 8945 found at Fri Jan 8 12:32:08 EST 2016 selfserv_9159 with PID 8945 started at Fri Jan 8 12:32:08 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0067 -n TestUser-dsamixed \ localhost.localdomain strsclnt started at Fri Jan 8 12:32:08 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:32:09 EST 2016 ssl.sh: #2861: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 8945 at Fri Jan 8 12:32:09 EST 2016 kill -USR1 8945 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8945 killed at Fri Jan 8 12:32:09 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:32:09 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:32:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:32:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2862: Waiting for Server - FAILED kill -0 9038 >/dev/null 2>/dev/null selfserv_9159 with PID 9038 found at Fri Jan 8 12:32:15 EST 2016 selfserv_9159 with PID 9038 started at Fri Jan 8 12:32:15 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :00A2 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 12:32:15 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:32:16 EST 2016 ssl.sh: #2863: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 9038 at Fri Jan 8 12:32:16 EST 2016 kill -USR1 9038 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9038 killed at Fri Jan 8 12:32:16 EST 2016 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client bypass - with ECC =============================== selfserv_9159 starting at Fri Jan 8 12:32:16 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:32:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:32:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2864: Waiting for Server - FAILED kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:22 EST 2016 selfserv_9159 with PID 9105 started at Fri Jan 8 12:32:22 EST 2016 ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping A SSL2_RC4_128_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping B SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping C SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping D SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping E SSL2_DES_64_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping F SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping B SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping C SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping E SSL2_DES_64_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2865: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2866: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2867: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2868: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2869: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2870: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2871: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2872: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2873: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2874: SSL3_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2875: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2876: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2877: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2878: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2879: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2880: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2881: TLS_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2882: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2883: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2884: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2885: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2886: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2887: TLS_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2888: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2889: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2890: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2891: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2892: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2893: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2894: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2895: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2896: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2897: TLS11_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2898: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2899: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2900: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2901: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2902: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2903: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2904: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2905: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2906: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2907: TLS12_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2908: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2909: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2910: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2911: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2912: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2913: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2914: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2915: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2916: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2917: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2918: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2919: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2920: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2921: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2922: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2923: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2924: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2925: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2926: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2927: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2928: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2929: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2930: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2931: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 9105 >/dev/null 2>/dev/null selfserv_9159 with PID 9105 found at Fri Jan 8 12:32:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2932: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 9105 at Fri Jan 8 12:32:59 EST 2016 kill -USR1 9105 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9105 killed at Fri Jan 8 12:33:00 EST 2016 ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 12:33:00 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:33:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:33:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2933: Waiting for Server - FAILED kill -0 11181 >/dev/null 2>/dev/null selfserv_9159 with PID 11181 found at Fri Jan 8 12:33:06 EST 2016 selfserv_9159 with PID 11181 started at Fri Jan 8 12:33:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2934: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 11181 >/dev/null 2>/dev/null selfserv_9159 with PID 11181 found at Fri Jan 8 12:33:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2935: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11181 >/dev/null 2>/dev/null selfserv_9159 with PID 11181 found at Fri Jan 8 12:33:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2936: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 11181 >/dev/null 2>/dev/null selfserv_9159 with PID 11181 found at Fri Jan 8 12:33:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2937: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 11181 >/dev/null 2>/dev/null selfserv_9159 with PID 11181 found at Fri Jan 8 12:33:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2938: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 11181 at Fri Jan 8 12:33:08 EST 2016 kill -USR1 11181 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11181 killed at Fri Jan 8 12:33:09 EST 2016 ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 12:33:09 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:33:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:33:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2939: Waiting for Server - FAILED kill -0 11346 >/dev/null 2>/dev/null selfserv_9159 with PID 11346 found at Fri Jan 8 12:33:15 EST 2016 selfserv_9159 with PID 11346 started at Fri Jan 8 12:33:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2940: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 11346 >/dev/null 2>/dev/null selfserv_9159 with PID 11346 found at Fri Jan 8 12:33:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2941: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11346 >/dev/null 2>/dev/null selfserv_9159 with PID 11346 found at Fri Jan 8 12:33:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2942: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 11346 >/dev/null 2>/dev/null selfserv_9159 with PID 11346 found at Fri Jan 8 12:33:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2943: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 11346 >/dev/null 2>/dev/null selfserv_9159 with PID 11346 found at Fri Jan 8 12:33:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2944: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 11346 >/dev/null 2>/dev/null selfserv_9159 with PID 11346 found at Fri Jan 8 12:33:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2945: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 11346 >/dev/null 2>/dev/null selfserv_9159 with PID 11346 found at Fri Jan 8 12:33:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2946: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11346 >/dev/null 2>/dev/null selfserv_9159 with PID 11346 found at Fri Jan 8 12:33:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2947: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 11346 >/dev/null 2>/dev/null selfserv_9159 with PID 11346 found at Fri Jan 8 12:33:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2948: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 11346 >/dev/null 2>/dev/null selfserv_9159 with PID 11346 found at Fri Jan 8 12:33:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2949: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 11346 >/dev/null 2>/dev/null selfserv_9159 with PID 11346 found at Fri Jan 8 12:33:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2950: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 11346 >/dev/null 2>/dev/null selfserv_9159 with PID 11346 found at Fri Jan 8 12:33:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2951: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11346 >/dev/null 2>/dev/null selfserv_9159 with PID 11346 found at Fri Jan 8 12:33:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2952: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 11346 >/dev/null 2>/dev/null selfserv_9159 with PID 11346 found at Fri Jan 8 12:33:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2953: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 11346 >/dev/null 2>/dev/null selfserv_9159 with PID 11346 found at Fri Jan 8 12:33:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2954: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 11346 at Fri Jan 8 12:33:22 EST 2016 kill -USR1 11346 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11346 killed at Fri Jan 8 12:33:23 EST 2016 ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 12:33:23 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:33:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:33:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2955: Waiting for Server - FAILED kill -0 11760 >/dev/null 2>/dev/null selfserv_9159 with PID 11760 found at Fri Jan 8 12:33:29 EST 2016 selfserv_9159 with PID 11760 started at Fri Jan 8 12:33:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2956: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 11760 >/dev/null 2>/dev/null selfserv_9159 with PID 11760 found at Fri Jan 8 12:33:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2957: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11760 >/dev/null 2>/dev/null selfserv_9159 with PID 11760 found at Fri Jan 8 12:33:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2958: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 11760 >/dev/null 2>/dev/null selfserv_9159 with PID 11760 found at Fri Jan 8 12:33:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2959: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 11760 >/dev/null 2>/dev/null selfserv_9159 with PID 11760 found at Fri Jan 8 12:33:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2960: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 11760 at Fri Jan 8 12:33:31 EST 2016 kill -USR1 11760 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11760 killed at Fri Jan 8 12:33:32 EST 2016 ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 12:33:32 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:33:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:33:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2961: Waiting for Server - FAILED kill -0 11926 >/dev/null 2>/dev/null selfserv_9159 with PID 11926 found at Fri Jan 8 12:33:38 EST 2016 selfserv_9159 with PID 11926 started at Fri Jan 8 12:33:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2962: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 11926 >/dev/null 2>/dev/null selfserv_9159 with PID 11926 found at Fri Jan 8 12:33:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2963: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11926 >/dev/null 2>/dev/null selfserv_9159 with PID 11926 found at Fri Jan 8 12:33:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2964: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 11926 >/dev/null 2>/dev/null selfserv_9159 with PID 11926 found at Fri Jan 8 12:33:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2965: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 11926 >/dev/null 2>/dev/null selfserv_9159 with PID 11926 found at Fri Jan 8 12:33:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2966: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 11926 >/dev/null 2>/dev/null selfserv_9159 with PID 11926 found at Fri Jan 8 12:33:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2967: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 11926 >/dev/null 2>/dev/null selfserv_9159 with PID 11926 found at Fri Jan 8 12:33:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2968: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11926 >/dev/null 2>/dev/null selfserv_9159 with PID 11926 found at Fri Jan 8 12:33:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2969: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 11926 >/dev/null 2>/dev/null selfserv_9159 with PID 11926 found at Fri Jan 8 12:33:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2970: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 11926 >/dev/null 2>/dev/null selfserv_9159 with PID 11926 found at Fri Jan 8 12:33:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2971: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 11926 >/dev/null 2>/dev/null selfserv_9159 with PID 11926 found at Fri Jan 8 12:33:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2972: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 11926 >/dev/null 2>/dev/null selfserv_9159 with PID 11926 found at Fri Jan 8 12:33:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2973: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11926 >/dev/null 2>/dev/null selfserv_9159 with PID 11926 found at Fri Jan 8 12:33:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2974: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 11926 >/dev/null 2>/dev/null selfserv_9159 with PID 11926 found at Fri Jan 8 12:33:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2975: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 11926 >/dev/null 2>/dev/null selfserv_9159 with PID 11926 found at Fri Jan 8 12:33:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2976: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 11926 at Fri Jan 8 12:33:46 EST 2016 kill -USR1 11926 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11926 killed at Fri Jan 8 12:33:46 EST 2016 ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 12:33:46 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:33:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:33:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2977: Waiting for Server - FAILED kill -0 12340 >/dev/null 2>/dev/null selfserv_9159 with PID 12340 found at Fri Jan 8 12:33:52 EST 2016 selfserv_9159 with PID 12340 started at Fri Jan 8 12:33:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2978: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 12340 >/dev/null 2>/dev/null selfserv_9159 with PID 12340 found at Fri Jan 8 12:33:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2979: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 12340 >/dev/null 2>/dev/null selfserv_9159 with PID 12340 found at Fri Jan 8 12:33:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2980: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 12340 >/dev/null 2>/dev/null selfserv_9159 with PID 12340 found at Fri Jan 8 12:33:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2981: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 12340 >/dev/null 2>/dev/null selfserv_9159 with PID 12340 found at Fri Jan 8 12:33:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2982: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 12340 at Fri Jan 8 12:33:55 EST 2016 kill -USR1 12340 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12340 killed at Fri Jan 8 12:33:55 EST 2016 ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 12:33:55 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:33:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:34:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2983: Waiting for Server - FAILED kill -0 12505 >/dev/null 2>/dev/null selfserv_9159 with PID 12505 found at Fri Jan 8 12:34:01 EST 2016 selfserv_9159 with PID 12505 started at Fri Jan 8 12:34:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2984: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 12505 >/dev/null 2>/dev/null selfserv_9159 with PID 12505 found at Fri Jan 8 12:34:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2985: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 12505 >/dev/null 2>/dev/null selfserv_9159 with PID 12505 found at Fri Jan 8 12:34:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2986: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 12505 >/dev/null 2>/dev/null selfserv_9159 with PID 12505 found at Fri Jan 8 12:34:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2987: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 12505 >/dev/null 2>/dev/null selfserv_9159 with PID 12505 found at Fri Jan 8 12:34:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2988: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 12505 >/dev/null 2>/dev/null selfserv_9159 with PID 12505 found at Fri Jan 8 12:34:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2989: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 12505 >/dev/null 2>/dev/null selfserv_9159 with PID 12505 found at Fri Jan 8 12:34:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2990: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 12505 >/dev/null 2>/dev/null selfserv_9159 with PID 12505 found at Fri Jan 8 12:34:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2991: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 12505 >/dev/null 2>/dev/null selfserv_9159 with PID 12505 found at Fri Jan 8 12:34:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2992: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 12505 >/dev/null 2>/dev/null selfserv_9159 with PID 12505 found at Fri Jan 8 12:34:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2993: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 12505 >/dev/null 2>/dev/null selfserv_9159 with PID 12505 found at Fri Jan 8 12:34:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2994: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 12505 >/dev/null 2>/dev/null selfserv_9159 with PID 12505 found at Fri Jan 8 12:34:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2995: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 12505 >/dev/null 2>/dev/null selfserv_9159 with PID 12505 found at Fri Jan 8 12:34:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2996: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 12505 at Fri Jan 8 12:34:08 EST 2016 kill -USR1 12505 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12505 killed at Fri Jan 8 12:34:08 EST 2016 ssl.sh: SSL Client Authentication Extended Test - server normal/client bypass - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:34:08 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:34:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:34:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2997: Waiting for Server - FAILED kill -0 12913 >/dev/null 2>/dev/null selfserv_9159 with PID 12913 found at Fri Jan 8 12:34:14 EST 2016 selfserv_9159 with PID 12913 started at Fri Jan 8 12:34:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2998: TLS Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 12913 at Fri Jan 8 12:34:15 EST 2016 kill -USR1 12913 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12913 killed at Fri Jan 8 12:34:15 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:34:15 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:34:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:34:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2999: Waiting for Server - FAILED kill -0 12982 >/dev/null 2>/dev/null selfserv_9159 with PID 12982 found at Fri Jan 8 12:34:21 EST 2016 selfserv_9159 with PID 12982 started at Fri Jan 8 12:34:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3000: TLS Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 12982 at Fri Jan 8 12:34:22 EST 2016 kill -USR1 12982 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12982 killed at Fri Jan 8 12:34:22 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:34:22 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:34:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:34:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3001: Waiting for Server - FAILED kill -0 13052 >/dev/null 2>/dev/null selfserv_9159 with PID 13052 found at Fri Jan 8 12:34:28 EST 2016 selfserv_9159 with PID 13052 started at Fri Jan 8 12:34:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3002: TLS Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 13052 at Fri Jan 8 12:34:29 EST 2016 kill -USR1 13052 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13052 killed at Fri Jan 8 12:34:29 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:34:29 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:34:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:34:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3003: Waiting for Server - FAILED kill -0 13121 >/dev/null 2>/dev/null selfserv_9159 with PID 13121 found at Fri Jan 8 12:34:35 EST 2016 selfserv_9159 with PID 13121 started at Fri Jan 8 12:34:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3004: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 13121 at Fri Jan 8 12:34:36 EST 2016 kill -USR1 13121 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13121 killed at Fri Jan 8 12:34:36 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:34:36 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:34:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:34:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3005: Waiting for Server - FAILED kill -0 13190 >/dev/null 2>/dev/null selfserv_9159 with PID 13190 found at Fri Jan 8 12:34:42 EST 2016 selfserv_9159 with PID 13190 started at Fri Jan 8 12:34:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3006: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 13190 at Fri Jan 8 12:34:43 EST 2016 kill -USR1 13190 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13190 killed at Fri Jan 8 12:34:43 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:34:43 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:34:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:34:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3007: Waiting for Server - FAILED kill -0 13260 >/dev/null 2>/dev/null selfserv_9159 with PID 13260 found at Fri Jan 8 12:34:49 EST 2016 selfserv_9159 with PID 13260 started at Fri Jan 8 12:34:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3008: TLS Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 13260 at Fri Jan 8 12:34:49 EST 2016 kill -USR1 13260 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13260 killed at Fri Jan 8 12:34:50 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:34:50 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:34:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:34:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3009: Waiting for Server - FAILED kill -0 13329 >/dev/null 2>/dev/null selfserv_9159 with PID 13329 found at Fri Jan 8 12:34:56 EST 2016 selfserv_9159 with PID 13329 started at Fri Jan 8 12:34:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3010: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 13329 at Fri Jan 8 12:34:56 EST 2016 kill -USR1 13329 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13329 killed at Fri Jan 8 12:34:57 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:34:57 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:34:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:35:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3011: Waiting for Server - FAILED kill -0 13398 >/dev/null 2>/dev/null selfserv_9159 with PID 13398 found at Fri Jan 8 12:35:03 EST 2016 selfserv_9159 with PID 13398 started at Fri Jan 8 12:35:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3012: SSL3 Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 13398 at Fri Jan 8 12:35:03 EST 2016 kill -USR1 13398 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13398 killed at Fri Jan 8 12:35:04 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:35:04 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:35:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:35:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3013: Waiting for Server - FAILED kill -0 13468 >/dev/null 2>/dev/null selfserv_9159 with PID 13468 found at Fri Jan 8 12:35:10 EST 2016 selfserv_9159 with PID 13468 started at Fri Jan 8 12:35:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3014: SSL3 Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 13468 at Fri Jan 8 12:35:10 EST 2016 kill -USR1 13468 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13468 killed at Fri Jan 8 12:35:11 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:35:11 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:35:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:35:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3015: Waiting for Server - FAILED kill -0 13537 >/dev/null 2>/dev/null selfserv_9159 with PID 13537 found at Fri Jan 8 12:35:17 EST 2016 selfserv_9159 with PID 13537 started at Fri Jan 8 12:35:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3016: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 13537 at Fri Jan 8 12:35:17 EST 2016 kill -USR1 13537 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13537 killed at Fri Jan 8 12:35:18 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:35:18 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:35:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:35:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3017: Waiting for Server - FAILED kill -0 13606 >/dev/null 2>/dev/null selfserv_9159 with PID 13606 found at Fri Jan 8 12:35:24 EST 2016 selfserv_9159 with PID 13606 started at Fri Jan 8 12:35:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3018: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 13606 at Fri Jan 8 12:35:24 EST 2016 kill -USR1 13606 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13606 killed at Fri Jan 8 12:35:24 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:35:25 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:35:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:35:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3019: Waiting for Server - FAILED kill -0 13676 >/dev/null 2>/dev/null selfserv_9159 with PID 13676 found at Fri Jan 8 12:35:30 EST 2016 selfserv_9159 with PID 13676 started at Fri Jan 8 12:35:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3020: SSL3 Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 13676 at Fri Jan 8 12:35:31 EST 2016 kill -USR1 13676 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13676 killed at Fri Jan 8 12:35:31 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:35:31 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:35:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:35:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3021: Waiting for Server - FAILED kill -0 13745 >/dev/null 2>/dev/null selfserv_9159 with PID 13745 found at Fri Jan 8 12:35:37 EST 2016 selfserv_9159 with PID 13745 started at Fri Jan 8 12:35:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3022: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 13745 at Fri Jan 8 12:35:38 EST 2016 kill -USR1 13745 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13745 killed at Fri Jan 8 12:35:38 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:35:38 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:35:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:35:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3023: Waiting for Server - FAILED kill -0 13814 >/dev/null 2>/dev/null selfserv_9159 with PID 13814 found at Fri Jan 8 12:35:44 EST 2016 selfserv_9159 with PID 13814 started at Fri Jan 8 12:35:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3024: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 13814 at Fri Jan 8 12:35:45 EST 2016 kill -USR1 13814 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13814 killed at Fri Jan 8 12:35:45 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:35:45 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:35:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:35:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3025: Waiting for Server - FAILED kill -0 13884 >/dev/null 2>/dev/null selfserv_9159 with PID 13884 found at Fri Jan 8 12:35:51 EST 2016 selfserv_9159 with PID 13884 started at Fri Jan 8 12:35:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3026: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 13884 at Fri Jan 8 12:35:52 EST 2016 kill -USR1 13884 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13884 killed at Fri Jan 8 12:35:52 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:35:52 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:35:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:35:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3027: Waiting for Server - FAILED kill -0 13953 >/dev/null 2>/dev/null selfserv_9159 with PID 13953 found at Fri Jan 8 12:35:58 EST 2016 selfserv_9159 with PID 13953 started at Fri Jan 8 12:35:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3028: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 13953 at Fri Jan 8 12:35:59 EST 2016 kill -USR1 13953 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13953 killed at Fri Jan 8 12:35:59 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:35:59 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:35:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:36:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3029: Waiting for Server - FAILED kill -0 14022 >/dev/null 2>/dev/null selfserv_9159 with PID 14022 found at Fri Jan 8 12:36:05 EST 2016 selfserv_9159 with PID 14022 started at Fri Jan 8 12:36:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3030: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 14022 at Fri Jan 8 12:36:06 EST 2016 kill -USR1 14022 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14022 killed at Fri Jan 8 12:36:06 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:36:06 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:36:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:36:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3031: Waiting for Server - FAILED kill -0 14092 >/dev/null 2>/dev/null selfserv_9159 with PID 14092 found at Fri Jan 8 12:36:12 EST 2016 selfserv_9159 with PID 14092 started at Fri Jan 8 12:36:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3032: TLS Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 14092 at Fri Jan 8 12:36:12 EST 2016 kill -USR1 14092 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14092 killed at Fri Jan 8 12:36:13 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:36:13 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:36:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:36:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3033: Waiting for Server - FAILED kill -0 14161 >/dev/null 2>/dev/null selfserv_9159 with PID 14161 found at Fri Jan 8 12:36:19 EST 2016 selfserv_9159 with PID 14161 started at Fri Jan 8 12:36:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3034: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 14161 at Fri Jan 8 12:36:19 EST 2016 kill -USR1 14161 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14161 killed at Fri Jan 8 12:36:20 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:36:20 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:36:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:36:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3035: Waiting for Server - FAILED kill -0 14230 >/dev/null 2>/dev/null selfserv_9159 with PID 14230 found at Fri Jan 8 12:36:26 EST 2016 selfserv_9159 with PID 14230 started at Fri Jan 8 12:36:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3036: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 14230 at Fri Jan 8 12:36:26 EST 2016 kill -USR1 14230 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14230 killed at Fri Jan 8 12:36:27 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:36:27 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:36:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:36:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3037: Waiting for Server - FAILED kill -0 14300 >/dev/null 2>/dev/null selfserv_9159 with PID 14300 found at Fri Jan 8 12:36:33 EST 2016 selfserv_9159 with PID 14300 started at Fri Jan 8 12:36:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3038: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 14300 at Fri Jan 8 12:36:33 EST 2016 kill -USR1 14300 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14300 killed at Fri Jan 8 12:36:34 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:36:34 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:36:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:36:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3039: Waiting for Server - FAILED kill -0 14369 >/dev/null 2>/dev/null selfserv_9159 with PID 14369 found at Fri Jan 8 12:36:40 EST 2016 selfserv_9159 with PID 14369 started at Fri Jan 8 12:36:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3040: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 14369 at Fri Jan 8 12:36:40 EST 2016 kill -USR1 14369 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14369 killed at Fri Jan 8 12:36:41 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:36:41 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:36:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:36:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3041: Waiting for Server - FAILED kill -0 14438 >/dev/null 2>/dev/null selfserv_9159 with PID 14438 found at Fri Jan 8 12:36:46 EST 2016 selfserv_9159 with PID 14438 started at Fri Jan 8 12:36:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3042: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 14438 at Fri Jan 8 12:36:47 EST 2016 kill -USR1 14438 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14438 killed at Fri Jan 8 12:36:47 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:36:48 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:36:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:36:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3043: Waiting for Server - FAILED kill -0 14508 >/dev/null 2>/dev/null selfserv_9159 with PID 14508 found at Fri Jan 8 12:36:53 EST 2016 selfserv_9159 with PID 14508 started at Fri Jan 8 12:36:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3044: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 14508 at Fri Jan 8 12:36:54 EST 2016 kill -USR1 14508 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14508 killed at Fri Jan 8 12:36:54 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:36:54 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:36:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:37:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3045: Waiting for Server - FAILED kill -0 14577 >/dev/null 2>/dev/null selfserv_9159 with PID 14577 found at Fri Jan 8 12:37:00 EST 2016 selfserv_9159 with PID 14577 started at Fri Jan 8 12:37:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3046: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 14577 at Fri Jan 8 12:37:01 EST 2016 kill -USR1 14577 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14577 killed at Fri Jan 8 12:37:01 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:37:01 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:37:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:37:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3047: Waiting for Server - FAILED kill -0 14646 >/dev/null 2>/dev/null selfserv_9159 with PID 14646 found at Fri Jan 8 12:37:07 EST 2016 selfserv_9159 with PID 14646 started at Fri Jan 8 12:37:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3048: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 14646 at Fri Jan 8 12:37:08 EST 2016 kill -USR1 14646 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14646 killed at Fri Jan 8 12:37:08 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:37:08 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:37:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:37:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3049: Waiting for Server - FAILED kill -0 14716 >/dev/null 2>/dev/null selfserv_9159 with PID 14716 found at Fri Jan 8 12:37:14 EST 2016 selfserv_9159 with PID 14716 started at Fri Jan 8 12:37:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3050: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 14716 at Fri Jan 8 12:37:15 EST 2016 kill -USR1 14716 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14716 killed at Fri Jan 8 12:37:15 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:37:15 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:37:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:37:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3051: Waiting for Server - FAILED kill -0 14785 >/dev/null 2>/dev/null selfserv_9159 with PID 14785 found at Fri Jan 8 12:37:21 EST 2016 selfserv_9159 with PID 14785 started at Fri Jan 8 12:37:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3052: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 14785 at Fri Jan 8 12:37:22 EST 2016 kill -USR1 14785 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14785 killed at Fri Jan 8 12:37:22 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:37:22 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:37:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:37:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3053: Waiting for Server - FAILED kill -0 14854 >/dev/null 2>/dev/null selfserv_9159 with PID 14854 found at Fri Jan 8 12:37:28 EST 2016 selfserv_9159 with PID 14854 started at Fri Jan 8 12:37:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3054: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 14854 at Fri Jan 8 12:37:28 EST 2016 kill -USR1 14854 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14854 killed at Fri Jan 8 12:37:29 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:37:29 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:37:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:37:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3055: Waiting for Server - FAILED kill -0 14924 >/dev/null 2>/dev/null selfserv_9159 with PID 14924 found at Fri Jan 8 12:37:35 EST 2016 selfserv_9159 with PID 14924 started at Fri Jan 8 12:37:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3056: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 14924 at Fri Jan 8 12:37:35 EST 2016 kill -USR1 14924 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14924 killed at Fri Jan 8 12:37:36 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:37:36 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:37:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:37:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3057: Waiting for Server - FAILED kill -0 15008 >/dev/null 2>/dev/null selfserv_9159 with PID 15008 found at Fri Jan 8 12:37:42 EST 2016 selfserv_9159 with PID 15008 started at Fri Jan 8 12:37:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3058: TLS Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 15008 at Fri Jan 8 12:37:42 EST 2016 kill -USR1 15008 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15008 killed at Fri Jan 8 12:37:43 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:37:43 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:37:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:37:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3059: Waiting for Server - FAILED kill -0 15077 >/dev/null 2>/dev/null selfserv_9159 with PID 15077 found at Fri Jan 8 12:37:49 EST 2016 selfserv_9159 with PID 15077 started at Fri Jan 8 12:37:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3060: TLS Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 15077 at Fri Jan 8 12:37:49 EST 2016 kill -USR1 15077 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15077 killed at Fri Jan 8 12:37:50 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:37:50 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:37:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:37:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3061: Waiting for Server - FAILED kill -0 15147 >/dev/null 2>/dev/null selfserv_9159 with PID 15147 found at Fri Jan 8 12:37:56 EST 2016 selfserv_9159 with PID 15147 started at Fri Jan 8 12:37:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3062: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 15147 at Fri Jan 8 12:37:56 EST 2016 kill -USR1 15147 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15147 killed at Fri Jan 8 12:37:57 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:37:57 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:37:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:38:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3063: Waiting for Server - FAILED kill -0 15216 >/dev/null 2>/dev/null selfserv_9159 with PID 15216 found at Fri Jan 8 12:38:03 EST 2016 selfserv_9159 with PID 15216 started at Fri Jan 8 12:38:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3064: TLS Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 15216 at Fri Jan 8 12:38:03 EST 2016 kill -USR1 15216 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15216 killed at Fri Jan 8 12:38:04 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:38:04 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:38:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:38:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3065: Waiting for Server - FAILED kill -0 15285 >/dev/null 2>/dev/null selfserv_9159 with PID 15285 found at Fri Jan 8 12:38:10 EST 2016 selfserv_9159 with PID 15285 started at Fri Jan 8 12:38:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3066: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 15285 at Fri Jan 8 12:38:10 EST 2016 kill -USR1 15285 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15285 killed at Fri Jan 8 12:38:10 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:38:11 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:38:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:38:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3067: Waiting for Server - FAILED kill -0 15355 >/dev/null 2>/dev/null selfserv_9159 with PID 15355 found at Fri Jan 8 12:38:16 EST 2016 selfserv_9159 with PID 15355 started at Fri Jan 8 12:38:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3068: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 15355 at Fri Jan 8 12:38:17 EST 2016 kill -USR1 15355 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15355 killed at Fri Jan 8 12:38:17 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:38:17 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:38:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:38:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3069: Waiting for Server - FAILED kill -0 15424 >/dev/null 2>/dev/null selfserv_9159 with PID 15424 found at Fri Jan 8 12:38:23 EST 2016 selfserv_9159 with PID 15424 started at Fri Jan 8 12:38:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3070: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 15424 at Fri Jan 8 12:38:24 EST 2016 kill -USR1 15424 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15424 killed at Fri Jan 8 12:38:24 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:38:24 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:38:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:38:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3071: Waiting for Server - FAILED kill -0 15493 >/dev/null 2>/dev/null selfserv_9159 with PID 15493 found at Fri Jan 8 12:38:30 EST 2016 selfserv_9159 with PID 15493 started at Fri Jan 8 12:38:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3072: SSL3 Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 15493 at Fri Jan 8 12:38:31 EST 2016 kill -USR1 15493 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15493 killed at Fri Jan 8 12:38:31 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:38:31 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:38:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:38:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3073: Waiting for Server - FAILED kill -0 15564 >/dev/null 2>/dev/null selfserv_9159 with PID 15564 found at Fri Jan 8 12:38:37 EST 2016 selfserv_9159 with PID 15564 started at Fri Jan 8 12:38:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3074: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 15564 at Fri Jan 8 12:38:38 EST 2016 kill -USR1 15564 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15564 killed at Fri Jan 8 12:38:38 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:38:38 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:38:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:38:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3075: Waiting for Server - FAILED kill -0 15633 >/dev/null 2>/dev/null selfserv_9159 with PID 15633 found at Fri Jan 8 12:38:44 EST 2016 selfserv_9159 with PID 15633 started at Fri Jan 8 12:38:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3076: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 15633 at Fri Jan 8 12:38:45 EST 2016 kill -USR1 15633 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15633 killed at Fri Jan 8 12:38:45 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:38:45 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:38:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:38:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3077: Waiting for Server - FAILED kill -0 15702 >/dev/null 2>/dev/null selfserv_9159 with PID 15702 found at Fri Jan 8 12:38:51 EST 2016 selfserv_9159 with PID 15702 started at Fri Jan 8 12:38:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3078: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 15702 at Fri Jan 8 12:38:52 EST 2016 kill -USR1 15702 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15702 killed at Fri Jan 8 12:38:52 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:38:52 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:38:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:38:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3079: Waiting for Server - FAILED kill -0 15772 >/dev/null 2>/dev/null selfserv_9159 with PID 15772 found at Fri Jan 8 12:38:58 EST 2016 selfserv_9159 with PID 15772 started at Fri Jan 8 12:38:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3080: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 15772 at Fri Jan 8 12:38:58 EST 2016 kill -USR1 15772 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15772 killed at Fri Jan 8 12:38:59 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:38:59 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:38:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:39:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3081: Waiting for Server - FAILED kill -0 15841 >/dev/null 2>/dev/null selfserv_9159 with PID 15841 found at Fri Jan 8 12:39:05 EST 2016 selfserv_9159 with PID 15841 started at Fri Jan 8 12:39:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3082: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 15841 at Fri Jan 8 12:39:05 EST 2016 kill -USR1 15841 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15841 killed at Fri Jan 8 12:39:06 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:39:06 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:39:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:39:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3083: Waiting for Server - FAILED kill -0 15910 >/dev/null 2>/dev/null selfserv_9159 with PID 15910 found at Fri Jan 8 12:39:12 EST 2016 selfserv_9159 with PID 15910 started at Fri Jan 8 12:39:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3084: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 15910 at Fri Jan 8 12:39:12 EST 2016 kill -USR1 15910 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15910 killed at Fri Jan 8 12:39:13 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:39:13 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:39:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:39:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3085: Waiting for Server - FAILED kill -0 15980 >/dev/null 2>/dev/null selfserv_9159 with PID 15980 found at Fri Jan 8 12:39:19 EST 2016 selfserv_9159 with PID 15980 started at Fri Jan 8 12:39:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3086: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 15980 at Fri Jan 8 12:39:19 EST 2016 kill -USR1 15980 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15980 killed at Fri Jan 8 12:39:20 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:39:20 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:39:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:39:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3087: Waiting for Server - FAILED kill -0 16049 >/dev/null 2>/dev/null selfserv_9159 with PID 16049 found at Fri Jan 8 12:39:26 EST 2016 selfserv_9159 with PID 16049 started at Fri Jan 8 12:39:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3088: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 16049 at Fri Jan 8 12:39:26 EST 2016 kill -USR1 16049 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16049 killed at Fri Jan 8 12:39:27 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:39:27 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:39:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:39:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3089: Waiting for Server - FAILED kill -0 16118 >/dev/null 2>/dev/null selfserv_9159 with PID 16118 found at Fri Jan 8 12:39:33 EST 2016 selfserv_9159 with PID 16118 started at Fri Jan 8 12:39:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3090: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 16118 at Fri Jan 8 12:39:33 EST 2016 kill -USR1 16118 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16118 killed at Fri Jan 8 12:39:33 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:39:34 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:39:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:39:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3091: Waiting for Server - FAILED kill -0 16188 >/dev/null 2>/dev/null selfserv_9159 with PID 16188 found at Fri Jan 8 12:39:39 EST 2016 selfserv_9159 with PID 16188 started at Fri Jan 8 12:39:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3092: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 16188 at Fri Jan 8 12:39:40 EST 2016 kill -USR1 16188 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16188 killed at Fri Jan 8 12:39:40 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:39:40 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:39:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:39:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3093: Waiting for Server - FAILED kill -0 16257 >/dev/null 2>/dev/null selfserv_9159 with PID 16257 found at Fri Jan 8 12:39:46 EST 2016 selfserv_9159 with PID 16257 started at Fri Jan 8 12:39:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3094: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 16257 at Fri Jan 8 12:39:47 EST 2016 kill -USR1 16257 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16257 killed at Fri Jan 8 12:39:47 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:39:47 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:39:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:39:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3095: Waiting for Server - FAILED kill -0 16326 >/dev/null 2>/dev/null selfserv_9159 with PID 16326 found at Fri Jan 8 12:39:53 EST 2016 selfserv_9159 with PID 16326 started at Fri Jan 8 12:39:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3096: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 16326 at Fri Jan 8 12:39:54 EST 2016 kill -USR1 16326 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16326 killed at Fri Jan 8 12:39:54 EST 2016 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client bypass - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Stress Test Extended Test - server normal/client bypass - with ECC =============================== ssl.sh: skipping -c_1000_-C_A Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9159 starting at Fri Jan 8 12:39:55 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:39:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:40:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3097: Waiting for Server - FAILED kill -0 16510 >/dev/null 2>/dev/null selfserv_9159 with PID 16510 found at Fri Jan 8 12:40:01 EST 2016 selfserv_9159 with PID 16510 started at Fri Jan 8 12:40:01 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -c 1000 -C c -V :ssl3 \ localhost.localdomain strsclnt started at Fri Jan 8 12:40:01 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:40:01 EST 2016 ssl.sh: #3098: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 16510 at Fri Jan 8 12:40:01 EST 2016 kill -USR1 16510 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16510 killed at Fri Jan 8 12:40:02 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9159 starting at Fri Jan 8 12:40:02 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:40:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:40:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3099: Waiting for Server - FAILED kill -0 16593 >/dev/null 2>/dev/null selfserv_9159 with PID 16593 found at Fri Jan 8 12:40:08 EST 2016 selfserv_9159 with PID 16593 started at Fri Jan 8 12:40:08 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Fri Jan 8 12:40:08 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:40:08 EST 2016 ssl.sh: #3100: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 16593 at Fri Jan 8 12:40:08 EST 2016 kill -USR1 16593 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16593 killed at Fri Jan 8 12:40:09 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9159 starting at Fri Jan 8 12:40:09 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:40:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:40:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3101: Waiting for Server - FAILED kill -0 16681 >/dev/null 2>/dev/null selfserv_9159 with PID 16681 found at Fri Jan 8 12:40:15 EST 2016 selfserv_9159 with PID 16681 started at Fri Jan 8 12:40:15 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Fri Jan 8 12:40:15 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:40:15 EST 2016 ssl.sh: #3102: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 16681 at Fri Jan 8 12:40:15 EST 2016 kill -USR1 16681 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16681 killed at Fri Jan 8 12:40:16 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9159 starting at Fri Jan 8 12:40:16 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:40:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:40:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3103: Waiting for Server - FAILED kill -0 16765 >/dev/null 2>/dev/null selfserv_9159 with PID 16765 found at Fri Jan 8 12:40:22 EST 2016 selfserv_9159 with PID 16765 started at Fri Jan 8 12:40:22 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 12:40:22 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:40:22 EST 2016 ssl.sh: #3104: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 16765 at Fri Jan 8 12:40:22 EST 2016 kill -USR1 16765 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16765 killed at Fri Jan 8 12:40:23 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9159 starting at Fri Jan 8 12:40:23 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:40:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:40:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3105: Waiting for Server - FAILED kill -0 16853 >/dev/null 2>/dev/null selfserv_9159 with PID 16853 found at Fri Jan 8 12:40:29 EST 2016 selfserv_9159 with PID 16853 started at Fri Jan 8 12:40:29 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Fri Jan 8 12:40:29 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:40:29 EST 2016 ssl.sh: #3106: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 16853 at Fri Jan 8 12:40:29 EST 2016 kill -USR1 16853 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16853 killed at Fri Jan 8 12:40:30 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9159 starting at Fri Jan 8 12:40:30 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:40:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:40:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3107: Waiting for Server - FAILED kill -0 16939 >/dev/null 2>/dev/null selfserv_9159 with PID 16939 found at Fri Jan 8 12:40:36 EST 2016 selfserv_9159 with PID 16939 started at Fri Jan 8 12:40:36 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 12:40:36 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:40:36 EST 2016 ssl.sh: #3108: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 16939 at Fri Jan 8 12:40:36 EST 2016 kill -USR1 16939 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16939 killed at Fri Jan 8 12:40:37 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9159 starting at Fri Jan 8 12:40:37 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:40:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:40:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3109: Waiting for Server - FAILED kill -0 17026 >/dev/null 2>/dev/null selfserv_9159 with PID 17026 found at Fri Jan 8 12:40:43 EST 2016 selfserv_9159 with PID 17026 started at Fri Jan 8 12:40:43 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 12:40:43 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:40:43 EST 2016 ssl.sh: #3110: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 17026 at Fri Jan 8 12:40:43 EST 2016 kill -USR1 17026 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17026 killed at Fri Jan 8 12:40:44 EST 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping -c_100_-C_A_-N_-n_TestUser Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:40:44 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:40:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:40:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3111: Waiting for Server - FAILED kill -0 17140 >/dev/null 2>/dev/null selfserv_9159 with PID 17140 found at Fri Jan 8 12:40:50 EST 2016 selfserv_9159 with PID 17140 started at Fri Jan 8 12:40:50 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Fri Jan 8 12:40:50 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:40:51 EST 2016 ssl.sh: #3112: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 17140 at Fri Jan 8 12:40:51 EST 2016 kill -USR1 17140 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17140 killed at Fri Jan 8 12:40:51 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:40:51 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:40:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:40:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3113: Waiting for Server - FAILED kill -0 17226 >/dev/null 2>/dev/null selfserv_9159 with PID 17226 found at Fri Jan 8 12:40:57 EST 2016 selfserv_9159 with PID 17226 started at Fri Jan 8 12:40:57 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Fri Jan 8 12:40:57 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:40:58 EST 2016 ssl.sh: #3114: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 17226 at Fri Jan 8 12:40:58 EST 2016 kill -USR1 17226 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17226 killed at Fri Jan 8 12:40:58 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:40:58 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:40:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:41:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3115: Waiting for Server - FAILED kill -0 17313 >/dev/null 2>/dev/null selfserv_9159 with PID 17313 found at Fri Jan 8 12:41:04 EST 2016 selfserv_9159 with PID 17313 started at Fri Jan 8 12:41:04 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Fri Jan 8 12:41:04 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:41:05 EST 2016 ssl.sh: #3116: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 17313 at Fri Jan 8 12:41:05 EST 2016 kill -USR1 17313 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17313 killed at Fri Jan 8 12:41:05 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:41:05 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:41:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:41:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3117: Waiting for Server - FAILED kill -0 17400 >/dev/null 2>/dev/null selfserv_9159 with PID 17400 found at Fri Jan 8 12:41:11 EST 2016 selfserv_9159 with PID 17400 started at Fri Jan 8 12:41:11 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Fri Jan 8 12:41:11 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:41:12 EST 2016 ssl.sh: #3118: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 17400 at Fri Jan 8 12:41:12 EST 2016 kill -USR1 17400 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17400 killed at Fri Jan 8 12:41:12 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9159 starting at Fri Jan 8 12:41:12 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:41:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:41:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3119: Waiting for Server - FAILED kill -0 17486 >/dev/null 2>/dev/null selfserv_9159 with PID 17486 found at Fri Jan 8 12:41:18 EST 2016 selfserv_9159 with PID 17486 started at Fri Jan 8 12:41:18 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 12:41:18 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:41:19 EST 2016 ssl.sh: #3120: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 17486 at Fri Jan 8 12:41:19 EST 2016 kill -USR1 17486 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17486 killed at Fri Jan 8 12:41:19 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:41:19 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:41:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:41:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3121: Waiting for Server - FAILED kill -0 17573 >/dev/null 2>/dev/null selfserv_9159 with PID 17573 found at Fri Jan 8 12:41:25 EST 2016 selfserv_9159 with PID 17573 started at Fri Jan 8 12:41:25 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 12:41:25 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:41:26 EST 2016 ssl.sh: #3122: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 17573 at Fri Jan 8 12:41:26 EST 2016 kill -USR1 17573 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17573 killed at Fri Jan 8 12:41:26 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9159 starting at Fri Jan 8 12:41:26 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:41:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:41:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3123: Waiting for Server - FAILED kill -0 17660 >/dev/null 2>/dev/null selfserv_9159 with PID 17660 found at Fri Jan 8 12:41:32 EST 2016 selfserv_9159 with PID 17660 started at Fri Jan 8 12:41:32 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 12:41:32 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:41:33 EST 2016 ssl.sh: #3124: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 17660 at Fri Jan 8 12:41:33 EST 2016 kill -USR1 17660 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17660 killed at Fri Jan 8 12:41:33 EST 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:41:33 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:41:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:41:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3125: Waiting for Server - FAILED kill -0 17778 >/dev/null 2>/dev/null selfserv_9159 with PID 17778 found at Fri Jan 8 12:41:39 EST 2016 selfserv_9159 with PID 17778 started at Fri Jan 8 12:41:39 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:41:39 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:41:40 EST 2016 ssl.sh: #3126: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 17778 at Fri Jan 8 12:41:40 EST 2016 kill -USR1 17778 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17778 killed at Fri Jan 8 12:41:40 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:41:41 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:41:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:41:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3127: Waiting for Server - FAILED kill -0 17863 >/dev/null 2>/dev/null selfserv_9159 with PID 17863 found at Fri Jan 8 12:41:46 EST 2016 selfserv_9159 with PID 17863 started at Fri Jan 8 12:41:46 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:41:46 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:41:47 EST 2016 ssl.sh: #3128: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 17863 at Fri Jan 8 12:41:47 EST 2016 kill -USR1 17863 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17863 killed at Fri Jan 8 12:41:47 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:41:48 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:41:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:41:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3129: Waiting for Server - FAILED kill -0 17949 >/dev/null 2>/dev/null selfserv_9159 with PID 17949 found at Fri Jan 8 12:41:53 EST 2016 selfserv_9159 with PID 17949 started at Fri Jan 8 12:41:53 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:41:53 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:41:54 EST 2016 ssl.sh: #3130: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 17949 at Fri Jan 8 12:41:54 EST 2016 kill -USR1 17949 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17949 killed at Fri Jan 8 12:41:54 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:41:55 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:41:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:42:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3131: Waiting for Server - FAILED kill -0 18036 >/dev/null 2>/dev/null selfserv_9159 with PID 18036 found at Fri Jan 8 12:42:00 EST 2016 selfserv_9159 with PID 18036 started at Fri Jan 8 12:42:01 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:42:01 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:42:01 EST 2016 ssl.sh: #3132: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 18036 at Fri Jan 8 12:42:01 EST 2016 kill -USR1 18036 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18036 killed at Fri Jan 8 12:42:02 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:42:02 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:42:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:42:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3133: Waiting for Server - FAILED kill -0 18123 >/dev/null 2>/dev/null selfserv_9159 with PID 18123 found at Fri Jan 8 12:42:08 EST 2016 selfserv_9159 with PID 18123 started at Fri Jan 8 12:42:08 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:42:08 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:42:08 EST 2016 ssl.sh: #3134: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 18123 at Fri Jan 8 12:42:08 EST 2016 kill -USR1 18123 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18123 killed at Fri Jan 8 12:42:09 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9159 starting at Fri Jan 8 12:42:09 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:42:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:42:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3135: Waiting for Server - FAILED kill -0 18210 >/dev/null 2>/dev/null selfserv_9159 with PID 18210 found at Fri Jan 8 12:42:15 EST 2016 selfserv_9159 with PID 18210 started at Fri Jan 8 12:42:15 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Fri Jan 8 12:42:15 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:42:15 EST 2016 ssl.sh: #3136: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 18210 at Fri Jan 8 12:42:15 EST 2016 kill -USR1 18210 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18210 killed at Fri Jan 8 12:42:16 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9159 starting at Fri Jan 8 12:42:16 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:42:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:42:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3137: Waiting for Server - FAILED kill -0 18298 >/dev/null 2>/dev/null selfserv_9159 with PID 18298 found at Fri Jan 8 12:42:22 EST 2016 selfserv_9159 with PID 18298 started at Fri Jan 8 12:42:22 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Fri Jan 8 12:42:22 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:42:22 EST 2016 ssl.sh: #3138: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 18298 at Fri Jan 8 12:42:22 EST 2016 kill -USR1 18298 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18298 killed at Fri Jan 8 12:42:23 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9159 starting at Fri Jan 8 12:42:23 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:42:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:42:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3139: Waiting for Server - FAILED kill -0 18383 >/dev/null 2>/dev/null selfserv_9159 with PID 18383 found at Fri Jan 8 12:42:29 EST 2016 selfserv_9159 with PID 18383 started at Fri Jan 8 12:42:29 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Fri Jan 8 12:42:29 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:42:29 EST 2016 ssl.sh: #3140: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 18383 at Fri Jan 8 12:42:29 EST 2016 kill -USR1 18383 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18383 killed at Fri Jan 8 12:42:30 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9159 starting at Fri Jan 8 12:42:30 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:42:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:42:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3141: Waiting for Server - FAILED kill -0 18471 >/dev/null 2>/dev/null selfserv_9159 with PID 18471 found at Fri Jan 8 12:42:36 EST 2016 selfserv_9159 with PID 18471 started at Fri Jan 8 12:42:36 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Fri Jan 8 12:42:36 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:42:36 EST 2016 ssl.sh: #3142: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 18471 at Fri Jan 8 12:42:36 EST 2016 kill -USR1 18471 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18471 killed at Fri Jan 8 12:42:37 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9159 starting at Fri Jan 8 12:42:37 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:42:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:42:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3143: Waiting for Server - FAILED kill -0 18556 >/dev/null 2>/dev/null selfserv_9159 with PID 18556 found at Fri Jan 8 12:42:43 EST 2016 selfserv_9159 with PID 18556 started at Fri Jan 8 12:42:43 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Fri Jan 8 12:42:43 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:42:43 EST 2016 ssl.sh: #3144: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 18556 at Fri Jan 8 12:42:43 EST 2016 kill -USR1 18556 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18556 killed at Fri Jan 8 12:42:44 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:42:44 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:42:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:42:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3145: Waiting for Server - FAILED kill -0 18665 >/dev/null 2>/dev/null selfserv_9159 with PID 18665 found at Fri Jan 8 12:42:50 EST 2016 selfserv_9159 with PID 18665 started at Fri Jan 8 12:42:50 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C009 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 12:42:50 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:42:50 EST 2016 ssl.sh: #3146: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 18665 at Fri Jan 8 12:42:50 EST 2016 kill -USR1 18665 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18665 killed at Fri Jan 8 12:42:51 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:42:51 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:42:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:42:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3147: Waiting for Server - FAILED kill -0 18750 >/dev/null 2>/dev/null selfserv_9159 with PID 18750 found at Fri Jan 8 12:42:57 EST 2016 selfserv_9159 with PID 18750 started at Fri Jan 8 12:42:57 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 12:42:57 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:42:57 EST 2016 ssl.sh: #3148: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 18750 at Fri Jan 8 12:42:57 EST 2016 kill -USR1 18750 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18750 killed at Fri Jan 8 12:42:58 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:42:58 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:42:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:43:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3149: Waiting for Server - FAILED kill -0 18837 >/dev/null 2>/dev/null selfserv_9159 with PID 18837 found at Fri Jan 8 12:43:04 EST 2016 selfserv_9159 with PID 18837 started at Fri Jan 8 12:43:04 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C004 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 12:43:04 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:43:04 EST 2016 ssl.sh: #3150: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 18837 at Fri Jan 8 12:43:05 EST 2016 kill -USR1 18837 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18837 killed at Fri Jan 8 12:43:05 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:43:05 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:43:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:43:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3151: Waiting for Server - FAILED kill -0 18923 >/dev/null 2>/dev/null selfserv_9159 with PID 18923 found at Fri Jan 8 12:43:11 EST 2016 selfserv_9159 with PID 18923 started at Fri Jan 8 12:43:11 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \ localhost.localdomain strsclnt started at Fri Jan 8 12:43:11 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:43:11 EST 2016 ssl.sh: #3152: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 18923 at Fri Jan 8 12:43:12 EST 2016 kill -USR1 18923 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18923 killed at Fri Jan 8 12:43:12 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9159 starting at Fri Jan 8 12:43:12 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:43:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:43:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3153: Waiting for Server - FAILED kill -0 19011 >/dev/null 2>/dev/null selfserv_9159 with PID 19011 found at Fri Jan 8 12:43:18 EST 2016 selfserv_9159 with PID 19011 started at Fri Jan 8 12:43:18 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 12:43:18 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:43:19 EST 2016 ssl.sh: #3154: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 19011 at Fri Jan 8 12:43:19 EST 2016 kill -USR1 19011 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19011 killed at Fri Jan 8 12:43:19 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:43:19 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:43:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:43:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3155: Waiting for Server - FAILED kill -0 19098 >/dev/null 2>/dev/null selfserv_9159 with PID 19098 found at Fri Jan 8 12:43:25 EST 2016 selfserv_9159 with PID 19098 started at Fri Jan 8 12:43:25 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \ localhost.localdomain strsclnt started at Fri Jan 8 12:43:25 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:43:26 EST 2016 ssl.sh: #3156: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 19098 at Fri Jan 8 12:43:26 EST 2016 kill -USR1 19098 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19098 killed at Fri Jan 8 12:43:26 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:43:26 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:43:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:43:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3157: Waiting for Server - FAILED kill -0 19206 >/dev/null 2>/dev/null selfserv_9159 with PID 19206 found at Fri Jan 8 12:43:32 EST 2016 selfserv_9159 with PID 19206 started at Fri Jan 8 12:43:32 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:43:32 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:43:33 EST 2016 ssl.sh: #3158: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 19206 at Fri Jan 8 12:43:33 EST 2016 kill -USR1 19206 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19206 killed at Fri Jan 8 12:43:33 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9159 starting at Fri Jan 8 12:43:33 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:43:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:43:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3159: Waiting for Server - FAILED kill -0 19293 >/dev/null 2>/dev/null selfserv_9159 with PID 19293 found at Fri Jan 8 12:43:39 EST 2016 selfserv_9159 with PID 19293 started at Fri Jan 8 12:43:39 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Fri Jan 8 12:43:39 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:43:40 EST 2016 ssl.sh: #3160: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 19293 at Fri Jan 8 12:43:40 EST 2016 kill -USR1 19293 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19293 killed at Fri Jan 8 12:43:40 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:43:40 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:43:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:43:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3161: Waiting for Server - FAILED kill -0 19377 >/dev/null 2>/dev/null selfserv_9159 with PID 19377 found at Fri Jan 8 12:43:46 EST 2016 selfserv_9159 with PID 19377 started at Fri Jan 8 12:43:46 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:43:46 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:43:47 EST 2016 ssl.sh: #3162: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 19377 at Fri Jan 8 12:43:47 EST 2016 kill -USR1 19377 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19377 killed at Fri Jan 8 12:43:47 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:43:47 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:43:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:43:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3163: Waiting for Server - FAILED kill -0 19465 >/dev/null 2>/dev/null selfserv_9159 with PID 19465 found at Fri Jan 8 12:43:53 EST 2016 selfserv_9159 with PID 19465 started at Fri Jan 8 12:43:53 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:43:53 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:43:54 EST 2016 ssl.sh: #3164: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 19465 at Fri Jan 8 12:43:54 EST 2016 kill -USR1 19465 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19465 killed at Fri Jan 8 12:43:54 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:43:54 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:43:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:44:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3165: Waiting for Server - FAILED kill -0 19564 >/dev/null 2>/dev/null selfserv_9159 with PID 19564 found at Fri Jan 8 12:44:00 EST 2016 selfserv_9159 with PID 19564 started at Fri Jan 8 12:44:00 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:44:00 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:44:01 EST 2016 ssl.sh: #3166: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 19564 at Fri Jan 8 12:44:01 EST 2016 kill -USR1 19564 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19564 killed at Fri Jan 8 12:44:01 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9159 starting at Fri Jan 8 12:44:02 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:44:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:44:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3167: Waiting for Server - FAILED kill -0 19665 >/dev/null 2>/dev/null selfserv_9159 with PID 19665 found at Fri Jan 8 12:44:07 EST 2016 selfserv_9159 with PID 19665 started at Fri Jan 8 12:44:07 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:44:07 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:44:08 EST 2016 ssl.sh: #3168: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 19665 at Fri Jan 8 12:44:08 EST 2016 kill -USR1 19665 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19665 killed at Fri Jan 8 12:44:08 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:44:09 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:44:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:44:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3169: Waiting for Server - FAILED kill -0 19749 >/dev/null 2>/dev/null selfserv_9159 with PID 19749 found at Fri Jan 8 12:44:14 EST 2016 selfserv_9159 with PID 19749 started at Fri Jan 8 12:44:14 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:44:14 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:44:15 EST 2016 ssl.sh: #3170: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 19749 at Fri Jan 8 12:44:15 EST 2016 kill -USR1 19749 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19749 killed at Fri Jan 8 12:44:15 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:44:16 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:44:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:44:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3171: Waiting for Server - FAILED kill -0 19837 >/dev/null 2>/dev/null selfserv_9159 with PID 19837 found at Fri Jan 8 12:44:22 EST 2016 selfserv_9159 with PID 19837 started at Fri Jan 8 12:44:22 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:44:22 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:44:22 EST 2016 ssl.sh: #3172: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 19837 at Fri Jan 8 12:44:22 EST 2016 kill -USR1 19837 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19837 killed at Fri Jan 8 12:44:23 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:44:23 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:44:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:44:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3173: Waiting for Server - FAILED kill -0 19944 >/dev/null 2>/dev/null selfserv_9159 with PID 19944 found at Fri Jan 8 12:44:29 EST 2016 selfserv_9159 with PID 19944 started at Fri Jan 8 12:44:29 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 12:44:29 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:44:29 EST 2016 ssl.sh: #3174: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 19944 at Fri Jan 8 12:44:29 EST 2016 kill -USR1 19944 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19944 killed at Fri Jan 8 12:44:30 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:44:30 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:44:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:44:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3175: Waiting for Server - FAILED kill -0 20032 >/dev/null 2>/dev/null selfserv_9159 with PID 20032 found at Fri Jan 8 12:44:36 EST 2016 selfserv_9159 with PID 20032 started at Fri Jan 8 12:44:36 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \ localhost.localdomain strsclnt started at Fri Jan 8 12:44:36 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:44:36 EST 2016 ssl.sh: #3176: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 20032 at Fri Jan 8 12:44:36 EST 2016 kill -USR1 20032 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20032 killed at Fri Jan 8 12:44:37 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:44:37 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:44:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:44:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3177: Waiting for Server - FAILED kill -0 20130 >/dev/null 2>/dev/null selfserv_9159 with PID 20130 found at Fri Jan 8 12:44:43 EST 2016 selfserv_9159 with PID 20130 started at Fri Jan 8 12:44:43 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 12:44:43 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:44:43 EST 2016 ssl.sh: #3178: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 20130 at Fri Jan 8 12:44:43 EST 2016 kill -USR1 20130 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20130 killed at Fri Jan 8 12:44:44 EST 2016 ssl.sh: SSL - FIPS mode on for server =============================== ssl.sh: Turning FIPS on for the server modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -fips true -force FIPS mode enabled. ssl.sh: #3179: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -list ssl.sh: #3180: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #3181: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -fips true -force FIPS mode enabled. ssl.sh: #3182: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -list ssl.sh: #3183: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #3184: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server fips/client normal - with ECC =============================== selfserv_9159 starting at Fri Jan 8 12:44:46 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:44:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:44:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3185: Waiting for Server - FAILED kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:44:52 EST 2016 selfserv_9159 with PID 20273 started at Fri Jan 8 12:44:52 EST 2016 ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping A SSL2_RC4_128_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping B SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping C SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping D SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping E SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping F SSL2_DES_192_EDE3_CBC_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping B SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping C SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping E SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:44:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3186: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:44:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3187: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:44:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3188: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping f SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping g SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:44:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3189: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:44:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3190: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:44:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3191: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping l SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping m SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:44:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3192: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:44:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3193: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:44:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3194: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:44:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3195: SSL3_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:44:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3196: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:44:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3197: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:44:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3198: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3199: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3200: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3201: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping f TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping g TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3202: TLS_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3203: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3204: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping l TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping m TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3205: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3206: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3207: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3208: TLS_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3209: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3210: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3211: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping f TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping g TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3212: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3213: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3214: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping l TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping m TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3215: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3216: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3217: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3218: TLS11_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3219: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3220: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3221: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3222: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3223: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3224: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping l TLS12_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping m TLS12_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3225: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3226: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3227: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3228: TLS12_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3229: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3230: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3231: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3232: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3233: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3234: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3235: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3236: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3237: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3238: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3239: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3240: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3241: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3242: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3243: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3244: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3245: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3246: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3247: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3248: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3249: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3250: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3251: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3252: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 20273 >/dev/null 2>/dev/null selfserv_9159 with PID 20273 found at Fri Jan 8 12:45:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3253: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 20273 at Fri Jan 8 12:45:29 EST 2016 kill -USR1 20273 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20273 killed at Fri Jan 8 12:45:30 EST 2016 ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 12:45:30 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:45:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:45:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3254: Waiting for Server - FAILED kill -0 22381 >/dev/null 2>/dev/null selfserv_9159 with PID 22381 found at Fri Jan 8 12:45:36 EST 2016 selfserv_9159 with PID 22381 started at Fri Jan 8 12:45:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3255: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 22381 >/dev/null 2>/dev/null selfserv_9159 with PID 22381 found at Fri Jan 8 12:45:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3256: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 22381 >/dev/null 2>/dev/null selfserv_9159 with PID 22381 found at Fri Jan 8 12:45:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3257: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 22381 >/dev/null 2>/dev/null selfserv_9159 with PID 22381 found at Fri Jan 8 12:45:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3258: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 22381 >/dev/null 2>/dev/null selfserv_9159 with PID 22381 found at Fri Jan 8 12:45:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3259: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 22381 at Fri Jan 8 12:45:38 EST 2016 kill -USR1 22381 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22381 killed at Fri Jan 8 12:45:39 EST 2016 ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 12:45:39 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:45:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:45:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3260: Waiting for Server - FAILED kill -0 22555 >/dev/null 2>/dev/null selfserv_9159 with PID 22555 found at Fri Jan 8 12:45:45 EST 2016 selfserv_9159 with PID 22555 started at Fri Jan 8 12:45:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3261: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 22555 >/dev/null 2>/dev/null selfserv_9159 with PID 22555 found at Fri Jan 8 12:45:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3262: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 22555 >/dev/null 2>/dev/null selfserv_9159 with PID 22555 found at Fri Jan 8 12:45:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3263: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 22555 >/dev/null 2>/dev/null selfserv_9159 with PID 22555 found at Fri Jan 8 12:45:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3264: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 22555 >/dev/null 2>/dev/null selfserv_9159 with PID 22555 found at Fri Jan 8 12:45:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3265: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 22555 >/dev/null 2>/dev/null selfserv_9159 with PID 22555 found at Fri Jan 8 12:45:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3266: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 22555 >/dev/null 2>/dev/null selfserv_9159 with PID 22555 found at Fri Jan 8 12:45:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3267: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 22555 >/dev/null 2>/dev/null selfserv_9159 with PID 22555 found at Fri Jan 8 12:45:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3268: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 22555 >/dev/null 2>/dev/null selfserv_9159 with PID 22555 found at Fri Jan 8 12:45:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3269: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 22555 >/dev/null 2>/dev/null selfserv_9159 with PID 22555 found at Fri Jan 8 12:45:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3270: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 22555 >/dev/null 2>/dev/null selfserv_9159 with PID 22555 found at Fri Jan 8 12:45:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3271: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 22555 >/dev/null 2>/dev/null selfserv_9159 with PID 22555 found at Fri Jan 8 12:45:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3272: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 22555 >/dev/null 2>/dev/null selfserv_9159 with PID 22555 found at Fri Jan 8 12:45:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3273: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 22555 >/dev/null 2>/dev/null selfserv_9159 with PID 22555 found at Fri Jan 8 12:45:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3274: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 22555 >/dev/null 2>/dev/null selfserv_9159 with PID 22555 found at Fri Jan 8 12:45:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3275: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 22555 at Fri Jan 8 12:45:53 EST 2016 kill -USR1 22555 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22555 killed at Fri Jan 8 12:45:53 EST 2016 ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 12:45:53 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:45:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:45:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3276: Waiting for Server - FAILED kill -0 22984 >/dev/null 2>/dev/null selfserv_9159 with PID 22984 found at Fri Jan 8 12:45:59 EST 2016 selfserv_9159 with PID 22984 started at Fri Jan 8 12:45:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3277: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 22984 >/dev/null 2>/dev/null selfserv_9159 with PID 22984 found at Fri Jan 8 12:45:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3278: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 22984 >/dev/null 2>/dev/null selfserv_9159 with PID 22984 found at Fri Jan 8 12:46:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3279: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 22984 >/dev/null 2>/dev/null selfserv_9159 with PID 22984 found at Fri Jan 8 12:46:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3280: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 22984 >/dev/null 2>/dev/null selfserv_9159 with PID 22984 found at Fri Jan 8 12:46:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3281: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 22984 at Fri Jan 8 12:46:02 EST 2016 kill -USR1 22984 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22984 killed at Fri Jan 8 12:46:02 EST 2016 ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 12:46:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:46:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:46:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3282: Waiting for Server - FAILED kill -0 23159 >/dev/null 2>/dev/null selfserv_9159 with PID 23159 found at Fri Jan 8 12:46:08 EST 2016 selfserv_9159 with PID 23159 started at Fri Jan 8 12:46:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3283: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 23159 >/dev/null 2>/dev/null selfserv_9159 with PID 23159 found at Fri Jan 8 12:46:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3284: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23159 >/dev/null 2>/dev/null selfserv_9159 with PID 23159 found at Fri Jan 8 12:46:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3285: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 23159 >/dev/null 2>/dev/null selfserv_9159 with PID 23159 found at Fri Jan 8 12:46:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3286: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 23159 >/dev/null 2>/dev/null selfserv_9159 with PID 23159 found at Fri Jan 8 12:46:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3287: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 23159 >/dev/null 2>/dev/null selfserv_9159 with PID 23159 found at Fri Jan 8 12:46:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3288: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 23159 >/dev/null 2>/dev/null selfserv_9159 with PID 23159 found at Fri Jan 8 12:46:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3289: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23159 >/dev/null 2>/dev/null selfserv_9159 with PID 23159 found at Fri Jan 8 12:46:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3290: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 23159 >/dev/null 2>/dev/null selfserv_9159 with PID 23159 found at Fri Jan 8 12:46:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3291: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 23159 >/dev/null 2>/dev/null selfserv_9159 with PID 23159 found at Fri Jan 8 12:46:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3292: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 23159 >/dev/null 2>/dev/null selfserv_9159 with PID 23159 found at Fri Jan 8 12:46:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3293: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 23159 >/dev/null 2>/dev/null selfserv_9159 with PID 23159 found at Fri Jan 8 12:46:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3294: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23159 >/dev/null 2>/dev/null selfserv_9159 with PID 23159 found at Fri Jan 8 12:46:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3295: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 23159 >/dev/null 2>/dev/null selfserv_9159 with PID 23159 found at Fri Jan 8 12:46:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3296: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 23159 >/dev/null 2>/dev/null selfserv_9159 with PID 23159 found at Fri Jan 8 12:46:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3297: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 23159 at Fri Jan 8 12:46:16 EST 2016 kill -USR1 23159 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23159 killed at Fri Jan 8 12:46:16 EST 2016 ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 12:46:16 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:46:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:46:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3298: Waiting for Server - FAILED kill -0 23588 >/dev/null 2>/dev/null selfserv_9159 with PID 23588 found at Fri Jan 8 12:46:22 EST 2016 selfserv_9159 with PID 23588 started at Fri Jan 8 12:46:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3299: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 23588 >/dev/null 2>/dev/null selfserv_9159 with PID 23588 found at Fri Jan 8 12:46:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3300: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23588 >/dev/null 2>/dev/null selfserv_9159 with PID 23588 found at Fri Jan 8 12:46:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3301: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 23588 >/dev/null 2>/dev/null selfserv_9159 with PID 23588 found at Fri Jan 8 12:46:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3302: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 23588 >/dev/null 2>/dev/null selfserv_9159 with PID 23588 found at Fri Jan 8 12:46:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3303: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 23588 at Fri Jan 8 12:46:25 EST 2016 kill -USR1 23588 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23588 killed at Fri Jan 8 12:46:25 EST 2016 ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 12:46:25 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:46:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:46:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3304: Waiting for Server - FAILED kill -0 23762 >/dev/null 2>/dev/null selfserv_9159 with PID 23762 found at Fri Jan 8 12:46:31 EST 2016 selfserv_9159 with PID 23762 started at Fri Jan 8 12:46:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3305: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 23762 >/dev/null 2>/dev/null selfserv_9159 with PID 23762 found at Fri Jan 8 12:46:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3306: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23762 >/dev/null 2>/dev/null selfserv_9159 with PID 23762 found at Fri Jan 8 12:46:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3307: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 23762 >/dev/null 2>/dev/null selfserv_9159 with PID 23762 found at Fri Jan 8 12:46:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3308: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 23762 >/dev/null 2>/dev/null selfserv_9159 with PID 23762 found at Fri Jan 8 12:46:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3309: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 23762 >/dev/null 2>/dev/null selfserv_9159 with PID 23762 found at Fri Jan 8 12:46:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3310: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 23762 >/dev/null 2>/dev/null selfserv_9159 with PID 23762 found at Fri Jan 8 12:46:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3311: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 23762 >/dev/null 2>/dev/null selfserv_9159 with PID 23762 found at Fri Jan 8 12:46:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3312: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 23762 >/dev/null 2>/dev/null selfserv_9159 with PID 23762 found at Fri Jan 8 12:46:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3313: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 23762 >/dev/null 2>/dev/null selfserv_9159 with PID 23762 found at Fri Jan 8 12:46:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3314: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 23762 >/dev/null 2>/dev/null selfserv_9159 with PID 23762 found at Fri Jan 8 12:46:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3315: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 23762 >/dev/null 2>/dev/null selfserv_9159 with PID 23762 found at Fri Jan 8 12:46:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3316: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 23762 >/dev/null 2>/dev/null selfserv_9159 with PID 23762 found at Fri Jan 8 12:46:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3317: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23762 at Fri Jan 8 12:46:38 EST 2016 kill -USR1 23762 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23762 killed at Fri Jan 8 12:46:38 EST 2016 ssl.sh: SSL Client Authentication - server fips/client normal - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:46:39 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:46:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:46:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3318: Waiting for Server - FAILED kill -0 24182 >/dev/null 2>/dev/null selfserv_9159 with PID 24182 found at Fri Jan 8 12:46:45 EST 2016 selfserv_9159 with PID 24182 started at Fri Jan 8 12:46:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3319: TLS Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 24182 at Fri Jan 8 12:46:45 EST 2016 kill -USR1 24182 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24182 killed at Fri Jan 8 12:46:46 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:46:46 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:46:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:46:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3320: Waiting for Server - FAILED kill -0 24258 >/dev/null 2>/dev/null selfserv_9159 with PID 24258 found at Fri Jan 8 12:46:52 EST 2016 selfserv_9159 with PID 24258 started at Fri Jan 8 12:46:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3321: TLS Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 24258 at Fri Jan 8 12:46:52 EST 2016 kill -USR1 24258 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24258 killed at Fri Jan 8 12:46:53 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:46:53 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:46:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:46:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3322: Waiting for Server - FAILED kill -0 24334 >/dev/null 2>/dev/null selfserv_9159 with PID 24334 found at Fri Jan 8 12:46:58 EST 2016 selfserv_9159 with PID 24334 started at Fri Jan 8 12:46:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3323: TLS Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 24334 at Fri Jan 8 12:46:59 EST 2016 kill -USR1 24334 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24334 killed at Fri Jan 8 12:46:59 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:47:00 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:47:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:47:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3324: Waiting for Server - FAILED kill -0 24410 >/dev/null 2>/dev/null selfserv_9159 with PID 24410 found at Fri Jan 8 12:47:05 EST 2016 selfserv_9159 with PID 24410 started at Fri Jan 8 12:47:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3325: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 24410 at Fri Jan 8 12:47:06 EST 2016 kill -USR1 24410 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24410 killed at Fri Jan 8 12:47:06 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:47:06 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:47:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:47:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3326: Waiting for Server - FAILED kill -0 24485 >/dev/null 2>/dev/null selfserv_9159 with PID 24485 found at Fri Jan 8 12:47:12 EST 2016 selfserv_9159 with PID 24485 started at Fri Jan 8 12:47:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3327: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 24485 at Fri Jan 8 12:47:13 EST 2016 kill -USR1 24485 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24485 killed at Fri Jan 8 12:47:13 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:47:13 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:47:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:47:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3328: Waiting for Server - FAILED kill -0 24562 >/dev/null 2>/dev/null selfserv_9159 with PID 24562 found at Fri Jan 8 12:47:19 EST 2016 selfserv_9159 with PID 24562 started at Fri Jan 8 12:47:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3329: TLS Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 24562 at Fri Jan 8 12:47:20 EST 2016 kill -USR1 24562 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24562 killed at Fri Jan 8 12:47:20 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:47:20 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:47:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:47:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3330: Waiting for Server - FAILED kill -0 24639 >/dev/null 2>/dev/null selfserv_9159 with PID 24639 found at Fri Jan 8 12:47:26 EST 2016 selfserv_9159 with PID 24639 started at Fri Jan 8 12:47:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3331: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 24639 at Fri Jan 8 12:47:27 EST 2016 kill -USR1 24639 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24639 killed at Fri Jan 8 12:47:27 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:47:27 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:47:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:47:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3332: Waiting for Server - FAILED kill -0 24717 >/dev/null 2>/dev/null selfserv_9159 with PID 24717 found at Fri Jan 8 12:47:33 EST 2016 selfserv_9159 with PID 24717 started at Fri Jan 8 12:47:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3333: SSL3 Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 24717 at Fri Jan 8 12:47:34 EST 2016 kill -USR1 24717 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24717 killed at Fri Jan 8 12:47:34 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:47:34 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:47:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:47:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3334: Waiting for Server - FAILED kill -0 24793 >/dev/null 2>/dev/null selfserv_9159 with PID 24793 found at Fri Jan 8 12:47:40 EST 2016 selfserv_9159 with PID 24793 started at Fri Jan 8 12:47:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3335: SSL3 Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 24793 at Fri Jan 8 12:47:41 EST 2016 kill -USR1 24793 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24793 killed at Fri Jan 8 12:47:41 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:47:41 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:47:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:47:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3336: Waiting for Server - FAILED kill -0 24871 >/dev/null 2>/dev/null selfserv_9159 with PID 24871 found at Fri Jan 8 12:47:47 EST 2016 selfserv_9159 with PID 24871 started at Fri Jan 8 12:47:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3337: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 24871 at Fri Jan 8 12:47:47 EST 2016 kill -USR1 24871 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24871 killed at Fri Jan 8 12:47:48 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:47:48 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:47:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:47:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3338: Waiting for Server - FAILED kill -0 24947 >/dev/null 2>/dev/null selfserv_9159 with PID 24947 found at Fri Jan 8 12:47:54 EST 2016 selfserv_9159 with PID 24947 started at Fri Jan 8 12:47:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3339: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 24947 at Fri Jan 8 12:47:54 EST 2016 kill -USR1 24947 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24947 killed at Fri Jan 8 12:47:55 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:47:55 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:47:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:48:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3340: Waiting for Server - FAILED kill -0 25024 >/dev/null 2>/dev/null selfserv_9159 with PID 25024 found at Fri Jan 8 12:48:01 EST 2016 selfserv_9159 with PID 25024 started at Fri Jan 8 12:48:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3341: SSL3 Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 25024 at Fri Jan 8 12:48:01 EST 2016 kill -USR1 25024 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25024 killed at Fri Jan 8 12:48:02 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:48:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:48:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:48:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3342: Waiting for Server - FAILED kill -0 25102 >/dev/null 2>/dev/null selfserv_9159 with PID 25102 found at Fri Jan 8 12:48:08 EST 2016 selfserv_9159 with PID 25102 started at Fri Jan 8 12:48:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3343: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 25102 at Fri Jan 8 12:48:08 EST 2016 kill -USR1 25102 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25102 killed at Fri Jan 8 12:48:09 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:48:09 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:48:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:48:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3344: Waiting for Server - FAILED kill -0 25181 >/dev/null 2>/dev/null selfserv_9159 with PID 25181 found at Fri Jan 8 12:48:15 EST 2016 selfserv_9159 with PID 25181 started at Fri Jan 8 12:48:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3345: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 25181 at Fri Jan 8 12:48:15 EST 2016 kill -USR1 25181 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25181 killed at Fri Jan 8 12:48:16 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:48:16 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:48:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:48:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3346: Waiting for Server - FAILED kill -0 25255 >/dev/null 2>/dev/null selfserv_9159 with PID 25255 found at Fri Jan 8 12:48:22 EST 2016 selfserv_9159 with PID 25255 started at Fri Jan 8 12:48:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3347: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 25255 at Fri Jan 8 12:48:22 EST 2016 kill -USR1 25255 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25255 killed at Fri Jan 8 12:48:22 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:48:23 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:48:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:48:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3348: Waiting for Server - FAILED kill -0 25325 >/dev/null 2>/dev/null selfserv_9159 with PID 25325 found at Fri Jan 8 12:48:28 EST 2016 selfserv_9159 with PID 25325 started at Fri Jan 8 12:48:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3349: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 25325 at Fri Jan 8 12:48:29 EST 2016 kill -USR1 25325 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25325 killed at Fri Jan 8 12:48:29 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:48:29 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:48:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:48:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3350: Waiting for Server - FAILED kill -0 25394 >/dev/null 2>/dev/null selfserv_9159 with PID 25394 found at Fri Jan 8 12:48:35 EST 2016 selfserv_9159 with PID 25394 started at Fri Jan 8 12:48:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3351: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 25394 at Fri Jan 8 12:48:36 EST 2016 kill -USR1 25394 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25394 killed at Fri Jan 8 12:48:36 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:48:36 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:48:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:48:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3352: Waiting for Server - FAILED kill -0 25463 >/dev/null 2>/dev/null selfserv_9159 with PID 25463 found at Fri Jan 8 12:48:42 EST 2016 selfserv_9159 with PID 25463 started at Fri Jan 8 12:48:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3353: TLS Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 25463 at Fri Jan 8 12:48:43 EST 2016 kill -USR1 25463 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25463 killed at Fri Jan 8 12:48:43 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:48:43 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:48:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:48:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3354: Waiting for Server - FAILED kill -0 25533 >/dev/null 2>/dev/null selfserv_9159 with PID 25533 found at Fri Jan 8 12:48:49 EST 2016 selfserv_9159 with PID 25533 started at Fri Jan 8 12:48:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3355: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 25533 at Fri Jan 8 12:48:50 EST 2016 kill -USR1 25533 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25533 killed at Fri Jan 8 12:48:50 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:48:50 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:48:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:48:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3356: Waiting for Server - FAILED kill -0 25602 >/dev/null 2>/dev/null selfserv_9159 with PID 25602 found at Fri Jan 8 12:48:56 EST 2016 selfserv_9159 with PID 25602 started at Fri Jan 8 12:48:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3357: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 25602 at Fri Jan 8 12:48:57 EST 2016 kill -USR1 25602 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25602 killed at Fri Jan 8 12:48:57 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:48:57 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:48:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:49:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3358: Waiting for Server - FAILED kill -0 25671 >/dev/null 2>/dev/null selfserv_9159 with PID 25671 found at Fri Jan 8 12:49:03 EST 2016 selfserv_9159 with PID 25671 started at Fri Jan 8 12:49:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3359: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 25671 at Fri Jan 8 12:49:04 EST 2016 kill -USR1 25671 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25671 killed at Fri Jan 8 12:49:04 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:49:04 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:49:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:49:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3360: Waiting for Server - FAILED kill -0 25741 >/dev/null 2>/dev/null selfserv_9159 with PID 25741 found at Fri Jan 8 12:49:10 EST 2016 selfserv_9159 with PID 25741 started at Fri Jan 8 12:49:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3361: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 25741 at Fri Jan 8 12:49:10 EST 2016 kill -USR1 25741 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25741 killed at Fri Jan 8 12:49:11 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:49:11 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:49:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:49:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3362: Waiting for Server - FAILED kill -0 25810 >/dev/null 2>/dev/null selfserv_9159 with PID 25810 found at Fri Jan 8 12:49:17 EST 2016 selfserv_9159 with PID 25810 started at Fri Jan 8 12:49:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3363: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 25810 at Fri Jan 8 12:49:17 EST 2016 kill -USR1 25810 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25810 killed at Fri Jan 8 12:49:18 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:49:18 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:49:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:49:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3364: Waiting for Server - FAILED kill -0 25879 >/dev/null 2>/dev/null selfserv_9159 with PID 25879 found at Fri Jan 8 12:49:24 EST 2016 selfserv_9159 with PID 25879 started at Fri Jan 8 12:49:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3365: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 25879 at Fri Jan 8 12:49:24 EST 2016 kill -USR1 25879 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25879 killed at Fri Jan 8 12:49:25 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:49:25 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:49:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:49:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3366: Waiting for Server - FAILED kill -0 25949 >/dev/null 2>/dev/null selfserv_9159 with PID 25949 found at Fri Jan 8 12:49:31 EST 2016 selfserv_9159 with PID 25949 started at Fri Jan 8 12:49:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3367: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 25949 at Fri Jan 8 12:49:31 EST 2016 kill -USR1 25949 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25949 killed at Fri Jan 8 12:49:32 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:49:32 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:49:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:49:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3368: Waiting for Server - FAILED kill -0 26018 >/dev/null 2>/dev/null selfserv_9159 with PID 26018 found at Fri Jan 8 12:49:38 EST 2016 selfserv_9159 with PID 26018 started at Fri Jan 8 12:49:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3369: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 26018 at Fri Jan 8 12:49:38 EST 2016 kill -USR1 26018 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26018 killed at Fri Jan 8 12:49:39 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:49:39 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:49:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:49:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3370: Waiting for Server - FAILED kill -0 26087 >/dev/null 2>/dev/null selfserv_9159 with PID 26087 found at Fri Jan 8 12:49:45 EST 2016 selfserv_9159 with PID 26087 started at Fri Jan 8 12:49:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3371: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 26087 at Fri Jan 8 12:49:45 EST 2016 kill -USR1 26087 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26087 killed at Fri Jan 8 12:49:45 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 12:49:46 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:49:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:49:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3372: Waiting for Server - FAILED kill -0 26157 >/dev/null 2>/dev/null selfserv_9159 with PID 26157 found at Fri Jan 8 12:49:51 EST 2016 selfserv_9159 with PID 26157 started at Fri Jan 8 12:49:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3373: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 26157 at Fri Jan 8 12:49:52 EST 2016 kill -USR1 26157 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26157 killed at Fri Jan 8 12:49:52 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:49:52 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:49:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:49:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3374: Waiting for Server - FAILED kill -0 26226 >/dev/null 2>/dev/null selfserv_9159 with PID 26226 found at Fri Jan 8 12:49:58 EST 2016 selfserv_9159 with PID 26226 started at Fri Jan 8 12:49:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3375: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 26226 at Fri Jan 8 12:49:59 EST 2016 kill -USR1 26226 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26226 killed at Fri Jan 8 12:49:59 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:49:59 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:49:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:50:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3376: Waiting for Server - FAILED kill -0 26295 >/dev/null 2>/dev/null selfserv_9159 with PID 26295 found at Fri Jan 8 12:50:05 EST 2016 selfserv_9159 with PID 26295 started at Fri Jan 8 12:50:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3377: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 26295 at Fri Jan 8 12:50:06 EST 2016 kill -USR1 26295 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26295 killed at Fri Jan 8 12:50:06 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:50:06 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:50:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:50:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3378: Waiting for Server - FAILED kill -0 26380 >/dev/null 2>/dev/null selfserv_9159 with PID 26380 found at Fri Jan 8 12:50:12 EST 2016 selfserv_9159 with PID 26380 started at Fri Jan 8 12:50:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3379: TLS Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 26380 at Fri Jan 8 12:50:13 EST 2016 kill -USR1 26380 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26380 killed at Fri Jan 8 12:50:13 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:50:13 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:50:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:50:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3380: Waiting for Server - FAILED kill -0 26449 >/dev/null 2>/dev/null selfserv_9159 with PID 26449 found at Fri Jan 8 12:50:19 EST 2016 selfserv_9159 with PID 26449 started at Fri Jan 8 12:50:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3381: TLS Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 26449 at Fri Jan 8 12:50:20 EST 2016 kill -USR1 26449 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26449 killed at Fri Jan 8 12:50:20 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:50:20 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:50:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:50:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3382: Waiting for Server - FAILED kill -0 26518 >/dev/null 2>/dev/null selfserv_9159 with PID 26518 found at Fri Jan 8 12:50:26 EST 2016 selfserv_9159 with PID 26518 started at Fri Jan 8 12:50:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3383: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 26518 at Fri Jan 8 12:50:27 EST 2016 kill -USR1 26518 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26518 killed at Fri Jan 8 12:50:27 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:50:27 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:50:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:50:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3384: Waiting for Server - FAILED kill -0 26588 >/dev/null 2>/dev/null selfserv_9159 with PID 26588 found at Fri Jan 8 12:50:33 EST 2016 selfserv_9159 with PID 26588 started at Fri Jan 8 12:50:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3385: TLS Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 26588 at Fri Jan 8 12:50:33 EST 2016 kill -USR1 26588 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26588 killed at Fri Jan 8 12:50:34 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:50:34 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:50:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:50:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3386: Waiting for Server - FAILED kill -0 26657 >/dev/null 2>/dev/null selfserv_9159 with PID 26657 found at Fri Jan 8 12:50:40 EST 2016 selfserv_9159 with PID 26657 started at Fri Jan 8 12:50:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3387: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 26657 at Fri Jan 8 12:50:40 EST 2016 kill -USR1 26657 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26657 killed at Fri Jan 8 12:50:41 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:50:41 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:50:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:50:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3388: Waiting for Server - FAILED kill -0 26726 >/dev/null 2>/dev/null selfserv_9159 with PID 26726 found at Fri Jan 8 12:50:47 EST 2016 selfserv_9159 with PID 26726 started at Fri Jan 8 12:50:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3389: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 26726 at Fri Jan 8 12:50:47 EST 2016 kill -USR1 26726 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26726 killed at Fri Jan 8 12:50:48 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:50:48 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:50:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:50:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3390: Waiting for Server - FAILED kill -0 26796 >/dev/null 2>/dev/null selfserv_9159 with PID 26796 found at Fri Jan 8 12:50:54 EST 2016 selfserv_9159 with PID 26796 started at Fri Jan 8 12:50:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3391: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 26796 at Fri Jan 8 12:50:54 EST 2016 kill -USR1 26796 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26796 killed at Fri Jan 8 12:50:55 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:50:55 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:50:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:51:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3392: Waiting for Server - FAILED kill -0 26865 >/dev/null 2>/dev/null selfserv_9159 with PID 26865 found at Fri Jan 8 12:51:01 EST 2016 selfserv_9159 with PID 26865 started at Fri Jan 8 12:51:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3393: SSL3 Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 26865 at Fri Jan 8 12:51:01 EST 2016 kill -USR1 26865 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26865 killed at Fri Jan 8 12:51:02 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:51:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:51:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:51:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3394: Waiting for Server - FAILED kill -0 26934 >/dev/null 2>/dev/null selfserv_9159 with PID 26934 found at Fri Jan 8 12:51:08 EST 2016 selfserv_9159 with PID 26934 started at Fri Jan 8 12:51:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3395: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 26934 at Fri Jan 8 12:51:08 EST 2016 kill -USR1 26934 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26934 killed at Fri Jan 8 12:51:08 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:51:09 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:51:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:51:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3396: Waiting for Server - FAILED kill -0 27004 >/dev/null 2>/dev/null selfserv_9159 with PID 27004 found at Fri Jan 8 12:51:14 EST 2016 selfserv_9159 with PID 27004 started at Fri Jan 8 12:51:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3397: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 27004 at Fri Jan 8 12:51:15 EST 2016 kill -USR1 27004 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27004 killed at Fri Jan 8 12:51:15 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:51:15 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:51:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:51:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3398: Waiting for Server - FAILED kill -0 27075 >/dev/null 2>/dev/null selfserv_9159 with PID 27075 found at Fri Jan 8 12:51:21 EST 2016 selfserv_9159 with PID 27075 started at Fri Jan 8 12:51:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3399: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 27075 at Fri Jan 8 12:51:22 EST 2016 kill -USR1 27075 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27075 killed at Fri Jan 8 12:51:22 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:51:22 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:51:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:51:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3400: Waiting for Server - FAILED kill -0 27144 >/dev/null 2>/dev/null selfserv_9159 with PID 27144 found at Fri Jan 8 12:51:28 EST 2016 selfserv_9159 with PID 27144 started at Fri Jan 8 12:51:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3401: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 27144 at Fri Jan 8 12:51:29 EST 2016 kill -USR1 27144 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27144 killed at Fri Jan 8 12:51:29 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:51:29 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:51:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:51:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3402: Waiting for Server - FAILED kill -0 27216 >/dev/null 2>/dev/null selfserv_9159 with PID 27216 found at Fri Jan 8 12:51:35 EST 2016 selfserv_9159 with PID 27216 started at Fri Jan 8 12:51:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3403: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 27216 at Fri Jan 8 12:51:36 EST 2016 kill -USR1 27216 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27216 killed at Fri Jan 8 12:51:36 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:51:36 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:51:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:51:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3404: Waiting for Server - FAILED kill -0 27285 >/dev/null 2>/dev/null selfserv_9159 with PID 27285 found at Fri Jan 8 12:51:42 EST 2016 selfserv_9159 with PID 27285 started at Fri Jan 8 12:51:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3405: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 27285 at Fri Jan 8 12:51:43 EST 2016 kill -USR1 27285 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27285 killed at Fri Jan 8 12:51:43 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:51:43 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:51:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:51:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3406: Waiting for Server - FAILED kill -0 27354 >/dev/null 2>/dev/null selfserv_9159 with PID 27354 found at Fri Jan 8 12:51:49 EST 2016 selfserv_9159 with PID 27354 started at Fri Jan 8 12:51:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3407: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 27354 at Fri Jan 8 12:51:50 EST 2016 kill -USR1 27354 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27354 killed at Fri Jan 8 12:51:50 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:51:50 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:51:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:51:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3408: Waiting for Server - FAILED kill -0 27424 >/dev/null 2>/dev/null selfserv_9159 with PID 27424 found at Fri Jan 8 12:51:56 EST 2016 selfserv_9159 with PID 27424 started at Fri Jan 8 12:51:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3409: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 27424 at Fri Jan 8 12:51:56 EST 2016 kill -USR1 27424 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27424 killed at Fri Jan 8 12:51:57 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:51:57 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:51:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:52:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3410: Waiting for Server - FAILED kill -0 27493 >/dev/null 2>/dev/null selfserv_9159 with PID 27493 found at Fri Jan 8 12:52:03 EST 2016 selfserv_9159 with PID 27493 started at Fri Jan 8 12:52:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3411: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 27493 at Fri Jan 8 12:52:03 EST 2016 kill -USR1 27493 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27493 killed at Fri Jan 8 12:52:04 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:52:04 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:52:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:52:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3412: Waiting for Server - FAILED kill -0 27562 >/dev/null 2>/dev/null selfserv_9159 with PID 27562 found at Fri Jan 8 12:52:10 EST 2016 selfserv_9159 with PID 27562 started at Fri Jan 8 12:52:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3413: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 27562 at Fri Jan 8 12:52:10 EST 2016 kill -USR1 27562 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27562 killed at Fri Jan 8 12:52:11 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 12:52:11 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:52:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:52:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3414: Waiting for Server - FAILED kill -0 27632 >/dev/null 2>/dev/null selfserv_9159 with PID 27632 found at Fri Jan 8 12:52:17 EST 2016 selfserv_9159 with PID 27632 started at Fri Jan 8 12:52:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3415: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 27632 at Fri Jan 8 12:52:17 EST 2016 kill -USR1 27632 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27632 killed at Fri Jan 8 12:52:18 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:52:18 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:52:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:52:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3416: Waiting for Server - FAILED kill -0 27701 >/dev/null 2>/dev/null selfserv_9159 with PID 27701 found at Fri Jan 8 12:52:24 EST 2016 selfserv_9159 with PID 27701 started at Fri Jan 8 12:52:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3417: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 27701 at Fri Jan 8 12:52:24 EST 2016 kill -USR1 27701 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27701 killed at Fri Jan 8 12:52:25 EST 2016 ssl.sh: TLS Server hello response without SNI ---- selfserv_9159 starting at Fri Jan 8 12:52:25 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:52:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:52:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3418: Waiting for Server - FAILED kill -0 27791 >/dev/null 2>/dev/null selfserv_9159 with PID 27791 found at Fri Jan 8 12:52:31 EST 2016 selfserv_9159 with PID 27791 started at Fri Jan 8 12:52:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3419: TLS Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 27791 at Fri Jan 8 12:52:31 EST 2016 kill -USR1 27791 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27791 killed at Fri Jan 8 12:52:32 EST 2016 ssl.sh: TLS Server hello response with SNI ---- selfserv_9159 starting at Fri Jan 8 12:52:32 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:52:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:52:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3420: Waiting for Server - FAILED kill -0 27867 >/dev/null 2>/dev/null selfserv_9159 with PID 27867 found at Fri Jan 8 12:52:38 EST 2016 selfserv_9159 with PID 27867 started at Fri Jan 8 12:52:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3421: TLS Server hello response with SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 27867 at Fri Jan 8 12:52:38 EST 2016 kill -USR1 27867 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27867 killed at Fri Jan 8 12:52:38 EST 2016 ssl.sh: TLS Server response with alert ---- selfserv_9159 starting at Fri Jan 8 12:52:39 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:52:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:52:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3422: Waiting for Server - FAILED kill -0 27942 >/dev/null 2>/dev/null selfserv_9159 with PID 27942 found at Fri Jan 8 12:52:44 EST 2016 selfserv_9159 with PID 27942 started at Fri Jan 8 12:52:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3423: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 27942 at Fri Jan 8 12:52:45 EST 2016 kill -USR1 27942 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27942 killed at Fri Jan 8 12:52:45 EST 2016 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9159 starting at Fri Jan 8 12:52:46 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:52:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:52:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3424: Waiting for Server - FAILED kill -0 28017 >/dev/null 2>/dev/null selfserv_9159 with PID 28017 found at Fri Jan 8 12:52:51 EST 2016 selfserv_9159 with PID 28017 started at Fri Jan 8 12:52:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3425: SSL3 Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 28017 at Fri Jan 8 12:52:52 EST 2016 kill -USR1 28017 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28017 killed at Fri Jan 8 12:52:52 EST 2016 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9159 starting at Fri Jan 8 12:52:52 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:52:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:52:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3426: Waiting for Server - FAILED kill -0 28093 >/dev/null 2>/dev/null selfserv_9159 with PID 28093 found at Fri Jan 8 12:52:58 EST 2016 selfserv_9159 with PID 28093 started at Fri Jan 8 12:52:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c vssl3 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3427: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 28093 at Fri Jan 8 12:52:59 EST 2016 kill -USR1 28093 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28093 killed at Fri Jan 8 12:52:59 EST 2016 ssl.sh: TLS Server hello response without SNI ---- selfserv_9159 starting at Fri Jan 8 12:52:59 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:52:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:53:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3428: Waiting for Server - FAILED kill -0 28168 >/dev/null 2>/dev/null selfserv_9159 with PID 28168 found at Fri Jan 8 12:53:05 EST 2016 selfserv_9159 with PID 28168 started at Fri Jan 8 12:53:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3429: TLS Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 28168 at Fri Jan 8 12:53:06 EST 2016 kill -USR1 28168 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28168 killed at Fri Jan 8 12:53:06 EST 2016 ssl.sh: TLS Server hello response with SNI ---- selfserv_9159 starting at Fri Jan 8 12:53:06 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:53:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:53:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3430: Waiting for Server - FAILED kill -0 28243 >/dev/null 2>/dev/null selfserv_9159 with PID 28243 found at Fri Jan 8 12:53:12 EST 2016 selfserv_9159 with PID 28243 started at Fri Jan 8 12:53:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3431: TLS Server hello response with SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 28243 at Fri Jan 8 12:53:13 EST 2016 kill -USR1 28243 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28243 killed at Fri Jan 8 12:53:13 EST 2016 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9159 starting at Fri Jan 8 12:53:13 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:53:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:53:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3432: Waiting for Server - FAILED kill -0 28319 >/dev/null 2>/dev/null selfserv_9159 with PID 28319 found at Fri Jan 8 12:53:19 EST 2016 selfserv_9159 with PID 28319 started at Fri Jan 8 12:53:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3433: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 28319 at Fri Jan 8 12:53:20 EST 2016 kill -USR1 28319 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28319 killed at Fri Jan 8 12:53:20 EST 2016 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9159 starting at Fri Jan 8 12:53:20 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:53:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:53:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3434: Waiting for Server - FAILED kill -0 28394 >/dev/null 2>/dev/null selfserv_9159 with PID 28394 found at Fri Jan 8 12:53:26 EST 2016 selfserv_9159 with PID 28394 started at Fri Jan 8 12:53:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3435: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 28394 at Fri Jan 8 12:53:27 EST 2016 kill -USR1 28394 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28394 killed at Fri Jan 8 12:53:27 EST 2016 ssl.sh: TLS Server response with alert ---- selfserv_9159 starting at Fri Jan 8 12:53:27 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:53:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:53:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3436: Waiting for Server - FAILED kill -0 28469 >/dev/null 2>/dev/null selfserv_9159 with PID 28469 found at Fri Jan 8 12:53:33 EST 2016 selfserv_9159 with PID 28469 started at Fri Jan 8 12:53:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3437: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 28469 at Fri Jan 8 12:53:34 EST 2016 kill -USR1 28469 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28469 killed at Fri Jan 8 12:53:34 EST 2016 ssl.sh: SSL Cert Status (OCSP Stapling) - server fips/client normal - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status (non-FIPS only) ssl.sh: skipping OCSP stapling, signed response, revoked status (non-FIPS only) ssl.sh: skipping OCSP stapling, signed response, unknown status (non-FIPS only) ssl.sh: skipping OCSP stapling, unsigned failure response (non-FIPS only) ssl.sh: skipping OCSP stapling, good status, bad signature (non-FIPS only) ssl.sh: skipping OCSP stapling, invalid cert status data (non-FIPS only) ssl.sh: skipping Valid cert, Server doesn't staple (non-FIPS only) ssl.sh: skipping Stress OCSP stapling, server uses random status (non-FIPS only) ssl.sh: SSL Stress Test - server fips/client normal - with ECC =============================== ssl.sh: skipping -c_1000_-C_A Stress SSL2 RC4 128 with MD5 (non-FIPS only) ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9159 starting at Fri Jan 8 12:53:34 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:53:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:53:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3438: Waiting for Server - FAILED kill -0 28618 >/dev/null 2>/dev/null selfserv_9159 with PID 28618 found at Fri Jan 8 12:53:40 EST 2016 selfserv_9159 with PID 28618 started at Fri Jan 8 12:53:40 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -c 1000 -C c -V :ssl3 \ localhost.localdomain strsclnt started at Fri Jan 8 12:53:40 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:53:41 EST 2016 ssl.sh: #3439: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 28618 at Fri Jan 8 12:53:41 EST 2016 kill -USR1 28618 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28618 killed at Fri Jan 8 12:53:41 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9159 starting at Fri Jan 8 12:53:41 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:53:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:53:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3440: Waiting for Server - FAILED kill -0 28697 >/dev/null 2>/dev/null selfserv_9159 with PID 28697 found at Fri Jan 8 12:53:47 EST 2016 selfserv_9159 with PID 28697 started at Fri Jan 8 12:53:47 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Fri Jan 8 12:53:47 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:53:48 EST 2016 ssl.sh: #3441: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 28697 at Fri Jan 8 12:53:48 EST 2016 kill -USR1 28697 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28697 killed at Fri Jan 8 12:53:48 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9159 starting at Fri Jan 8 12:53:48 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:53:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:53:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3442: Waiting for Server - FAILED kill -0 28776 >/dev/null 2>/dev/null selfserv_9159 with PID 28776 found at Fri Jan 8 12:53:54 EST 2016 selfserv_9159 with PID 28776 started at Fri Jan 8 12:53:54 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Fri Jan 8 12:53:54 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:53:55 EST 2016 ssl.sh: #3443: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 28776 at Fri Jan 8 12:53:55 EST 2016 kill -USR1 28776 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28776 killed at Fri Jan 8 12:53:55 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9159 starting at Fri Jan 8 12:53:55 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:53:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:54:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3444: Waiting for Server - FAILED kill -0 28856 >/dev/null 2>/dev/null selfserv_9159 with PID 28856 found at Fri Jan 8 12:54:01 EST 2016 selfserv_9159 with PID 28856 started at Fri Jan 8 12:54:01 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 12:54:01 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:54:02 EST 2016 ssl.sh: #3445: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 28856 at Fri Jan 8 12:54:02 EST 2016 kill -USR1 28856 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28856 killed at Fri Jan 8 12:54:02 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9159 starting at Fri Jan 8 12:54:03 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:54:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:54:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3446: Waiting for Server - FAILED kill -0 28935 >/dev/null 2>/dev/null selfserv_9159 with PID 28935 found at Fri Jan 8 12:54:08 EST 2016 selfserv_9159 with PID 28935 started at Fri Jan 8 12:54:08 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Fri Jan 8 12:54:08 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:54:09 EST 2016 ssl.sh: #3447: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 28935 at Fri Jan 8 12:54:09 EST 2016 kill -USR1 28935 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28935 killed at Fri Jan 8 12:54:09 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9159 starting at Fri Jan 8 12:54:10 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:54:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:54:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3448: Waiting for Server - FAILED kill -0 29014 >/dev/null 2>/dev/null selfserv_9159 with PID 29014 found at Fri Jan 8 12:54:15 EST 2016 selfserv_9159 with PID 29014 started at Fri Jan 8 12:54:15 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 12:54:15 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:54:16 EST 2016 ssl.sh: #3449: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 29014 at Fri Jan 8 12:54:16 EST 2016 kill -USR1 29014 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 29014 killed at Fri Jan 8 12:54:16 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9159 starting at Fri Jan 8 12:54:17 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:54:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:54:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3450: Waiting for Server - FAILED kill -0 29094 >/dev/null 2>/dev/null selfserv_9159 with PID 29094 found at Fri Jan 8 12:54:22 EST 2016 selfserv_9159 with PID 29094 started at Fri Jan 8 12:54:22 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 12:54:23 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:54:23 EST 2016 ssl.sh: #3451: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 29094 at Fri Jan 8 12:54:23 EST 2016 kill -USR1 29094 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 29094 killed at Fri Jan 8 12:54:23 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9159 starting at Fri Jan 8 12:54:24 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:54:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:54:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3452: Waiting for Server - FAILED kill -0 29179 >/dev/null 2>/dev/null selfserv_9159 with PID 29179 found at Fri Jan 8 12:54:30 EST 2016 selfserv_9159 with PID 29179 started at Fri Jan 8 12:54:30 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 12:54:30 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:54:30 EST 2016 ssl.sh: #3453: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 29179 at Fri Jan 8 12:54:30 EST 2016 kill -USR1 29179 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 29179 killed at Fri Jan 8 12:54:31 EST 2016 ssl.sh: skipping -c_100_-C_A_-N_-n_TestUser Stress SSL2 RC4 128 with MD5 (no reuse, client auth) (non-FIPS only) ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:54:31 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:54:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:54:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3454: Waiting for Server - FAILED kill -0 29284 >/dev/null 2>/dev/null selfserv_9159 with PID 29284 found at Fri Jan 8 12:54:37 EST 2016 selfserv_9159 with PID 29284 started at Fri Jan 8 12:54:37 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -c 100 -C c -V :ssl3 -N -n TestUser \ localhost.localdomain strsclnt started at Fri Jan 8 12:54:37 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:54:37 EST 2016 ssl.sh: #3455: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 29284 at Fri Jan 8 12:54:37 EST 2016 kill -USR1 29284 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 29284 killed at Fri Jan 8 12:54:38 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:54:38 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:54:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:54:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3456: Waiting for Server - FAILED kill -0 29363 >/dev/null 2>/dev/null selfserv_9159 with PID 29363 found at Fri Jan 8 12:54:44 EST 2016 selfserv_9159 with PID 29363 started at Fri Jan 8 12:54:44 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Fri Jan 8 12:54:44 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:54:44 EST 2016 ssl.sh: #3457: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 29363 at Fri Jan 8 12:54:44 EST 2016 kill -USR1 29363 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 29363 killed at Fri Jan 8 12:54:45 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:54:45 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:54:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:54:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3458: Waiting for Server - FAILED kill -0 29442 >/dev/null 2>/dev/null selfserv_9159 with PID 29442 found at Fri Jan 8 12:54:51 EST 2016 selfserv_9159 with PID 29442 started at Fri Jan 8 12:54:51 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Fri Jan 8 12:54:51 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:54:51 EST 2016 ssl.sh: #3459: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 29442 at Fri Jan 8 12:54:51 EST 2016 kill -USR1 29442 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 29442 killed at Fri Jan 8 12:54:52 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:54:52 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:54:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:54:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3460: Waiting for Server - FAILED kill -0 29522 >/dev/null 2>/dev/null selfserv_9159 with PID 29522 found at Fri Jan 8 12:54:58 EST 2016 selfserv_9159 with PID 29522 started at Fri Jan 8 12:54:58 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Fri Jan 8 12:54:58 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:54:58 EST 2016 ssl.sh: #3461: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 29522 at Fri Jan 8 12:54:58 EST 2016 kill -USR1 29522 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 29522 killed at Fri Jan 8 12:54:59 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9159 starting at Fri Jan 8 12:54:59 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:54:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:55:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3462: Waiting for Server - FAILED kill -0 29601 >/dev/null 2>/dev/null selfserv_9159 with PID 29601 found at Fri Jan 8 12:55:05 EST 2016 selfserv_9159 with PID 29601 started at Fri Jan 8 12:55:05 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 12:55:05 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:55:05 EST 2016 ssl.sh: #3463: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 29601 at Fri Jan 8 12:55:05 EST 2016 kill -USR1 29601 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 29601 killed at Fri Jan 8 12:55:06 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:55:06 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:55:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:55:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3464: Waiting for Server - FAILED kill -0 29680 >/dev/null 2>/dev/null selfserv_9159 with PID 29680 found at Fri Jan 8 12:55:12 EST 2016 selfserv_9159 with PID 29680 started at Fri Jan 8 12:55:12 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 12:55:12 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:55:12 EST 2016 ssl.sh: #3465: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 29680 at Fri Jan 8 12:55:12 EST 2016 kill -USR1 29680 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 29680 killed at Fri Jan 8 12:55:13 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9159 starting at Fri Jan 8 12:55:13 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:55:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:55:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3466: Waiting for Server - FAILED kill -0 29760 >/dev/null 2>/dev/null selfserv_9159 with PID 29760 found at Fri Jan 8 12:55:19 EST 2016 selfserv_9159 with PID 29760 started at Fri Jan 8 12:55:19 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 12:55:19 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:55:19 EST 2016 ssl.sh: #3467: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 29760 at Fri Jan 8 12:55:19 EST 2016 kill -USR1 29760 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 29760 killed at Fri Jan 8 12:55:20 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9159 starting at Fri Jan 8 12:55:20 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:55:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:55:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3468: Waiting for Server - FAILED kill -0 29845 >/dev/null 2>/dev/null selfserv_9159 with PID 29845 found at Fri Jan 8 12:55:26 EST 2016 selfserv_9159 with PID 29845 started at Fri Jan 8 12:55:26 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 12:55:26 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:55:26 EST 2016 ssl.sh: #3469: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 29845 at Fri Jan 8 12:55:27 EST 2016 kill -USR1 29845 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 29845 killed at Fri Jan 8 12:55:27 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9159 starting at Fri Jan 8 12:55:27 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:55:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:55:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3470: Waiting for Server - FAILED kill -0 29930 >/dev/null 2>/dev/null selfserv_9159 with PID 29930 found at Fri Jan 8 12:55:33 EST 2016 selfserv_9159 with PID 29930 started at Fri Jan 8 12:55:33 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V tls1.0: -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Fri Jan 8 12:55:33 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:55:34 EST 2016 ssl.sh: #3471: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 29930 at Fri Jan 8 12:55:34 EST 2016 kill -USR1 29930 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 29930 killed at Fri Jan 8 12:55:34 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:55:34 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:55:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:55:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3472: Waiting for Server - FAILED kill -0 30031 >/dev/null 2>/dev/null selfserv_9159 with PID 30031 found at Fri Jan 8 12:55:40 EST 2016 selfserv_9159 with PID 30031 started at Fri Jan 8 12:55:40 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:55:40 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:55:41 EST 2016 ssl.sh: #3473: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 30031 at Fri Jan 8 12:55:41 EST 2016 kill -USR1 30031 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 30031 killed at Fri Jan 8 12:55:41 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:55:41 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:55:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:55:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3474: Waiting for Server - FAILED kill -0 30110 >/dev/null 2>/dev/null selfserv_9159 with PID 30110 found at Fri Jan 8 12:55:47 EST 2016 selfserv_9159 with PID 30110 started at Fri Jan 8 12:55:47 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:55:47 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:55:48 EST 2016 ssl.sh: #3475: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 30110 at Fri Jan 8 12:55:48 EST 2016 kill -USR1 30110 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 30110 killed at Fri Jan 8 12:55:48 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:55:48 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:55:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:55:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3476: Waiting for Server - FAILED kill -0 30189 >/dev/null 2>/dev/null selfserv_9159 with PID 30189 found at Fri Jan 8 12:55:54 EST 2016 selfserv_9159 with PID 30189 started at Fri Jan 8 12:55:54 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:55:54 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:55:55 EST 2016 ssl.sh: #3477: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 30189 at Fri Jan 8 12:55:55 EST 2016 kill -USR1 30189 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 30189 killed at Fri Jan 8 12:55:55 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:55:55 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:55:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:56:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3478: Waiting for Server - FAILED kill -0 30269 >/dev/null 2>/dev/null selfserv_9159 with PID 30269 found at Fri Jan 8 12:56:01 EST 2016 selfserv_9159 with PID 30269 started at Fri Jan 8 12:56:01 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:56:01 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:56:02 EST 2016 ssl.sh: #3479: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 30269 at Fri Jan 8 12:56:02 EST 2016 kill -USR1 30269 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 30269 killed at Fri Jan 8 12:56:02 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:56:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:56:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:56:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3480: Waiting for Server - FAILED kill -0 30348 >/dev/null 2>/dev/null selfserv_9159 with PID 30348 found at Fri Jan 8 12:56:08 EST 2016 selfserv_9159 with PID 30348 started at Fri Jan 8 12:56:08 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:56:08 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:56:09 EST 2016 ssl.sh: #3481: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 30348 at Fri Jan 8 12:56:09 EST 2016 kill -USR1 30348 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 30348 killed at Fri Jan 8 12:56:09 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9159 starting at Fri Jan 8 12:56:09 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:56:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:56:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3482: Waiting for Server - FAILED kill -0 30427 >/dev/null 2>/dev/null selfserv_9159 with PID 30427 found at Fri Jan 8 12:56:15 EST 2016 selfserv_9159 with PID 30427 started at Fri Jan 8 12:56:15 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Fri Jan 8 12:56:15 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:56:16 EST 2016 ssl.sh: #3483: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 30427 at Fri Jan 8 12:56:16 EST 2016 kill -USR1 30427 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 30427 killed at Fri Jan 8 12:56:16 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9159 starting at Fri Jan 8 12:56:16 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:56:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:56:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3484: Waiting for Server - FAILED kill -0 30507 >/dev/null 2>/dev/null selfserv_9159 with PID 30507 found at Fri Jan 8 12:56:22 EST 2016 selfserv_9159 with PID 30507 started at Fri Jan 8 12:56:22 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Fri Jan 8 12:56:22 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:56:23 EST 2016 ssl.sh: #3485: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 30507 at Fri Jan 8 12:56:23 EST 2016 kill -USR1 30507 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 30507 killed at Fri Jan 8 12:56:23 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9159 starting at Fri Jan 8 12:56:23 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:56:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:56:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3486: Waiting for Server - FAILED kill -0 30586 >/dev/null 2>/dev/null selfserv_9159 with PID 30586 found at Fri Jan 8 12:56:29 EST 2016 selfserv_9159 with PID 30586 started at Fri Jan 8 12:56:29 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Fri Jan 8 12:56:29 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:56:30 EST 2016 ssl.sh: #3487: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 30586 at Fri Jan 8 12:56:30 EST 2016 kill -USR1 30586 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 30586 killed at Fri Jan 8 12:56:30 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9159 starting at Fri Jan 8 12:56:30 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:56:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:56:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3488: Waiting for Server - FAILED kill -0 30665 >/dev/null 2>/dev/null selfserv_9159 with PID 30665 found at Fri Jan 8 12:56:36 EST 2016 selfserv_9159 with PID 30665 started at Fri Jan 8 12:56:36 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Fri Jan 8 12:56:36 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:56:37 EST 2016 ssl.sh: #3489: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 30665 at Fri Jan 8 12:56:37 EST 2016 kill -USR1 30665 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 30665 killed at Fri Jan 8 12:56:37 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9159 starting at Fri Jan 8 12:56:37 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:56:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:56:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3490: Waiting for Server - FAILED kill -0 30745 >/dev/null 2>/dev/null selfserv_9159 with PID 30745 found at Fri Jan 8 12:56:43 EST 2016 selfserv_9159 with PID 30745 started at Fri Jan 8 12:56:43 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Fri Jan 8 12:56:43 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:56:44 EST 2016 ssl.sh: #3491: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 30745 at Fri Jan 8 12:56:44 EST 2016 kill -USR1 30745 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 30745 killed at Fri Jan 8 12:56:44 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:56:45 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:56:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:56:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3492: Waiting for Server - FAILED kill -0 30845 >/dev/null 2>/dev/null selfserv_9159 with PID 30845 found at Fri Jan 8 12:56:50 EST 2016 selfserv_9159 with PID 30845 started at Fri Jan 8 12:56:50 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 10 -C :C009 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 12:56:51 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:56:51 EST 2016 ssl.sh: #3493: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 30845 at Fri Jan 8 12:56:51 EST 2016 kill -USR1 30845 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 30845 killed at Fri Jan 8 12:56:51 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:56:52 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:56:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:56:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3494: Waiting for Server - FAILED kill -0 30924 >/dev/null 2>/dev/null selfserv_9159 with PID 30924 found at Fri Jan 8 12:56:58 EST 2016 selfserv_9159 with PID 30924 started at Fri Jan 8 12:56:58 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 12:56:58 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:56:58 EST 2016 ssl.sh: #3495: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 30924 at Fri Jan 8 12:56:58 EST 2016 kill -USR1 30924 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 30924 killed at Fri Jan 8 12:56:59 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:56:59 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:56:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:57:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3496: Waiting for Server - FAILED kill -0 31004 >/dev/null 2>/dev/null selfserv_9159 with PID 31004 found at Fri Jan 8 12:57:05 EST 2016 selfserv_9159 with PID 31004 started at Fri Jan 8 12:57:05 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 10 -C :C004 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 12:57:05 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:57:05 EST 2016 ssl.sh: #3497: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 31004 at Fri Jan 8 12:57:05 EST 2016 kill -USR1 31004 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 31004 killed at Fri Jan 8 12:57:06 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:57:06 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:57:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:57:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3498: Waiting for Server - FAILED kill -0 31083 >/dev/null 2>/dev/null selfserv_9159 with PID 31083 found at Fri Jan 8 12:57:12 EST 2016 selfserv_9159 with PID 31083 started at Fri Jan 8 12:57:12 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 10 -C :C00E -N -n TestUser-ecmixed \ localhost.localdomain strsclnt started at Fri Jan 8 12:57:12 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:57:12 EST 2016 ssl.sh: #3499: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 31083 at Fri Jan 8 12:57:12 EST 2016 kill -USR1 31083 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 31083 killed at Fri Jan 8 12:57:13 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9159 starting at Fri Jan 8 12:57:13 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:57:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:57:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3500: Waiting for Server - FAILED kill -0 31162 >/dev/null 2>/dev/null selfserv_9159 with PID 31162 found at Fri Jan 8 12:57:19 EST 2016 selfserv_9159 with PID 31162 started at Fri Jan 8 12:57:19 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 12:57:19 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:57:19 EST 2016 ssl.sh: #3501: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 31162 at Fri Jan 8 12:57:19 EST 2016 kill -USR1 31162 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 31162 killed at Fri Jan 8 12:57:20 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:57:20 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:57:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:57:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3502: Waiting for Server - FAILED kill -0 31242 >/dev/null 2>/dev/null selfserv_9159 with PID 31242 found at Fri Jan 8 12:57:26 EST 2016 selfserv_9159 with PID 31242 started at Fri Jan 8 12:57:26 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \ localhost.localdomain strsclnt started at Fri Jan 8 12:57:26 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:57:26 EST 2016 ssl.sh: #3503: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 31242 at Fri Jan 8 12:57:26 EST 2016 kill -USR1 31242 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 31242 killed at Fri Jan 8 12:57:27 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:57:27 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:57:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:57:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3504: Waiting for Server - FAILED kill -0 31342 >/dev/null 2>/dev/null selfserv_9159 with PID 31342 found at Fri Jan 8 12:57:33 EST 2016 selfserv_9159 with PID 31342 started at Fri Jan 8 12:57:33 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:57:33 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:57:33 EST 2016 ssl.sh: #3505: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 31342 at Fri Jan 8 12:57:33 EST 2016 kill -USR1 31342 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 31342 killed at Fri Jan 8 12:57:34 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9159 starting at Fri Jan 8 12:57:34 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:57:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:57:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3506: Waiting for Server - FAILED kill -0 31421 >/dev/null 2>/dev/null selfserv_9159 with PID 31421 found at Fri Jan 8 12:57:40 EST 2016 selfserv_9159 with PID 31421 started at Fri Jan 8 12:57:40 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Fri Jan 8 12:57:40 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:57:40 EST 2016 ssl.sh: #3507: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 31421 at Fri Jan 8 12:57:40 EST 2016 kill -USR1 31421 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 31421 killed at Fri Jan 8 12:57:41 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:57:41 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:57:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:57:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3508: Waiting for Server - FAILED kill -0 31501 >/dev/null 2>/dev/null selfserv_9159 with PID 31501 found at Fri Jan 8 12:57:47 EST 2016 selfserv_9159 with PID 31501 started at Fri Jan 8 12:57:47 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:57:47 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:57:47 EST 2016 ssl.sh: #3509: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 31501 at Fri Jan 8 12:57:47 EST 2016 kill -USR1 31501 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 31501 killed at Fri Jan 8 12:57:48 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:57:48 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:57:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:57:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3510: Waiting for Server - FAILED kill -0 31580 >/dev/null 2>/dev/null selfserv_9159 with PID 31580 found at Fri Jan 8 12:57:54 EST 2016 selfserv_9159 with PID 31580 started at Fri Jan 8 12:57:54 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:57:54 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:57:54 EST 2016 ssl.sh: #3511: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 31580 at Fri Jan 8 12:57:54 EST 2016 kill -USR1 31580 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 31580 killed at Fri Jan 8 12:57:55 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:57:55 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:57:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:58:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3512: Waiting for Server - FAILED kill -0 31673 >/dev/null 2>/dev/null selfserv_9159 with PID 31673 found at Fri Jan 8 12:58:01 EST 2016 selfserv_9159 with PID 31673 started at Fri Jan 8 12:58:01 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:58:01 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:58:01 EST 2016 ssl.sh: #3513: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 31673 at Fri Jan 8 12:58:02 EST 2016 kill -USR1 31673 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 31673 killed at Fri Jan 8 12:58:02 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9159 starting at Fri Jan 8 12:58:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:58:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:58:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3514: Waiting for Server - FAILED kill -0 31767 >/dev/null 2>/dev/null selfserv_9159 with PID 31767 found at Fri Jan 8 12:58:08 EST 2016 selfserv_9159 with PID 31767 started at Fri Jan 8 12:58:08 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:58:08 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:58:09 EST 2016 ssl.sh: #3515: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 31767 at Fri Jan 8 12:58:09 EST 2016 kill -USR1 31767 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 31767 killed at Fri Jan 8 12:58:09 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:58:09 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:58:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:58:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3516: Waiting for Server - FAILED kill -0 31846 >/dev/null 2>/dev/null selfserv_9159 with PID 31846 found at Fri Jan 8 12:58:15 EST 2016 selfserv_9159 with PID 31846 started at Fri Jan 8 12:58:15 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:58:15 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:58:16 EST 2016 ssl.sh: #3517: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 31846 at Fri Jan 8 12:58:16 EST 2016 kill -USR1 31846 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 31846 killed at Fri Jan 8 12:58:16 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 12:58:16 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:58:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:58:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3518: Waiting for Server - FAILED kill -0 31925 >/dev/null 2>/dev/null selfserv_9159 with PID 31925 found at Fri Jan 8 12:58:22 EST 2016 selfserv_9159 with PID 31925 started at Fri Jan 8 12:58:22 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Fri Jan 8 12:58:22 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:58:23 EST 2016 ssl.sh: #3519: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 31925 at Fri Jan 8 12:58:23 EST 2016 kill -USR1 31925 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 31925 killed at Fri Jan 8 12:58:23 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:58:23 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:58:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:58:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3520: Waiting for Server - FAILED kill -0 32026 >/dev/null 2>/dev/null selfserv_9159 with PID 32026 found at Fri Jan 8 12:58:29 EST 2016 selfserv_9159 with PID 32026 started at Fri Jan 8 12:58:29 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :0032 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 12:58:29 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:58:30 EST 2016 ssl.sh: #3521: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 32026 at Fri Jan 8 12:58:30 EST 2016 kill -USR1 32026 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 32026 killed at Fri Jan 8 12:58:30 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9159 starting at Fri Jan 8 12:58:30 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:58:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:58:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3522: Waiting for Server - FAILED kill -0 32105 >/dev/null 2>/dev/null selfserv_9159 with PID 32105 found at Fri Jan 8 12:58:36 EST 2016 selfserv_9159 with PID 32105 started at Fri Jan 8 12:58:36 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 1000 -C :0067 -n TestUser-dsamixed \ localhost.localdomain strsclnt started at Fri Jan 8 12:58:36 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:58:37 EST 2016 ssl.sh: #3523: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 32105 at Fri Jan 8 12:58:37 EST 2016 kill -USR1 32105 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 32105 killed at Fri Jan 8 12:58:37 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 12:58:37 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:58:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:58:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3524: Waiting for Server - FAILED kill -0 32199 >/dev/null 2>/dev/null selfserv_9159 with PID 32199 found at Fri Jan 8 12:58:43 EST 2016 selfserv_9159 with PID 32199 started at Fri Jan 8 12:58:43 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 1000 -C :00A2 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 12:58:43 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 12:58:44 EST 2016 ssl.sh: #3525: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 32199 at Fri Jan 8 12:58:44 EST 2016 kill -USR1 32199 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 32199 killed at Fri Jan 8 12:58:44 EST 2016 ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal - with ECC =============================== selfserv_9159 starting at Fri Jan 8 12:58:44 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:58:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:58:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3526: Waiting for Server - FAILED kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:58:50 EST 2016 selfserv_9159 with PID 32265 started at Fri Jan 8 12:58:50 EST 2016 ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping A SSL2_RC4_128_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping B SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping C SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping D SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping E SSL2_DES_64_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping F SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping B SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping C SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping E SSL2_DES_64_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:58:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3527: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:58:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3528: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:58:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3529: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping f SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping g SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:58:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3530: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:58:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3531: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:58:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3532: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping l SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping m SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:58:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3533: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:58:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3534: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:58:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3535: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:58:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3536: SSL3_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:58:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3537: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:58:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3538: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:58:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3539: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:58:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3540: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:58:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3541: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:58:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3542: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping f TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping g TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3543: TLS_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3544: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3545: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping l TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping m TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3546: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3547: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3548: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3549: TLS_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3550: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3551: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3552: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping f TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping g TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3553: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3554: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3555: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping l TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping m TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3556: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3557: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3558: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3559: TLS11_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3560: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3561: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3562: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3563: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3564: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3565: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping l TLS12_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping m TLS12_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3566: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3567: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3568: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3569: TLS12_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3570: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3571: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3572: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3573: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3574: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3575: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3576: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3577: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3578: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3579: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3580: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3581: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3582: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3583: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3584: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3585: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3586: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3587: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3588: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3589: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3590: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3591: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3592: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3593: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 32265 >/dev/null 2>/dev/null selfserv_9159 with PID 32265 found at Fri Jan 8 12:59:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3594: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 32265 at Fri Jan 8 12:59:27 EST 2016 kill -USR1 32265 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 32265 killed at Fri Jan 8 12:59:28 EST 2016 ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 12:59:28 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:59:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:59:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3595: Waiting for Server - FAILED kill -0 1857 >/dev/null 2>/dev/null selfserv_9159 with PID 1857 found at Fri Jan 8 12:59:34 EST 2016 selfserv_9159 with PID 1857 started at Fri Jan 8 12:59:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3596: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 1857 >/dev/null 2>/dev/null selfserv_9159 with PID 1857 found at Fri Jan 8 12:59:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3597: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 1857 >/dev/null 2>/dev/null selfserv_9159 with PID 1857 found at Fri Jan 8 12:59:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3598: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 1857 >/dev/null 2>/dev/null selfserv_9159 with PID 1857 found at Fri Jan 8 12:59:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3599: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 1857 >/dev/null 2>/dev/null selfserv_9159 with PID 1857 found at Fri Jan 8 12:59:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3600: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 1857 at Fri Jan 8 12:59:36 EST 2016 kill -USR1 1857 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1857 killed at Fri Jan 8 12:59:37 EST 2016 ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 12:59:37 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:59:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:59:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3601: Waiting for Server - FAILED kill -0 2022 >/dev/null 2>/dev/null selfserv_9159 with PID 2022 found at Fri Jan 8 12:59:43 EST 2016 selfserv_9159 with PID 2022 started at Fri Jan 8 12:59:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3602: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 2022 >/dev/null 2>/dev/null selfserv_9159 with PID 2022 found at Fri Jan 8 12:59:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3603: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 2022 >/dev/null 2>/dev/null selfserv_9159 with PID 2022 found at Fri Jan 8 12:59:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3604: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 2022 >/dev/null 2>/dev/null selfserv_9159 with PID 2022 found at Fri Jan 8 12:59:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3605: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 2022 >/dev/null 2>/dev/null selfserv_9159 with PID 2022 found at Fri Jan 8 12:59:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3606: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 2022 >/dev/null 2>/dev/null selfserv_9159 with PID 2022 found at Fri Jan 8 12:59:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3607: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 2022 >/dev/null 2>/dev/null selfserv_9159 with PID 2022 found at Fri Jan 8 12:59:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3608: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 2022 >/dev/null 2>/dev/null selfserv_9159 with PID 2022 found at Fri Jan 8 12:59:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3609: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 2022 >/dev/null 2>/dev/null selfserv_9159 with PID 2022 found at Fri Jan 8 12:59:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3610: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 2022 >/dev/null 2>/dev/null selfserv_9159 with PID 2022 found at Fri Jan 8 12:59:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3611: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 2022 >/dev/null 2>/dev/null selfserv_9159 with PID 2022 found at Fri Jan 8 12:59:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3612: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 2022 >/dev/null 2>/dev/null selfserv_9159 with PID 2022 found at Fri Jan 8 12:59:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3613: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 2022 >/dev/null 2>/dev/null selfserv_9159 with PID 2022 found at Fri Jan 8 12:59:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3614: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 2022 >/dev/null 2>/dev/null selfserv_9159 with PID 2022 found at Fri Jan 8 12:59:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3615: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 2022 >/dev/null 2>/dev/null selfserv_9159 with PID 2022 found at Fri Jan 8 12:59:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3616: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 2022 at Fri Jan 8 12:59:50 EST 2016 kill -USR1 2022 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2022 killed at Fri Jan 8 12:59:51 EST 2016 ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 12:59:51 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 12:59:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 12:59:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3617: Waiting for Server - FAILED kill -0 2436 >/dev/null 2>/dev/null selfserv_9159 with PID 2436 found at Fri Jan 8 12:59:57 EST 2016 selfserv_9159 with PID 2436 started at Fri Jan 8 12:59:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3618: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 2436 >/dev/null 2>/dev/null selfserv_9159 with PID 2436 found at Fri Jan 8 12:59:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3619: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 2436 >/dev/null 2>/dev/null selfserv_9159 with PID 2436 found at Fri Jan 8 12:59:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3620: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 2436 >/dev/null 2>/dev/null selfserv_9159 with PID 2436 found at Fri Jan 8 12:59:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3621: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 2436 >/dev/null 2>/dev/null selfserv_9159 with PID 2436 found at Fri Jan 8 12:59:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3622: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 2436 at Fri Jan 8 12:59:59 EST 2016 kill -USR1 2436 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2436 killed at Fri Jan 8 13:00:00 EST 2016 ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 13:00:00 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:00:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:00:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3623: Waiting for Server - FAILED kill -0 2602 >/dev/null 2>/dev/null selfserv_9159 with PID 2602 found at Fri Jan 8 13:00:06 EST 2016 selfserv_9159 with PID 2602 started at Fri Jan 8 13:00:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3624: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 2602 >/dev/null 2>/dev/null selfserv_9159 with PID 2602 found at Fri Jan 8 13:00:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3625: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 2602 >/dev/null 2>/dev/null selfserv_9159 with PID 2602 found at Fri Jan 8 13:00:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3626: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 2602 >/dev/null 2>/dev/null selfserv_9159 with PID 2602 found at Fri Jan 8 13:00:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3627: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 2602 >/dev/null 2>/dev/null selfserv_9159 with PID 2602 found at Fri Jan 8 13:00:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3628: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 2602 >/dev/null 2>/dev/null selfserv_9159 with PID 2602 found at Fri Jan 8 13:00:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3629: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 2602 >/dev/null 2>/dev/null selfserv_9159 with PID 2602 found at Fri Jan 8 13:00:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3630: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 2602 >/dev/null 2>/dev/null selfserv_9159 with PID 2602 found at Fri Jan 8 13:00:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3631: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 2602 >/dev/null 2>/dev/null selfserv_9159 with PID 2602 found at Fri Jan 8 13:00:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3632: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 2602 >/dev/null 2>/dev/null selfserv_9159 with PID 2602 found at Fri Jan 8 13:00:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3633: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 2602 >/dev/null 2>/dev/null selfserv_9159 with PID 2602 found at Fri Jan 8 13:00:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3634: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 2602 >/dev/null 2>/dev/null selfserv_9159 with PID 2602 found at Fri Jan 8 13:00:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3635: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 2602 >/dev/null 2>/dev/null selfserv_9159 with PID 2602 found at Fri Jan 8 13:00:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3636: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 2602 >/dev/null 2>/dev/null selfserv_9159 with PID 2602 found at Fri Jan 8 13:00:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3637: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 2602 >/dev/null 2>/dev/null selfserv_9159 with PID 2602 found at Fri Jan 8 13:00:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3638: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 2602 at Fri Jan 8 13:00:14 EST 2016 kill -USR1 2602 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2602 killed at Fri Jan 8 13:00:14 EST 2016 ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 13:00:14 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:00:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:00:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3639: Waiting for Server - FAILED kill -0 3016 >/dev/null 2>/dev/null selfserv_9159 with PID 3016 found at Fri Jan 8 13:00:20 EST 2016 selfserv_9159 with PID 3016 started at Fri Jan 8 13:00:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3640: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 3016 >/dev/null 2>/dev/null selfserv_9159 with PID 3016 found at Fri Jan 8 13:00:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3641: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 3016 >/dev/null 2>/dev/null selfserv_9159 with PID 3016 found at Fri Jan 8 13:00:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3642: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 3016 >/dev/null 2>/dev/null selfserv_9159 with PID 3016 found at Fri Jan 8 13:00:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3643: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 3016 >/dev/null 2>/dev/null selfserv_9159 with PID 3016 found at Fri Jan 8 13:00:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3644: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 3016 at Fri Jan 8 13:00:23 EST 2016 kill -USR1 3016 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3016 killed at Fri Jan 8 13:00:23 EST 2016 ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 13:00:23 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:00:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:00:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3645: Waiting for Server - FAILED kill -0 3182 >/dev/null 2>/dev/null selfserv_9159 with PID 3182 found at Fri Jan 8 13:00:29 EST 2016 selfserv_9159 with PID 3182 started at Fri Jan 8 13:00:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3646: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 3182 >/dev/null 2>/dev/null selfserv_9159 with PID 3182 found at Fri Jan 8 13:00:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3647: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 3182 >/dev/null 2>/dev/null selfserv_9159 with PID 3182 found at Fri Jan 8 13:00:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3648: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 3182 >/dev/null 2>/dev/null selfserv_9159 with PID 3182 found at Fri Jan 8 13:00:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3649: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 3182 >/dev/null 2>/dev/null selfserv_9159 with PID 3182 found at Fri Jan 8 13:00:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3650: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 3182 >/dev/null 2>/dev/null selfserv_9159 with PID 3182 found at Fri Jan 8 13:00:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3651: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 3182 >/dev/null 2>/dev/null selfserv_9159 with PID 3182 found at Fri Jan 8 13:00:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3652: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 3182 >/dev/null 2>/dev/null selfserv_9159 with PID 3182 found at Fri Jan 8 13:00:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3653: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 3182 >/dev/null 2>/dev/null selfserv_9159 with PID 3182 found at Fri Jan 8 13:00:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3654: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 3182 >/dev/null 2>/dev/null selfserv_9159 with PID 3182 found at Fri Jan 8 13:00:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3655: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 3182 >/dev/null 2>/dev/null selfserv_9159 with PID 3182 found at Fri Jan 8 13:00:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3656: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 3182 >/dev/null 2>/dev/null selfserv_9159 with PID 3182 found at Fri Jan 8 13:00:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3657: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 3182 >/dev/null 2>/dev/null selfserv_9159 with PID 3182 found at Fri Jan 8 13:00:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3658: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 3182 at Fri Jan 8 13:00:36 EST 2016 kill -USR1 3182 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3182 killed at Fri Jan 8 13:00:36 EST 2016 ssl.sh: SSL Client Authentication Extended Test - server fips/client normal - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 13:00:37 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:00:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:00:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3659: Waiting for Server - FAILED kill -0 3589 >/dev/null 2>/dev/null selfserv_9159 with PID 3589 found at Fri Jan 8 13:00:42 EST 2016 selfserv_9159 with PID 3589 started at Fri Jan 8 13:00:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3660: TLS Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 3589 at Fri Jan 8 13:00:43 EST 2016 kill -USR1 3589 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3589 killed at Fri Jan 8 13:00:43 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:00:43 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:00:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:00:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3661: Waiting for Server - FAILED kill -0 3659 >/dev/null 2>/dev/null selfserv_9159 with PID 3659 found at Fri Jan 8 13:00:49 EST 2016 selfserv_9159 with PID 3659 started at Fri Jan 8 13:00:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3662: TLS Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 3659 at Fri Jan 8 13:00:50 EST 2016 kill -USR1 3659 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3659 killed at Fri Jan 8 13:00:50 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:00:50 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:00:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:00:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3663: Waiting for Server - FAILED kill -0 3728 >/dev/null 2>/dev/null selfserv_9159 with PID 3728 found at Fri Jan 8 13:00:56 EST 2016 selfserv_9159 with PID 3728 started at Fri Jan 8 13:00:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3664: TLS Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 3728 at Fri Jan 8 13:00:57 EST 2016 kill -USR1 3728 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3728 killed at Fri Jan 8 13:00:57 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 13:00:57 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:00:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:01:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3665: Waiting for Server - FAILED kill -0 3797 >/dev/null 2>/dev/null selfserv_9159 with PID 3797 found at Fri Jan 8 13:01:03 EST 2016 selfserv_9159 with PID 3797 started at Fri Jan 8 13:01:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3666: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 3797 at Fri Jan 8 13:01:04 EST 2016 kill -USR1 3797 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3797 killed at Fri Jan 8 13:01:04 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:01:04 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:01:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:01:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3667: Waiting for Server - FAILED kill -0 3881 >/dev/null 2>/dev/null selfserv_9159 with PID 3881 found at Fri Jan 8 13:01:10 EST 2016 selfserv_9159 with PID 3881 started at Fri Jan 8 13:01:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3668: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 3881 at Fri Jan 8 13:01:11 EST 2016 kill -USR1 3881 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3881 killed at Fri Jan 8 13:01:11 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:01:11 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:01:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:01:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3669: Waiting for Server - FAILED kill -0 3950 >/dev/null 2>/dev/null selfserv_9159 with PID 3950 found at Fri Jan 8 13:01:17 EST 2016 selfserv_9159 with PID 3950 started at Fri Jan 8 13:01:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3670: TLS Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 3950 at Fri Jan 8 13:01:18 EST 2016 kill -USR1 3950 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3950 killed at Fri Jan 8 13:01:18 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 13:01:18 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:01:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:01:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3671: Waiting for Server - FAILED kill -0 4020 >/dev/null 2>/dev/null selfserv_9159 with PID 4020 found at Fri Jan 8 13:01:24 EST 2016 selfserv_9159 with PID 4020 started at Fri Jan 8 13:01:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3672: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4020 at Fri Jan 8 13:01:24 EST 2016 kill -USR1 4020 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4020 killed at Fri Jan 8 13:01:25 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:01:25 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:01:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:01:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3673: Waiting for Server - FAILED kill -0 4090 >/dev/null 2>/dev/null selfserv_9159 with PID 4090 found at Fri Jan 8 13:01:31 EST 2016 selfserv_9159 with PID 4090 started at Fri Jan 8 13:01:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3674: SSL3 Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4090 at Fri Jan 8 13:01:31 EST 2016 kill -USR1 4090 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4090 killed at Fri Jan 8 13:01:32 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:01:32 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:01:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:01:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3675: Waiting for Server - FAILED kill -0 4159 >/dev/null 2>/dev/null selfserv_9159 with PID 4159 found at Fri Jan 8 13:01:38 EST 2016 selfserv_9159 with PID 4159 started at Fri Jan 8 13:01:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3676: SSL3 Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4159 at Fri Jan 8 13:01:38 EST 2016 kill -USR1 4159 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4159 killed at Fri Jan 8 13:01:39 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 13:01:39 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:01:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:01:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3677: Waiting for Server - FAILED kill -0 4228 >/dev/null 2>/dev/null selfserv_9159 with PID 4228 found at Fri Jan 8 13:01:45 EST 2016 selfserv_9159 with PID 4228 started at Fri Jan 8 13:01:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3678: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 4228 at Fri Jan 8 13:01:45 EST 2016 kill -USR1 4228 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4228 killed at Fri Jan 8 13:01:46 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:01:46 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:01:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:01:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3679: Waiting for Server - FAILED kill -0 4299 >/dev/null 2>/dev/null selfserv_9159 with PID 4299 found at Fri Jan 8 13:01:52 EST 2016 selfserv_9159 with PID 4299 started at Fri Jan 8 13:01:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3680: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 4299 at Fri Jan 8 13:01:52 EST 2016 kill -USR1 4299 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4299 killed at Fri Jan 8 13:01:53 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:01:53 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:01:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:01:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3681: Waiting for Server - FAILED kill -0 4369 >/dev/null 2>/dev/null selfserv_9159 with PID 4369 found at Fri Jan 8 13:01:59 EST 2016 selfserv_9159 with PID 4369 started at Fri Jan 8 13:01:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3682: SSL3 Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4369 at Fri Jan 8 13:01:59 EST 2016 kill -USR1 4369 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4369 killed at Fri Jan 8 13:01:59 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 13:02:00 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:02:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:02:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3683: Waiting for Server - FAILED kill -0 4438 >/dev/null 2>/dev/null selfserv_9159 with PID 4438 found at Fri Jan 8 13:02:05 EST 2016 selfserv_9159 with PID 4438 started at Fri Jan 8 13:02:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3684: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4438 at Fri Jan 8 13:02:06 EST 2016 kill -USR1 4438 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4438 killed at Fri Jan 8 13:02:06 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:02:06 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:02:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:02:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3685: Waiting for Server - FAILED kill -0 4508 >/dev/null 2>/dev/null selfserv_9159 with PID 4508 found at Fri Jan 8 13:02:12 EST 2016 selfserv_9159 with PID 4508 started at Fri Jan 8 13:02:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3686: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4508 at Fri Jan 8 13:02:13 EST 2016 kill -USR1 4508 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4508 killed at Fri Jan 8 13:02:13 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:02:13 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:02:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:02:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3687: Waiting for Server - FAILED kill -0 4578 >/dev/null 2>/dev/null selfserv_9159 with PID 4578 found at Fri Jan 8 13:02:19 EST 2016 selfserv_9159 with PID 4578 started at Fri Jan 8 13:02:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3688: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4578 at Fri Jan 8 13:02:20 EST 2016 kill -USR1 4578 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4578 killed at Fri Jan 8 13:02:20 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 13:02:20 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:02:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:02:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3689: Waiting for Server - FAILED kill -0 4647 >/dev/null 2>/dev/null selfserv_9159 with PID 4647 found at Fri Jan 8 13:02:26 EST 2016 selfserv_9159 with PID 4647 started at Fri Jan 8 13:02:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3690: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 4647 at Fri Jan 8 13:02:27 EST 2016 kill -USR1 4647 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4647 killed at Fri Jan 8 13:02:27 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:02:27 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:02:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:02:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3691: Waiting for Server - FAILED kill -0 4717 >/dev/null 2>/dev/null selfserv_9159 with PID 4717 found at Fri Jan 8 13:02:33 EST 2016 selfserv_9159 with PID 4717 started at Fri Jan 8 13:02:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3692: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 4717 at Fri Jan 8 13:02:34 EST 2016 kill -USR1 4717 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4717 killed at Fri Jan 8 13:02:34 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:02:34 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:02:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:02:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3693: Waiting for Server - FAILED kill -0 4786 >/dev/null 2>/dev/null selfserv_9159 with PID 4786 found at Fri Jan 8 13:02:40 EST 2016 selfserv_9159 with PID 4786 started at Fri Jan 8 13:02:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3694: TLS Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4786 at Fri Jan 8 13:02:41 EST 2016 kill -USR1 4786 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4786 killed at Fri Jan 8 13:02:41 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 13:02:41 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:02:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:02:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3695: Waiting for Server - FAILED kill -0 4855 >/dev/null 2>/dev/null selfserv_9159 with PID 4855 found at Fri Jan 8 13:02:47 EST 2016 selfserv_9159 with PID 4855 started at Fri Jan 8 13:02:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3696: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4855 at Fri Jan 8 13:02:47 EST 2016 kill -USR1 4855 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4855 killed at Fri Jan 8 13:02:48 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:02:48 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:02:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:02:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3697: Waiting for Server - FAILED kill -0 4925 >/dev/null 2>/dev/null selfserv_9159 with PID 4925 found at Fri Jan 8 13:02:54 EST 2016 selfserv_9159 with PID 4925 started at Fri Jan 8 13:02:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3698: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4925 at Fri Jan 8 13:02:54 EST 2016 kill -USR1 4925 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4925 killed at Fri Jan 8 13:02:55 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:02:55 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:02:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:03:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3699: Waiting for Server - FAILED kill -0 4994 >/dev/null 2>/dev/null selfserv_9159 with PID 4994 found at Fri Jan 8 13:03:01 EST 2016 selfserv_9159 with PID 4994 started at Fri Jan 8 13:03:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3700: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4994 at Fri Jan 8 13:03:01 EST 2016 kill -USR1 4994 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4994 killed at Fri Jan 8 13:03:02 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 13:03:02 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:03:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:03:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3701: Waiting for Server - FAILED kill -0 5063 >/dev/null 2>/dev/null selfserv_9159 with PID 5063 found at Fri Jan 8 13:03:08 EST 2016 selfserv_9159 with PID 5063 started at Fri Jan 8 13:03:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3702: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 5063 at Fri Jan 8 13:03:08 EST 2016 kill -USR1 5063 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5063 killed at Fri Jan 8 13:03:09 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:03:09 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:03:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:03:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3703: Waiting for Server - FAILED kill -0 5133 >/dev/null 2>/dev/null selfserv_9159 with PID 5133 found at Fri Jan 8 13:03:15 EST 2016 selfserv_9159 with PID 5133 started at Fri Jan 8 13:03:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3704: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 5133 at Fri Jan 8 13:03:15 EST 2016 kill -USR1 5133 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5133 killed at Fri Jan 8 13:03:16 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:03:16 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:03:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:03:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3705: Waiting for Server - FAILED kill -0 5202 >/dev/null 2>/dev/null selfserv_9159 with PID 5202 found at Fri Jan 8 13:03:22 EST 2016 selfserv_9159 with PID 5202 started at Fri Jan 8 13:03:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3706: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 5202 at Fri Jan 8 13:03:22 EST 2016 kill -USR1 5202 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5202 killed at Fri Jan 8 13:03:22 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 13:03:23 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:03:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:03:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3707: Waiting for Server - FAILED kill -0 5271 >/dev/null 2>/dev/null selfserv_9159 with PID 5271 found at Fri Jan 8 13:03:28 EST 2016 selfserv_9159 with PID 5271 started at Fri Jan 8 13:03:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3708: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 5271 at Fri Jan 8 13:03:29 EST 2016 kill -USR1 5271 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5271 killed at Fri Jan 8 13:03:29 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:03:29 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:03:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:03:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3709: Waiting for Server - FAILED kill -0 5341 >/dev/null 2>/dev/null selfserv_9159 with PID 5341 found at Fri Jan 8 13:03:35 EST 2016 selfserv_9159 with PID 5341 started at Fri Jan 8 13:03:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3710: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 5341 at Fri Jan 8 13:03:36 EST 2016 kill -USR1 5341 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5341 killed at Fri Jan 8 13:03:36 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:03:36 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:03:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:03:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3711: Waiting for Server - FAILED kill -0 5410 >/dev/null 2>/dev/null selfserv_9159 with PID 5410 found at Fri Jan 8 13:03:42 EST 2016 selfserv_9159 with PID 5410 started at Fri Jan 8 13:03:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3712: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 5410 at Fri Jan 8 13:03:43 EST 2016 kill -USR1 5410 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5410 killed at Fri Jan 8 13:03:43 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 13:03:43 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:03:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:03:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3713: Waiting for Server - FAILED kill -0 5479 >/dev/null 2>/dev/null selfserv_9159 with PID 5479 found at Fri Jan 8 13:03:49 EST 2016 selfserv_9159 with PID 5479 started at Fri Jan 8 13:03:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3714: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 5479 at Fri Jan 8 13:03:50 EST 2016 kill -USR1 5479 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5479 killed at Fri Jan 8 13:03:50 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:03:50 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:03:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:03:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3715: Waiting for Server - FAILED kill -0 5549 >/dev/null 2>/dev/null selfserv_9159 with PID 5549 found at Fri Jan 8 13:03:56 EST 2016 selfserv_9159 with PID 5549 started at Fri Jan 8 13:03:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3716: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 5549 at Fri Jan 8 13:03:57 EST 2016 kill -USR1 5549 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5549 killed at Fri Jan 8 13:03:57 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:03:57 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:03:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:04:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3717: Waiting for Server - FAILED kill -0 5618 >/dev/null 2>/dev/null selfserv_9159 with PID 5618 found at Fri Jan 8 13:04:03 EST 2016 selfserv_9159 with PID 5618 started at Fri Jan 8 13:04:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3718: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 5618 at Fri Jan 8 13:04:04 EST 2016 kill -USR1 5618 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5618 killed at Fri Jan 8 13:04:04 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:04:04 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:04:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:04:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3719: Waiting for Server - FAILED kill -0 5702 >/dev/null 2>/dev/null selfserv_9159 with PID 5702 found at Fri Jan 8 13:04:10 EST 2016 selfserv_9159 with PID 5702 started at Fri Jan 8 13:04:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3720: TLS Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 5702 at Fri Jan 8 13:04:11 EST 2016 kill -USR1 5702 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5702 killed at Fri Jan 8 13:04:11 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:04:11 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:04:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:04:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3721: Waiting for Server - FAILED kill -0 5772 >/dev/null 2>/dev/null selfserv_9159 with PID 5772 found at Fri Jan 8 13:04:17 EST 2016 selfserv_9159 with PID 5772 started at Fri Jan 8 13:04:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3722: TLS Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 5772 at Fri Jan 8 13:04:17 EST 2016 kill -USR1 5772 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5772 killed at Fri Jan 8 13:04:18 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:04:18 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:04:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:04:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3723: Waiting for Server - FAILED kill -0 5841 >/dev/null 2>/dev/null selfserv_9159 with PID 5841 found at Fri Jan 8 13:04:24 EST 2016 selfserv_9159 with PID 5841 started at Fri Jan 8 13:04:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3724: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 5841 at Fri Jan 8 13:04:24 EST 2016 kill -USR1 5841 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5841 killed at Fri Jan 8 13:04:25 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:04:25 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:04:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:04:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3725: Waiting for Server - FAILED kill -0 5910 >/dev/null 2>/dev/null selfserv_9159 with PID 5910 found at Fri Jan 8 13:04:31 EST 2016 selfserv_9159 with PID 5910 started at Fri Jan 8 13:04:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3726: TLS Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 5910 at Fri Jan 8 13:04:31 EST 2016 kill -USR1 5910 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5910 killed at Fri Jan 8 13:04:32 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:04:32 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:04:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:04:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3727: Waiting for Server - FAILED kill -0 5980 >/dev/null 2>/dev/null selfserv_9159 with PID 5980 found at Fri Jan 8 13:04:38 EST 2016 selfserv_9159 with PID 5980 started at Fri Jan 8 13:04:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3728: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 5980 at Fri Jan 8 13:04:38 EST 2016 kill -USR1 5980 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5980 killed at Fri Jan 8 13:04:39 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:04:39 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:04:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:04:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3729: Waiting for Server - FAILED kill -0 6049 >/dev/null 2>/dev/null selfserv_9159 with PID 6049 found at Fri Jan 8 13:04:45 EST 2016 selfserv_9159 with PID 6049 started at Fri Jan 8 13:04:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3730: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 6049 at Fri Jan 8 13:04:45 EST 2016 kill -USR1 6049 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6049 killed at Fri Jan 8 13:04:46 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:04:46 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:04:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:04:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3731: Waiting for Server - FAILED kill -0 6118 >/dev/null 2>/dev/null selfserv_9159 with PID 6118 found at Fri Jan 8 13:04:52 EST 2016 selfserv_9159 with PID 6118 started at Fri Jan 8 13:04:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3732: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 6118 at Fri Jan 8 13:04:52 EST 2016 kill -USR1 6118 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6118 killed at Fri Jan 8 13:04:52 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:04:53 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:04:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:04:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3733: Waiting for Server - FAILED kill -0 6188 >/dev/null 2>/dev/null selfserv_9159 with PID 6188 found at Fri Jan 8 13:04:58 EST 2016 selfserv_9159 with PID 6188 started at Fri Jan 8 13:04:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3734: SSL3 Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 6188 at Fri Jan 8 13:04:59 EST 2016 kill -USR1 6188 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6188 killed at Fri Jan 8 13:04:59 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:04:59 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:04:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:05:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3735: Waiting for Server - FAILED kill -0 6257 >/dev/null 2>/dev/null selfserv_9159 with PID 6257 found at Fri Jan 8 13:05:05 EST 2016 selfserv_9159 with PID 6257 started at Fri Jan 8 13:05:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3736: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 6257 at Fri Jan 8 13:05:06 EST 2016 kill -USR1 6257 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6257 killed at Fri Jan 8 13:05:06 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:05:06 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:05:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:05:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3737: Waiting for Server - FAILED kill -0 6326 >/dev/null 2>/dev/null selfserv_9159 with PID 6326 found at Fri Jan 8 13:05:12 EST 2016 selfserv_9159 with PID 6326 started at Fri Jan 8 13:05:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3738: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 6326 at Fri Jan 8 13:05:13 EST 2016 kill -USR1 6326 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6326 killed at Fri Jan 8 13:05:13 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:05:13 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:05:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:05:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3739: Waiting for Server - FAILED kill -0 6396 >/dev/null 2>/dev/null selfserv_9159 with PID 6396 found at Fri Jan 8 13:05:19 EST 2016 selfserv_9159 with PID 6396 started at Fri Jan 8 13:05:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3740: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 6396 at Fri Jan 8 13:05:20 EST 2016 kill -USR1 6396 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6396 killed at Fri Jan 8 13:05:20 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:05:20 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:05:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:05:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3741: Waiting for Server - FAILED kill -0 6466 >/dev/null 2>/dev/null selfserv_9159 with PID 6466 found at Fri Jan 8 13:05:26 EST 2016 selfserv_9159 with PID 6466 started at Fri Jan 8 13:05:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3742: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 6466 at Fri Jan 8 13:05:27 EST 2016 kill -USR1 6466 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6466 killed at Fri Jan 8 13:05:27 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:05:27 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:05:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:05:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3743: Waiting for Server - FAILED kill -0 6535 >/dev/null 2>/dev/null selfserv_9159 with PID 6535 found at Fri Jan 8 13:05:33 EST 2016 selfserv_9159 with PID 6535 started at Fri Jan 8 13:05:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3744: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 6535 at Fri Jan 8 13:05:34 EST 2016 kill -USR1 6535 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6535 killed at Fri Jan 8 13:05:34 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:05:34 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:05:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:05:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3745: Waiting for Server - FAILED kill -0 6605 >/dev/null 2>/dev/null selfserv_9159 with PID 6605 found at Fri Jan 8 13:05:40 EST 2016 selfserv_9159 with PID 6605 started at Fri Jan 8 13:05:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3746: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 6605 at Fri Jan 8 13:05:40 EST 2016 kill -USR1 6605 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6605 killed at Fri Jan 8 13:05:41 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:05:41 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:05:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:05:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3747: Waiting for Server - FAILED kill -0 6674 >/dev/null 2>/dev/null selfserv_9159 with PID 6674 found at Fri Jan 8 13:05:47 EST 2016 selfserv_9159 with PID 6674 started at Fri Jan 8 13:05:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3748: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 6674 at Fri Jan 8 13:05:47 EST 2016 kill -USR1 6674 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6674 killed at Fri Jan 8 13:05:48 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:05:48 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:05:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:05:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3749: Waiting for Server - FAILED kill -0 6743 >/dev/null 2>/dev/null selfserv_9159 with PID 6743 found at Fri Jan 8 13:05:54 EST 2016 selfserv_9159 with PID 6743 started at Fri Jan 8 13:05:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3750: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 6743 at Fri Jan 8 13:05:54 EST 2016 kill -USR1 6743 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6743 killed at Fri Jan 8 13:05:55 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:05:55 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:05:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:06:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3751: Waiting for Server - FAILED kill -0 6813 >/dev/null 2>/dev/null selfserv_9159 with PID 6813 found at Fri Jan 8 13:06:01 EST 2016 selfserv_9159 with PID 6813 started at Fri Jan 8 13:06:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3752: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 6813 at Fri Jan 8 13:06:01 EST 2016 kill -USR1 6813 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6813 killed at Fri Jan 8 13:06:02 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:06:02 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:06:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:06:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3753: Waiting for Server - FAILED kill -0 6882 >/dev/null 2>/dev/null selfserv_9159 with PID 6882 found at Fri Jan 8 13:06:08 EST 2016 selfserv_9159 with PID 6882 started at Fri Jan 8 13:06:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3754: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 6882 at Fri Jan 8 13:06:08 EST 2016 kill -USR1 6882 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6882 killed at Fri Jan 8 13:06:08 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:06:09 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:06:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:06:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3755: Waiting for Server - FAILED kill -0 6951 >/dev/null 2>/dev/null selfserv_9159 with PID 6951 found at Fri Jan 8 13:06:14 EST 2016 selfserv_9159 with PID 6951 started at Fri Jan 8 13:06:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3756: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 6951 at Fri Jan 8 13:06:15 EST 2016 kill -USR1 6951 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6951 killed at Fri Jan 8 13:06:15 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:06:16 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:06:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:06:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3757: Waiting for Server - FAILED kill -0 7021 >/dev/null 2>/dev/null selfserv_9159 with PID 7021 found at Fri Jan 8 13:06:21 EST 2016 selfserv_9159 with PID 7021 started at Fri Jan 8 13:06:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3758: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 7021 at Fri Jan 8 13:06:22 EST 2016 kill -USR1 7021 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7021 killed at Fri Jan 8 13:06:22 EST 2016 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server fips/client normal - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Stress Test Extended Test - server fips/client normal - with ECC =============================== ssl.sh: skipping -c_1000_-C_A Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9159 starting at Fri Jan 8 13:06:23 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:06:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:06:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3759: Waiting for Server - FAILED kill -0 7204 >/dev/null 2>/dev/null selfserv_9159 with PID 7204 found at Fri Jan 8 13:06:29 EST 2016 selfserv_9159 with PID 7204 started at Fri Jan 8 13:06:29 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -c 1000 -C c -V :ssl3 \ localhost.localdomain strsclnt started at Fri Jan 8 13:06:29 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:06:29 EST 2016 ssl.sh: #3760: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 7204 at Fri Jan 8 13:06:29 EST 2016 kill -USR1 7204 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7204 killed at Fri Jan 8 13:06:30 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9159 starting at Fri Jan 8 13:06:30 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:06:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:06:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3761: Waiting for Server - FAILED kill -0 7284 >/dev/null 2>/dev/null selfserv_9159 with PID 7284 found at Fri Jan 8 13:06:36 EST 2016 selfserv_9159 with PID 7284 started at Fri Jan 8 13:06:36 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Fri Jan 8 13:06:36 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:06:36 EST 2016 ssl.sh: #3762: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 7284 at Fri Jan 8 13:06:36 EST 2016 kill -USR1 7284 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7284 killed at Fri Jan 8 13:06:37 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9159 starting at Fri Jan 8 13:06:37 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:06:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:06:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3763: Waiting for Server - FAILED kill -0 7363 >/dev/null 2>/dev/null selfserv_9159 with PID 7363 found at Fri Jan 8 13:06:43 EST 2016 selfserv_9159 with PID 7363 started at Fri Jan 8 13:06:43 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Fri Jan 8 13:06:43 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:06:43 EST 2016 ssl.sh: #3764: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 7363 at Fri Jan 8 13:06:43 EST 2016 kill -USR1 7363 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7363 killed at Fri Jan 8 13:06:44 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9159 starting at Fri Jan 8 13:06:44 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:06:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:06:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3765: Waiting for Server - FAILED kill -0 7442 >/dev/null 2>/dev/null selfserv_9159 with PID 7442 found at Fri Jan 8 13:06:50 EST 2016 selfserv_9159 with PID 7442 started at Fri Jan 8 13:06:50 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 13:06:50 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:06:50 EST 2016 ssl.sh: #3766: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 7442 at Fri Jan 8 13:06:50 EST 2016 kill -USR1 7442 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7442 killed at Fri Jan 8 13:06:51 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9159 starting at Fri Jan 8 13:06:51 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:06:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:06:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3767: Waiting for Server - FAILED kill -0 7522 >/dev/null 2>/dev/null selfserv_9159 with PID 7522 found at Fri Jan 8 13:06:57 EST 2016 selfserv_9159 with PID 7522 started at Fri Jan 8 13:06:57 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Fri Jan 8 13:06:57 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:06:57 EST 2016 ssl.sh: #3768: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 7522 at Fri Jan 8 13:06:58 EST 2016 kill -USR1 7522 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7522 killed at Fri Jan 8 13:06:58 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9159 starting at Fri Jan 8 13:06:58 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:06:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:07:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3769: Waiting for Server - FAILED kill -0 7601 >/dev/null 2>/dev/null selfserv_9159 with PID 7601 found at Fri Jan 8 13:07:04 EST 2016 selfserv_9159 with PID 7601 started at Fri Jan 8 13:07:04 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 13:07:04 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:07:04 EST 2016 ssl.sh: #3770: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 7601 at Fri Jan 8 13:07:05 EST 2016 kill -USR1 7601 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7601 killed at Fri Jan 8 13:07:05 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9159 starting at Fri Jan 8 13:07:05 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:07:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:07:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3771: Waiting for Server - FAILED kill -0 7680 >/dev/null 2>/dev/null selfserv_9159 with PID 7680 found at Fri Jan 8 13:07:11 EST 2016 selfserv_9159 with PID 7680 started at Fri Jan 8 13:07:11 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 13:07:11 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:07:12 EST 2016 ssl.sh: #3772: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 7680 at Fri Jan 8 13:07:12 EST 2016 kill -USR1 7680 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7680 killed at Fri Jan 8 13:07:12 EST 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping -c_100_-C_A_-N_-n_TestUser Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:07:12 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:07:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:07:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3773: Waiting for Server - FAILED kill -0 7789 >/dev/null 2>/dev/null selfserv_9159 with PID 7789 found at Fri Jan 8 13:07:18 EST 2016 selfserv_9159 with PID 7789 started at Fri Jan 8 13:07:18 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Fri Jan 8 13:07:18 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:07:19 EST 2016 ssl.sh: #3774: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 7789 at Fri Jan 8 13:07:19 EST 2016 kill -USR1 7789 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7789 killed at Fri Jan 8 13:07:19 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:07:19 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:07:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:07:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3775: Waiting for Server - FAILED kill -0 7868 >/dev/null 2>/dev/null selfserv_9159 with PID 7868 found at Fri Jan 8 13:07:25 EST 2016 selfserv_9159 with PID 7868 started at Fri Jan 8 13:07:25 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Fri Jan 8 13:07:25 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:07:26 EST 2016 ssl.sh: #3776: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 7868 at Fri Jan 8 13:07:26 EST 2016 kill -USR1 7868 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7868 killed at Fri Jan 8 13:07:26 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:07:26 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:07:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:07:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3777: Waiting for Server - FAILED kill -0 7947 >/dev/null 2>/dev/null selfserv_9159 with PID 7947 found at Fri Jan 8 13:07:32 EST 2016 selfserv_9159 with PID 7947 started at Fri Jan 8 13:07:32 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Fri Jan 8 13:07:32 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:07:33 EST 2016 ssl.sh: #3778: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 7947 at Fri Jan 8 13:07:33 EST 2016 kill -USR1 7947 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7947 killed at Fri Jan 8 13:07:33 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:07:33 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:07:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:07:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3779: Waiting for Server - FAILED kill -0 8027 >/dev/null 2>/dev/null selfserv_9159 with PID 8027 found at Fri Jan 8 13:07:39 EST 2016 selfserv_9159 with PID 8027 started at Fri Jan 8 13:07:39 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Fri Jan 8 13:07:39 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:07:40 EST 2016 ssl.sh: #3780: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 8027 at Fri Jan 8 13:07:40 EST 2016 kill -USR1 8027 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8027 killed at Fri Jan 8 13:07:40 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9159 starting at Fri Jan 8 13:07:40 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:07:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:07:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3781: Waiting for Server - FAILED kill -0 8106 >/dev/null 2>/dev/null selfserv_9159 with PID 8106 found at Fri Jan 8 13:07:46 EST 2016 selfserv_9159 with PID 8106 started at Fri Jan 8 13:07:46 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 13:07:46 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:07:47 EST 2016 ssl.sh: #3782: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 8106 at Fri Jan 8 13:07:47 EST 2016 kill -USR1 8106 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8106 killed at Fri Jan 8 13:07:47 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:07:47 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:07:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:07:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3783: Waiting for Server - FAILED kill -0 8185 >/dev/null 2>/dev/null selfserv_9159 with PID 8185 found at Fri Jan 8 13:07:53 EST 2016 selfserv_9159 with PID 8185 started at Fri Jan 8 13:07:53 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 13:07:53 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:07:54 EST 2016 ssl.sh: #3784: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 8185 at Fri Jan 8 13:07:54 EST 2016 kill -USR1 8185 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8185 killed at Fri Jan 8 13:07:54 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9159 starting at Fri Jan 8 13:07:54 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:07:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:08:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3785: Waiting for Server - FAILED kill -0 8265 >/dev/null 2>/dev/null selfserv_9159 with PID 8265 found at Fri Jan 8 13:08:00 EST 2016 selfserv_9159 with PID 8265 started at Fri Jan 8 13:08:00 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 13:08:00 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:08:01 EST 2016 ssl.sh: #3786: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 8265 at Fri Jan 8 13:08:01 EST 2016 kill -USR1 8265 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8265 killed at Fri Jan 8 13:08:01 EST 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 13:08:02 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:08:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:08:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3787: Waiting for Server - FAILED kill -0 8373 >/dev/null 2>/dev/null selfserv_9159 with PID 8373 found at Fri Jan 8 13:08:08 EST 2016 selfserv_9159 with PID 8373 started at Fri Jan 8 13:08:08 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Fri Jan 8 13:08:08 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:08:08 EST 2016 ssl.sh: #3788: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 8373 at Fri Jan 8 13:08:08 EST 2016 kill -USR1 8373 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8373 killed at Fri Jan 8 13:08:09 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 13:08:09 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:08:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:08:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3789: Waiting for Server - FAILED kill -0 8453 >/dev/null 2>/dev/null selfserv_9159 with PID 8453 found at Fri Jan 8 13:08:15 EST 2016 selfserv_9159 with PID 8453 started at Fri Jan 8 13:08:15 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Fri Jan 8 13:08:15 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:08:15 EST 2016 ssl.sh: #3790: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 8453 at Fri Jan 8 13:08:15 EST 2016 kill -USR1 8453 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8453 killed at Fri Jan 8 13:08:16 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9159 starting at Fri Jan 8 13:08:16 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:08:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:08:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3791: Waiting for Server - FAILED kill -0 8533 >/dev/null 2>/dev/null selfserv_9159 with PID 8533 found at Fri Jan 8 13:08:22 EST 2016 selfserv_9159 with PID 8533 started at Fri Jan 8 13:08:22 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Fri Jan 8 13:08:22 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:08:22 EST 2016 ssl.sh: #3792: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 8533 at Fri Jan 8 13:08:22 EST 2016 kill -USR1 8533 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8533 killed at Fri Jan 8 13:08:23 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 13:08:23 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:08:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:08:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3793: Waiting for Server - FAILED kill -0 8612 >/dev/null 2>/dev/null selfserv_9159 with PID 8612 found at Fri Jan 8 13:08:29 EST 2016 selfserv_9159 with PID 8612 started at Fri Jan 8 13:08:29 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Fri Jan 8 13:08:29 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:08:29 EST 2016 ssl.sh: #3794: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 8612 at Fri Jan 8 13:08:29 EST 2016 kill -USR1 8612 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8612 killed at Fri Jan 8 13:08:30 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 13:08:30 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:08:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:08:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3795: Waiting for Server - FAILED kill -0 8691 >/dev/null 2>/dev/null selfserv_9159 with PID 8691 found at Fri Jan 8 13:08:36 EST 2016 selfserv_9159 with PID 8691 started at Fri Jan 8 13:08:36 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Fri Jan 8 13:08:36 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:08:36 EST 2016 ssl.sh: #3796: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 8691 at Fri Jan 8 13:08:36 EST 2016 kill -USR1 8691 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8691 killed at Fri Jan 8 13:08:37 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9159 starting at Fri Jan 8 13:08:37 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:08:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:08:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3797: Waiting for Server - FAILED kill -0 8771 >/dev/null 2>/dev/null selfserv_9159 with PID 8771 found at Fri Jan 8 13:08:43 EST 2016 selfserv_9159 with PID 8771 started at Fri Jan 8 13:08:43 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Fri Jan 8 13:08:43 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:08:43 EST 2016 ssl.sh: #3798: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 8771 at Fri Jan 8 13:08:43 EST 2016 kill -USR1 8771 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8771 killed at Fri Jan 8 13:08:44 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9159 starting at Fri Jan 8 13:08:44 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:08:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:08:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3799: Waiting for Server - FAILED kill -0 8850 >/dev/null 2>/dev/null selfserv_9159 with PID 8850 found at Fri Jan 8 13:08:50 EST 2016 selfserv_9159 with PID 8850 started at Fri Jan 8 13:08:50 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Fri Jan 8 13:08:50 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:08:50 EST 2016 ssl.sh: #3800: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 8850 at Fri Jan 8 13:08:50 EST 2016 kill -USR1 8850 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8850 killed at Fri Jan 8 13:08:51 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9159 starting at Fri Jan 8 13:08:51 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:08:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:08:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3801: Waiting for Server - FAILED kill -0 8929 >/dev/null 2>/dev/null selfserv_9159 with PID 8929 found at Fri Jan 8 13:08:57 EST 2016 selfserv_9159 with PID 8929 started at Fri Jan 8 13:08:57 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Fri Jan 8 13:08:57 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:08:57 EST 2016 ssl.sh: #3802: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 8929 at Fri Jan 8 13:08:57 EST 2016 kill -USR1 8929 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8929 killed at Fri Jan 8 13:08:58 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9159 starting at Fri Jan 8 13:08:58 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:08:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:09:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3803: Waiting for Server - FAILED kill -0 9009 >/dev/null 2>/dev/null selfserv_9159 with PID 9009 found at Fri Jan 8 13:09:04 EST 2016 selfserv_9159 with PID 9009 started at Fri Jan 8 13:09:04 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Fri Jan 8 13:09:04 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:09:04 EST 2016 ssl.sh: #3804: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 9009 at Fri Jan 8 13:09:04 EST 2016 kill -USR1 9009 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9009 killed at Fri Jan 8 13:09:05 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9159 starting at Fri Jan 8 13:09:05 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:09:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:09:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3805: Waiting for Server - FAILED kill -0 9088 >/dev/null 2>/dev/null selfserv_9159 with PID 9088 found at Fri Jan 8 13:09:11 EST 2016 selfserv_9159 with PID 9088 started at Fri Jan 8 13:09:11 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Fri Jan 8 13:09:11 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:09:11 EST 2016 ssl.sh: #3806: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 9088 at Fri Jan 8 13:09:11 EST 2016 kill -USR1 9088 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9088 killed at Fri Jan 8 13:09:12 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:09:12 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:09:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:09:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3807: Waiting for Server - FAILED kill -0 9188 >/dev/null 2>/dev/null selfserv_9159 with PID 9188 found at Fri Jan 8 13:09:18 EST 2016 selfserv_9159 with PID 9188 started at Fri Jan 8 13:09:18 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 10 -C :C009 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 13:09:18 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:09:18 EST 2016 ssl.sh: #3808: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 9188 at Fri Jan 8 13:09:18 EST 2016 kill -USR1 9188 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9188 killed at Fri Jan 8 13:09:19 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:09:19 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:09:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:09:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3809: Waiting for Server - FAILED kill -0 9268 >/dev/null 2>/dev/null selfserv_9159 with PID 9268 found at Fri Jan 8 13:09:25 EST 2016 selfserv_9159 with PID 9268 started at Fri Jan 8 13:09:25 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 13:09:25 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:09:25 EST 2016 ssl.sh: #3810: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 9268 at Fri Jan 8 13:09:26 EST 2016 kill -USR1 9268 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9268 killed at Fri Jan 8 13:09:26 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:09:26 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:09:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:09:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3811: Waiting for Server - FAILED kill -0 9347 >/dev/null 2>/dev/null selfserv_9159 with PID 9347 found at Fri Jan 8 13:09:32 EST 2016 selfserv_9159 with PID 9347 started at Fri Jan 8 13:09:32 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 10 -C :C004 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 13:09:32 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:09:32 EST 2016 ssl.sh: #3812: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 9347 at Fri Jan 8 13:09:33 EST 2016 kill -USR1 9347 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9347 killed at Fri Jan 8 13:09:33 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:09:33 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:09:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:09:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3813: Waiting for Server - FAILED kill -0 9429 >/dev/null 2>/dev/null selfserv_9159 with PID 9429 found at Fri Jan 8 13:09:39 EST 2016 selfserv_9159 with PID 9429 started at Fri Jan 8 13:09:39 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \ localhost.localdomain strsclnt started at Fri Jan 8 13:09:39 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:09:39 EST 2016 ssl.sh: #3814: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 9429 at Fri Jan 8 13:09:40 EST 2016 kill -USR1 9429 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9429 killed at Fri Jan 8 13:09:40 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9159 starting at Fri Jan 8 13:09:40 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:09:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:09:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3815: Waiting for Server - FAILED kill -0 9509 >/dev/null 2>/dev/null selfserv_9159 with PID 9509 found at Fri Jan 8 13:09:46 EST 2016 selfserv_9159 with PID 9509 started at Fri Jan 8 13:09:46 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 13:09:46 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:09:47 EST 2016 ssl.sh: #3816: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 9509 at Fri Jan 8 13:09:47 EST 2016 kill -USR1 9509 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9509 killed at Fri Jan 8 13:09:47 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:09:47 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:09:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:09:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3817: Waiting for Server - FAILED kill -0 9588 >/dev/null 2>/dev/null selfserv_9159 with PID 9588 found at Fri Jan 8 13:09:53 EST 2016 selfserv_9159 with PID 9588 started at Fri Jan 8 13:09:53 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \ localhost.localdomain strsclnt started at Fri Jan 8 13:09:53 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:09:54 EST 2016 ssl.sh: #3818: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 9588 at Fri Jan 8 13:09:54 EST 2016 kill -USR1 9588 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9588 killed at Fri Jan 8 13:09:54 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 13:09:54 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:09:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:10:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3819: Waiting for Server - FAILED kill -0 9688 >/dev/null 2>/dev/null selfserv_9159 with PID 9688 found at Fri Jan 8 13:10:00 EST 2016 selfserv_9159 with PID 9688 started at Fri Jan 8 13:10:00 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Fri Jan 8 13:10:00 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:10:01 EST 2016 ssl.sh: #3820: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 9688 at Fri Jan 8 13:10:01 EST 2016 kill -USR1 9688 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9688 killed at Fri Jan 8 13:10:01 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9159 starting at Fri Jan 8 13:10:01 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:10:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:10:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3821: Waiting for Server - FAILED kill -0 9768 >/dev/null 2>/dev/null selfserv_9159 with PID 9768 found at Fri Jan 8 13:10:07 EST 2016 selfserv_9159 with PID 9768 started at Fri Jan 8 13:10:07 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Fri Jan 8 13:10:07 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:10:08 EST 2016 ssl.sh: #3822: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 9768 at Fri Jan 8 13:10:08 EST 2016 kill -USR1 9768 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9768 killed at Fri Jan 8 13:10:08 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 13:10:08 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:10:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:10:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3823: Waiting for Server - FAILED kill -0 9847 >/dev/null 2>/dev/null selfserv_9159 with PID 9847 found at Fri Jan 8 13:10:14 EST 2016 selfserv_9159 with PID 9847 started at Fri Jan 8 13:10:14 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Fri Jan 8 13:10:14 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:10:15 EST 2016 ssl.sh: #3824: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 9847 at Fri Jan 8 13:10:15 EST 2016 kill -USR1 9847 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9847 killed at Fri Jan 8 13:10:15 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 13:10:15 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:10:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:10:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3825: Waiting for Server - FAILED kill -0 9926 >/dev/null 2>/dev/null selfserv_9159 with PID 9926 found at Fri Jan 8 13:10:21 EST 2016 selfserv_9159 with PID 9926 started at Fri Jan 8 13:10:21 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Fri Jan 8 13:10:21 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:10:22 EST 2016 ssl.sh: #3826: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 9926 at Fri Jan 8 13:10:22 EST 2016 kill -USR1 9926 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9926 killed at Fri Jan 8 13:10:22 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 13:10:22 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:10:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:10:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3827: Waiting for Server - FAILED kill -0 10020 >/dev/null 2>/dev/null selfserv_9159 with PID 10020 found at Fri Jan 8 13:10:28 EST 2016 selfserv_9159 with PID 10020 started at Fri Jan 8 13:10:28 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Fri Jan 8 13:10:28 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:10:29 EST 2016 ssl.sh: #3828: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 10020 at Fri Jan 8 13:10:29 EST 2016 kill -USR1 10020 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10020 killed at Fri Jan 8 13:10:29 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9159 starting at Fri Jan 8 13:10:29 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:10:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:10:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3829: Waiting for Server - FAILED kill -0 10113 >/dev/null 2>/dev/null selfserv_9159 with PID 10113 found at Fri Jan 8 13:10:35 EST 2016 selfserv_9159 with PID 10113 started at Fri Jan 8 13:10:35 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Fri Jan 8 13:10:35 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:10:36 EST 2016 ssl.sh: #3830: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 10113 at Fri Jan 8 13:10:36 EST 2016 kill -USR1 10113 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10113 killed at Fri Jan 8 13:10:36 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 13:10:37 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:10:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:10:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3831: Waiting for Server - FAILED kill -0 10193 >/dev/null 2>/dev/null selfserv_9159 with PID 10193 found at Fri Jan 8 13:10:42 EST 2016 selfserv_9159 with PID 10193 started at Fri Jan 8 13:10:42 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Fri Jan 8 13:10:42 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:10:43 EST 2016 ssl.sh: #3832: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 10193 at Fri Jan 8 13:10:43 EST 2016 kill -USR1 10193 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10193 killed at Fri Jan 8 13:10:43 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 13:10:44 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:10:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:10:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3833: Waiting for Server - FAILED kill -0 10272 >/dev/null 2>/dev/null selfserv_9159 with PID 10272 found at Fri Jan 8 13:10:49 EST 2016 selfserv_9159 with PID 10272 started at Fri Jan 8 13:10:49 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Fri Jan 8 13:10:50 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:10:50 EST 2016 ssl.sh: #3834: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 10272 at Fri Jan 8 13:10:50 EST 2016 kill -USR1 10272 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10272 killed at Fri Jan 8 13:10:50 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:10:51 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:10:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:10:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3835: Waiting for Server - FAILED kill -0 10373 >/dev/null 2>/dev/null selfserv_9159 with PID 10373 found at Fri Jan 8 13:10:57 EST 2016 selfserv_9159 with PID 10373 started at Fri Jan 8 13:10:57 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 13:10:57 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:10:57 EST 2016 ssl.sh: #3836: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 10373 at Fri Jan 8 13:10:57 EST 2016 kill -USR1 10373 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10373 killed at Fri Jan 8 13:10:58 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:10:58 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:10:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:11:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3837: Waiting for Server - FAILED kill -0 10453 >/dev/null 2>/dev/null selfserv_9159 with PID 10453 found at Fri Jan 8 13:11:04 EST 2016 selfserv_9159 with PID 10453 started at Fri Jan 8 13:11:04 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \ localhost.localdomain strsclnt started at Fri Jan 8 13:11:04 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:11:04 EST 2016 ssl.sh: #3838: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 10453 at Fri Jan 8 13:11:04 EST 2016 kill -USR1 10453 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10453 killed at Fri Jan 8 13:11:05 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:11:05 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:11:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:11:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3839: Waiting for Server - FAILED kill -0 10546 >/dev/null 2>/dev/null selfserv_9159 with PID 10546 found at Fri Jan 8 13:11:11 EST 2016 selfserv_9159 with PID 10546 started at Fri Jan 8 13:11:11 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 13:11:11 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:11:11 EST 2016 ssl.sh: #3840: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 10546 at Fri Jan 8 13:11:11 EST 2016 kill -USR1 10546 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10546 killed at Fri Jan 8 13:11:12 EST 2016 ssl.sh: SSL - FIPS mode off for server =============================== ssl.sh: Turning FIPS off for the server modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -fips false -force FIPS mode disabled. ssl.sh: #3841: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/server -list ssl.sh: #3842: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #3843: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -fips false -force FIPS mode disabled. ssl.sh: #3844: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_server -list ssl.sh: #3845: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #3846: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL - FIPS mode on for client =============================== ssl.sh: Turning FIPS on for the client modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -fips true -force FIPS mode enabled. ssl.sh: #3847: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -list ssl.sh: #3848: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #3849: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -fips true -force FIPS mode enabled. ssl.sh: #3850: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -list ssl.sh: #3851: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #3852: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server normal/client fips - with ECC =============================== selfserv_9159 starting at Fri Jan 8 13:11:16 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:11:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:11:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3853: Waiting for Server - FAILED kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:22 EST 2016 selfserv_9159 with PID 10742 started at Fri Jan 8 13:11:22 EST 2016 ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping A SSL2_RC4_128_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping B SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping C SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping D SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping E SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping F SSL2_DES_192_EDE3_CBC_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping B SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping C SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping E SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3854: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3855: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3856: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping f SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping g SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3857: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3858: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3859: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping l SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping m SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3860: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3861: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3862: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3863: SSL3_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3864: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3865: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3866: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3867: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3868: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3869: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping f TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping g TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3870: TLS_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3871: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3872: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping l TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping m TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3873: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3874: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3875: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3876: TLS_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3877: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3878: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3879: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping f TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping g TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3880: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3881: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3882: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping l TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping m TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3883: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3884: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3885: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3886: TLS11_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3887: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3888: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3889: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3890: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3891: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3892: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping l TLS12_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping m TLS12_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3893: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3894: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3895: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3896: TLS12_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3897: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3898: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3899: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3900: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3901: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3902: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3903: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3904: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3905: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3906: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3907: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3908: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3909: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3910: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3911: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3912: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3913: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3914: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3915: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3916: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3917: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3918: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3919: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3920: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 10742 >/dev/null 2>/dev/null selfserv_9159 with PID 10742 found at Fri Jan 8 13:11:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3921: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 10742 at Fri Jan 8 13:11:59 EST 2016 kill -USR1 10742 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10742 killed at Fri Jan 8 13:12:00 EST 2016 ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 13:12:00 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:12:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:12:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3922: Waiting for Server - FAILED kill -0 12774 >/dev/null 2>/dev/null selfserv_9159 with PID 12774 found at Fri Jan 8 13:12:05 EST 2016 selfserv_9159 with PID 12774 started at Fri Jan 8 13:12:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3923: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 12774 >/dev/null 2>/dev/null selfserv_9159 with PID 12774 found at Fri Jan 8 13:12:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3924: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 12774 >/dev/null 2>/dev/null selfserv_9159 with PID 12774 found at Fri Jan 8 13:12:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3925: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 12774 >/dev/null 2>/dev/null selfserv_9159 with PID 12774 found at Fri Jan 8 13:12:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3926: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 12774 >/dev/null 2>/dev/null selfserv_9159 with PID 12774 found at Fri Jan 8 13:12:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3927: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 12774 at Fri Jan 8 13:12:08 EST 2016 kill -USR1 12774 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12774 killed at Fri Jan 8 13:12:09 EST 2016 ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 13:12:09 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:12:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:12:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3928: Waiting for Server - FAILED kill -0 12939 >/dev/null 2>/dev/null selfserv_9159 with PID 12939 found at Fri Jan 8 13:12:15 EST 2016 selfserv_9159 with PID 12939 started at Fri Jan 8 13:12:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3929: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 12939 >/dev/null 2>/dev/null selfserv_9159 with PID 12939 found at Fri Jan 8 13:12:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3930: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 12939 >/dev/null 2>/dev/null selfserv_9159 with PID 12939 found at Fri Jan 8 13:12:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3931: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 12939 >/dev/null 2>/dev/null selfserv_9159 with PID 12939 found at Fri Jan 8 13:12:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3932: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 12939 >/dev/null 2>/dev/null selfserv_9159 with PID 12939 found at Fri Jan 8 13:12:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3933: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 12939 >/dev/null 2>/dev/null selfserv_9159 with PID 12939 found at Fri Jan 8 13:12:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3934: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 12939 >/dev/null 2>/dev/null selfserv_9159 with PID 12939 found at Fri Jan 8 13:12:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3935: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 12939 >/dev/null 2>/dev/null selfserv_9159 with PID 12939 found at Fri Jan 8 13:12:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3936: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 12939 >/dev/null 2>/dev/null selfserv_9159 with PID 12939 found at Fri Jan 8 13:12:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3937: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 12939 >/dev/null 2>/dev/null selfserv_9159 with PID 12939 found at Fri Jan 8 13:12:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3938: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 12939 >/dev/null 2>/dev/null selfserv_9159 with PID 12939 found at Fri Jan 8 13:12:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3939: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 12939 >/dev/null 2>/dev/null selfserv_9159 with PID 12939 found at Fri Jan 8 13:12:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3940: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 12939 >/dev/null 2>/dev/null selfserv_9159 with PID 12939 found at Fri Jan 8 13:12:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3941: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 12939 >/dev/null 2>/dev/null selfserv_9159 with PID 12939 found at Fri Jan 8 13:12:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3942: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 12939 >/dev/null 2>/dev/null selfserv_9159 with PID 12939 found at Fri Jan 8 13:12:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3943: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 12939 at Fri Jan 8 13:12:22 EST 2016 kill -USR1 12939 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12939 killed at Fri Jan 8 13:12:23 EST 2016 ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 13:12:23 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:12:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:12:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3944: Waiting for Server - FAILED kill -0 13353 >/dev/null 2>/dev/null selfserv_9159 with PID 13353 found at Fri Jan 8 13:12:29 EST 2016 selfserv_9159 with PID 13353 started at Fri Jan 8 13:12:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3945: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 13353 >/dev/null 2>/dev/null selfserv_9159 with PID 13353 found at Fri Jan 8 13:12:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3946: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 13353 >/dev/null 2>/dev/null selfserv_9159 with PID 13353 found at Fri Jan 8 13:12:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3947: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 13353 >/dev/null 2>/dev/null selfserv_9159 with PID 13353 found at Fri Jan 8 13:12:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3948: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 13353 >/dev/null 2>/dev/null selfserv_9159 with PID 13353 found at Fri Jan 8 13:12:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3949: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 13353 at Fri Jan 8 13:12:31 EST 2016 kill -USR1 13353 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13353 killed at Fri Jan 8 13:12:32 EST 2016 ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 13:12:32 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:12:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:12:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3950: Waiting for Server - FAILED kill -0 13518 >/dev/null 2>/dev/null selfserv_9159 with PID 13518 found at Fri Jan 8 13:12:38 EST 2016 selfserv_9159 with PID 13518 started at Fri Jan 8 13:12:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3951: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 13518 >/dev/null 2>/dev/null selfserv_9159 with PID 13518 found at Fri Jan 8 13:12:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3952: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 13518 >/dev/null 2>/dev/null selfserv_9159 with PID 13518 found at Fri Jan 8 13:12:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3953: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 13518 >/dev/null 2>/dev/null selfserv_9159 with PID 13518 found at Fri Jan 8 13:12:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3954: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 13518 >/dev/null 2>/dev/null selfserv_9159 with PID 13518 found at Fri Jan 8 13:12:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3955: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 13518 >/dev/null 2>/dev/null selfserv_9159 with PID 13518 found at Fri Jan 8 13:12:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3956: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 13518 >/dev/null 2>/dev/null selfserv_9159 with PID 13518 found at Fri Jan 8 13:12:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3957: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 13518 >/dev/null 2>/dev/null selfserv_9159 with PID 13518 found at Fri Jan 8 13:12:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3958: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 13518 >/dev/null 2>/dev/null selfserv_9159 with PID 13518 found at Fri Jan 8 13:12:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3959: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 13518 >/dev/null 2>/dev/null selfserv_9159 with PID 13518 found at Fri Jan 8 13:12:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3960: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 13518 >/dev/null 2>/dev/null selfserv_9159 with PID 13518 found at Fri Jan 8 13:12:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3961: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 13518 >/dev/null 2>/dev/null selfserv_9159 with PID 13518 found at Fri Jan 8 13:12:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3962: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 13518 >/dev/null 2>/dev/null selfserv_9159 with PID 13518 found at Fri Jan 8 13:12:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3963: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 13518 >/dev/null 2>/dev/null selfserv_9159 with PID 13518 found at Fri Jan 8 13:12:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3964: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 13518 >/dev/null 2>/dev/null selfserv_9159 with PID 13518 found at Fri Jan 8 13:12:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3965: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 13518 at Fri Jan 8 13:12:46 EST 2016 kill -USR1 13518 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13518 killed at Fri Jan 8 13:12:46 EST 2016 ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 13:12:46 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:12:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:12:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3966: Waiting for Server - FAILED kill -0 13932 >/dev/null 2>/dev/null selfserv_9159 with PID 13932 found at Fri Jan 8 13:12:52 EST 2016 selfserv_9159 with PID 13932 started at Fri Jan 8 13:12:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3967: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 13932 >/dev/null 2>/dev/null selfserv_9159 with PID 13932 found at Fri Jan 8 13:12:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3968: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 13932 >/dev/null 2>/dev/null selfserv_9159 with PID 13932 found at Fri Jan 8 13:12:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3969: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 13932 >/dev/null 2>/dev/null selfserv_9159 with PID 13932 found at Fri Jan 8 13:12:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3970: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 13932 >/dev/null 2>/dev/null selfserv_9159 with PID 13932 found at Fri Jan 8 13:12:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3971: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 13932 at Fri Jan 8 13:12:55 EST 2016 kill -USR1 13932 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13932 killed at Fri Jan 8 13:12:55 EST 2016 ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 13:12:55 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:12:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:13:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3972: Waiting for Server - FAILED kill -0 14097 >/dev/null 2>/dev/null selfserv_9159 with PID 14097 found at Fri Jan 8 13:13:01 EST 2016 selfserv_9159 with PID 14097 started at Fri Jan 8 13:13:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3973: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 14097 >/dev/null 2>/dev/null selfserv_9159 with PID 14097 found at Fri Jan 8 13:13:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3974: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 14097 >/dev/null 2>/dev/null selfserv_9159 with PID 14097 found at Fri Jan 8 13:13:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3975: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 14097 >/dev/null 2>/dev/null selfserv_9159 with PID 14097 found at Fri Jan 8 13:13:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3976: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 14097 >/dev/null 2>/dev/null selfserv_9159 with PID 14097 found at Fri Jan 8 13:13:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3977: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 14097 >/dev/null 2>/dev/null selfserv_9159 with PID 14097 found at Fri Jan 8 13:13:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3978: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 14097 >/dev/null 2>/dev/null selfserv_9159 with PID 14097 found at Fri Jan 8 13:13:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3979: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 14097 >/dev/null 2>/dev/null selfserv_9159 with PID 14097 found at Fri Jan 8 13:13:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3980: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 14097 >/dev/null 2>/dev/null selfserv_9159 with PID 14097 found at Fri Jan 8 13:13:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3981: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 14097 >/dev/null 2>/dev/null selfserv_9159 with PID 14097 found at Fri Jan 8 13:13:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3982: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 14097 >/dev/null 2>/dev/null selfserv_9159 with PID 14097 found at Fri Jan 8 13:13:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3983: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 14097 >/dev/null 2>/dev/null selfserv_9159 with PID 14097 found at Fri Jan 8 13:13:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3984: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 14097 >/dev/null 2>/dev/null selfserv_9159 with PID 14097 found at Fri Jan 8 13:13:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3985: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 14097 at Fri Jan 8 13:13:08 EST 2016 kill -USR1 14097 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14097 killed at Fri Jan 8 13:13:08 EST 2016 ssl.sh: SSL Client Authentication - server normal/client fips - with ECC =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 13:13:09 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:13:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:13:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3986: Waiting for Server - FAILED kill -0 14511 >/dev/null 2>/dev/null selfserv_9159 with PID 14511 found at Fri Jan 8 13:13:14 EST 2016 selfserv_9159 with PID 14511 started at Fri Jan 8 13:13:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3987: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 14511 at Fri Jan 8 13:13:15 EST 2016 kill -USR1 14511 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14511 killed at Fri Jan 8 13:13:15 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:13:15 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:13:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:13:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3988: Waiting for Server - FAILED kill -0 14580 >/dev/null 2>/dev/null selfserv_9159 with PID 14580 found at Fri Jan 8 13:13:21 EST 2016 selfserv_9159 with PID 14580 started at Fri Jan 8 13:13:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3989: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 14580 at Fri Jan 8 13:13:22 EST 2016 kill -USR1 14580 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14580 killed at Fri Jan 8 13:13:22 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:13:22 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:13:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:13:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3990: Waiting for Server - FAILED kill -0 14650 >/dev/null 2>/dev/null selfserv_9159 with PID 14650 found at Fri Jan 8 13:13:28 EST 2016 selfserv_9159 with PID 14650 started at Fri Jan 8 13:13:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3991: TLS Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 14650 at Fri Jan 8 13:13:29 EST 2016 kill -USR1 14650 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14650 killed at Fri Jan 8 13:13:29 EST 2016 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 13:13:29 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:13:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:13:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3992: Waiting for Server - FAILED kill -0 14725 >/dev/null 2>/dev/null selfserv_9159 with PID 14725 found at Fri Jan 8 13:13:35 EST 2016 selfserv_9159 with PID 14725 started at Fri Jan 8 13:13:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3993: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 14725 at Fri Jan 8 13:13:36 EST 2016 kill -USR1 14725 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14725 killed at Fri Jan 8 13:13:36 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:13:36 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:13:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:13:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3994: Waiting for Server - FAILED kill -0 14794 >/dev/null 2>/dev/null selfserv_9159 with PID 14794 found at Fri Jan 8 13:13:42 EST 2016 selfserv_9159 with PID 14794 started at Fri Jan 8 13:13:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3995: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 14794 at Fri Jan 8 13:13:43 EST 2016 kill -USR1 14794 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14794 killed at Fri Jan 8 13:13:43 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:13:43 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:13:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:13:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3996: Waiting for Server - FAILED kill -0 14864 >/dev/null 2>/dev/null selfserv_9159 with PID 14864 found at Fri Jan 8 13:13:49 EST 2016 selfserv_9159 with PID 14864 started at Fri Jan 8 13:13:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3997: SSL3 Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 14864 at Fri Jan 8 13:13:50 EST 2016 kill -USR1 14864 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14864 killed at Fri Jan 8 13:13:50 EST 2016 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 13:13:50 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:13:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:13:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3998: Waiting for Server - FAILED kill -0 14939 >/dev/null 2>/dev/null selfserv_9159 with PID 14939 found at Fri Jan 8 13:13:56 EST 2016 selfserv_9159 with PID 14939 started at Fri Jan 8 13:13:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #3999: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 14939 at Fri Jan 8 13:13:57 EST 2016 kill -USR1 14939 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14939 killed at Fri Jan 8 13:13:57 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:13:57 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:13:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:14:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4000: Waiting for Server - FAILED kill -0 15008 >/dev/null 2>/dev/null selfserv_9159 with PID 15008 found at Fri Jan 8 13:14:03 EST 2016 selfserv_9159 with PID 15008 started at Fri Jan 8 13:14:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4001: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 15008 at Fri Jan 8 13:14:03 EST 2016 kill -USR1 15008 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15008 killed at Fri Jan 8 13:14:04 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:14:04 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:14:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:14:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4002: Waiting for Server - FAILED kill -0 15078 >/dev/null 2>/dev/null selfserv_9159 with PID 15078 found at Fri Jan 8 13:14:10 EST 2016 selfserv_9159 with PID 15078 started at Fri Jan 8 13:14:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4003: TLS Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 15078 at Fri Jan 8 13:14:10 EST 2016 kill -USR1 15078 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15078 killed at Fri Jan 8 13:14:11 EST 2016 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 13:14:11 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:14:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:14:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4004: Waiting for Server - FAILED kill -0 15153 >/dev/null 2>/dev/null selfserv_9159 with PID 15153 found at Fri Jan 8 13:14:17 EST 2016 selfserv_9159 with PID 15153 started at Fri Jan 8 13:14:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4005: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 15153 at Fri Jan 8 13:14:17 EST 2016 kill -USR1 15153 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15153 killed at Fri Jan 8 13:14:18 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:14:18 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:14:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:14:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4006: Waiting for Server - FAILED kill -0 15222 >/dev/null 2>/dev/null selfserv_9159 with PID 15222 found at Fri Jan 8 13:14:24 EST 2016 selfserv_9159 with PID 15222 started at Fri Jan 8 13:14:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4007: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 15222 at Fri Jan 8 13:14:24 EST 2016 kill -USR1 15222 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15222 killed at Fri Jan 8 13:14:25 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:14:25 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:14:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:14:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4008: Waiting for Server - FAILED kill -0 15292 >/dev/null 2>/dev/null selfserv_9159 with PID 15292 found at Fri Jan 8 13:14:31 EST 2016 selfserv_9159 with PID 15292 started at Fri Jan 8 13:14:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4009: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 15292 at Fri Jan 8 13:14:31 EST 2016 kill -USR1 15292 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15292 killed at Fri Jan 8 13:14:32 EST 2016 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 13:14:32 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:14:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:14:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4010: Waiting for Server - FAILED kill -0 15367 >/dev/null 2>/dev/null selfserv_9159 with PID 15367 found at Fri Jan 8 13:14:38 EST 2016 selfserv_9159 with PID 15367 started at Fri Jan 8 13:14:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4011: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 15367 at Fri Jan 8 13:14:38 EST 2016 kill -USR1 15367 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15367 killed at Fri Jan 8 13:14:39 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:14:39 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:14:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:14:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4012: Waiting for Server - FAILED kill -0 15436 >/dev/null 2>/dev/null selfserv_9159 with PID 15436 found at Fri Jan 8 13:14:45 EST 2016 selfserv_9159 with PID 15436 started at Fri Jan 8 13:14:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4013: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 15436 at Fri Jan 8 13:14:45 EST 2016 kill -USR1 15436 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15436 killed at Fri Jan 8 13:14:45 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:14:46 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:14:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:14:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4014: Waiting for Server - FAILED kill -0 15506 >/dev/null 2>/dev/null selfserv_9159 with PID 15506 found at Fri Jan 8 13:14:51 EST 2016 selfserv_9159 with PID 15506 started at Fri Jan 8 13:14:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4015: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 15506 at Fri Jan 8 13:14:52 EST 2016 kill -USR1 15506 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15506 killed at Fri Jan 8 13:14:52 EST 2016 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:14:53 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:14:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:14:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4016: Waiting for Server - FAILED kill -0 15595 >/dev/null 2>/dev/null selfserv_9159 with PID 15595 found at Fri Jan 8 13:14:58 EST 2016 selfserv_9159 with PID 15595 started at Fri Jan 8 13:14:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4017: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 15595 at Fri Jan 8 13:14:59 EST 2016 kill -USR1 15595 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15595 killed at Fri Jan 8 13:14:59 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:14:59 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:14:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:15:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4018: Waiting for Server - FAILED kill -0 15664 >/dev/null 2>/dev/null selfserv_9159 with PID 15664 found at Fri Jan 8 13:15:05 EST 2016 selfserv_9159 with PID 15664 started at Fri Jan 8 13:15:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4019: TLS Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 15664 at Fri Jan 8 13:15:06 EST 2016 kill -USR1 15664 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15664 killed at Fri Jan 8 13:15:06 EST 2016 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:15:06 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:15:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:15:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4020: Waiting for Server - FAILED kill -0 15738 >/dev/null 2>/dev/null selfserv_9159 with PID 15738 found at Fri Jan 8 13:15:12 EST 2016 selfserv_9159 with PID 15738 started at Fri Jan 8 13:15:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4021: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 15738 at Fri Jan 8 13:15:13 EST 2016 kill -USR1 15738 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15738 killed at Fri Jan 8 13:15:13 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:15:13 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:15:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:15:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4022: Waiting for Server - FAILED kill -0 15807 >/dev/null 2>/dev/null selfserv_9159 with PID 15807 found at Fri Jan 8 13:15:19 EST 2016 selfserv_9159 with PID 15807 started at Fri Jan 8 13:15:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4023: SSL3 Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 15807 at Fri Jan 8 13:15:20 EST 2016 kill -USR1 15807 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15807 killed at Fri Jan 8 13:15:20 EST 2016 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:15:20 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:15:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:15:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4024: Waiting for Server - FAILED kill -0 15880 >/dev/null 2>/dev/null selfserv_9159 with PID 15880 found at Fri Jan 8 13:15:26 EST 2016 selfserv_9159 with PID 15880 started at Fri Jan 8 13:15:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4025: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 15880 at Fri Jan 8 13:15:27 EST 2016 kill -USR1 15880 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15880 killed at Fri Jan 8 13:15:27 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:15:27 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:15:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:15:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4026: Waiting for Server - FAILED kill -0 15950 >/dev/null 2>/dev/null selfserv_9159 with PID 15950 found at Fri Jan 8 13:15:33 EST 2016 selfserv_9159 with PID 15950 started at Fri Jan 8 13:15:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4027: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 15950 at Fri Jan 8 13:15:34 EST 2016 kill -USR1 15950 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15950 killed at Fri Jan 8 13:15:34 EST 2016 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:15:34 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:15:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:15:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4028: Waiting for Server - FAILED kill -0 16023 >/dev/null 2>/dev/null selfserv_9159 with PID 16023 found at Fri Jan 8 13:15:40 EST 2016 selfserv_9159 with PID 16023 started at Fri Jan 8 13:15:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4029: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 16023 at Fri Jan 8 13:15:41 EST 2016 kill -USR1 16023 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16023 killed at Fri Jan 8 13:15:41 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:15:41 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:15:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:15:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4030: Waiting for Server - FAILED kill -0 16092 >/dev/null 2>/dev/null selfserv_9159 with PID 16092 found at Fri Jan 8 13:15:47 EST 2016 selfserv_9159 with PID 16092 started at Fri Jan 8 13:15:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4031: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 16092 at Fri Jan 8 13:15:47 EST 2016 kill -USR1 16092 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16092 killed at Fri Jan 8 13:15:48 EST 2016 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:15:48 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:15:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:15:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4032: Waiting for Server - FAILED kill -0 16166 >/dev/null 2>/dev/null selfserv_9159 with PID 16166 found at Fri Jan 8 13:15:54 EST 2016 selfserv_9159 with PID 16166 started at Fri Jan 8 13:15:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4033: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 16166 at Fri Jan 8 13:15:54 EST 2016 kill -USR1 16166 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16166 killed at Fri Jan 8 13:15:55 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:15:55 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:15:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:16:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4034: Waiting for Server - FAILED kill -0 16235 >/dev/null 2>/dev/null selfserv_9159 with PID 16235 found at Fri Jan 8 13:16:01 EST 2016 selfserv_9159 with PID 16235 started at Fri Jan 8 13:16:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4035: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 16235 at Fri Jan 8 13:16:01 EST 2016 kill -USR1 16235 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16235 killed at Fri Jan 8 13:16:02 EST 2016 ssl.sh: TLS Server hello response without SNI ---- selfserv_9159 starting at Fri Jan 8 13:16:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:16:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:16:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4036: Waiting for Server - FAILED kill -0 16325 >/dev/null 2>/dev/null selfserv_9159 with PID 16325 found at Fri Jan 8 13:16:08 EST 2016 selfserv_9159 with PID 16325 started at Fri Jan 8 13:16:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4037: TLS Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 16325 at Fri Jan 8 13:16:08 EST 2016 kill -USR1 16325 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16325 killed at Fri Jan 8 13:16:09 EST 2016 ssl.sh: TLS Server hello response with SNI ---- selfserv_9159 starting at Fri Jan 8 13:16:09 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:16:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:16:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4038: Waiting for Server - FAILED kill -0 16401 >/dev/null 2>/dev/null selfserv_9159 with PID 16401 found at Fri Jan 8 13:16:15 EST 2016 selfserv_9159 with PID 16401 started at Fri Jan 8 13:16:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4039: TLS Server hello response with SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 16401 at Fri Jan 8 13:16:15 EST 2016 kill -USR1 16401 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16401 killed at Fri Jan 8 13:16:16 EST 2016 ssl.sh: TLS Server response with alert ---- selfserv_9159 starting at Fri Jan 8 13:16:16 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:16:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:16:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4040: Waiting for Server - FAILED kill -0 16476 >/dev/null 2>/dev/null selfserv_9159 with PID 16476 found at Fri Jan 8 13:16:22 EST 2016 selfserv_9159 with PID 16476 started at Fri Jan 8 13:16:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4041: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 16476 at Fri Jan 8 13:16:22 EST 2016 kill -USR1 16476 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16476 killed at Fri Jan 8 13:16:23 EST 2016 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9159 starting at Fri Jan 8 13:16:23 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:16:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:16:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4042: Waiting for Server - FAILED kill -0 16551 >/dev/null 2>/dev/null selfserv_9159 with PID 16551 found at Fri Jan 8 13:16:29 EST 2016 selfserv_9159 with PID 16551 started at Fri Jan 8 13:16:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4043: SSL3 Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 16551 at Fri Jan 8 13:16:29 EST 2016 kill -USR1 16551 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16551 killed at Fri Jan 8 13:16:30 EST 2016 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9159 starting at Fri Jan 8 13:16:30 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:16:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:16:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4044: Waiting for Server - FAILED kill -0 16627 >/dev/null 2>/dev/null selfserv_9159 with PID 16627 found at Fri Jan 8 13:16:36 EST 2016 selfserv_9159 with PID 16627 started at Fri Jan 8 13:16:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c vssl3 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4045: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 16627 at Fri Jan 8 13:16:36 EST 2016 kill -USR1 16627 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16627 killed at Fri Jan 8 13:16:37 EST 2016 ssl.sh: TLS Server hello response without SNI ---- selfserv_9159 starting at Fri Jan 8 13:16:37 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:16:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:16:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4046: Waiting for Server - FAILED kill -0 16702 >/dev/null 2>/dev/null selfserv_9159 with PID 16702 found at Fri Jan 8 13:16:43 EST 2016 selfserv_9159 with PID 16702 started at Fri Jan 8 13:16:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4047: TLS Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 16702 at Fri Jan 8 13:16:43 EST 2016 kill -USR1 16702 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16702 killed at Fri Jan 8 13:16:43 EST 2016 ssl.sh: TLS Server hello response with SNI ---- selfserv_9159 starting at Fri Jan 8 13:16:44 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:16:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:16:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4048: Waiting for Server - FAILED kill -0 16777 >/dev/null 2>/dev/null selfserv_9159 with PID 16777 found at Fri Jan 8 13:16:49 EST 2016 selfserv_9159 with PID 16777 started at Fri Jan 8 13:16:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4049: TLS Server hello response with SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 16777 at Fri Jan 8 13:16:50 EST 2016 kill -USR1 16777 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16777 killed at Fri Jan 8 13:16:50 EST 2016 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9159 starting at Fri Jan 8 13:16:51 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:16:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:16:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4050: Waiting for Server - FAILED kill -0 16853 >/dev/null 2>/dev/null selfserv_9159 with PID 16853 found at Fri Jan 8 13:16:56 EST 2016 selfserv_9159 with PID 16853 started at Fri Jan 8 13:16:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4051: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 16853 at Fri Jan 8 13:16:57 EST 2016 kill -USR1 16853 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16853 killed at Fri Jan 8 13:16:57 EST 2016 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9159 starting at Fri Jan 8 13:16:57 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:16:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:17:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4052: Waiting for Server - FAILED kill -0 16928 >/dev/null 2>/dev/null selfserv_9159 with PID 16928 found at Fri Jan 8 13:17:03 EST 2016 selfserv_9159 with PID 16928 started at Fri Jan 8 13:17:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4053: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 16928 at Fri Jan 8 13:17:04 EST 2016 kill -USR1 16928 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16928 killed at Fri Jan 8 13:17:04 EST 2016 ssl.sh: TLS Server response with alert ---- selfserv_9159 starting at Fri Jan 8 13:17:04 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:17:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:17:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4054: Waiting for Server - FAILED kill -0 17003 >/dev/null 2>/dev/null selfserv_9159 with PID 17003 found at Fri Jan 8 13:17:10 EST 2016 selfserv_9159 with PID 17003 started at Fri Jan 8 13:17:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4055: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 17003 at Fri Jan 8 13:17:11 EST 2016 kill -USR1 17003 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17003 killed at Fri Jan 8 13:17:11 EST 2016 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client fips - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status (non-FIPS only) ssl.sh: skipping OCSP stapling, signed response, revoked status (non-FIPS only) ssl.sh: skipping OCSP stapling, signed response, unknown status (non-FIPS only) ssl.sh: skipping OCSP stapling, unsigned failure response (non-FIPS only) ssl.sh: skipping OCSP stapling, good status, bad signature (non-FIPS only) ssl.sh: skipping OCSP stapling, invalid cert status data (non-FIPS only) ssl.sh: skipping Valid cert, Server doesn't staple (non-FIPS only) ssl.sh: skipping Stress OCSP stapling, server uses random status (non-FIPS only) ssl.sh: SSL Stress Test - server normal/client fips - with ECC =============================== ssl.sh: skipping Form is subject to the terms of the Mozilla Public (non-FIPS only) ssl.sh: skipping If a copy of the MPL was not distributed with this (non-FIPS only) ssl.sh: skipping obtain one at http://mozilla.org/MPL/2.0/. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping the stress tests for SSL/TLS. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping client Test Case name (non-FIPS only) ssl.sh: skipping params (non-FIPS only) ssl.sh: skipping ------ --------------- (non-FIPS only) ssl.sh: skipping -c_1000_-C_A Stress SSL2 RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress SSL3 RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (false start) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (compression) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression, false start) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping -c_100_-C_A_-N_-n_TestUser Stress SSL2 RC4 128 with MD5 (no reuse, client auth) (non-FIPS only) ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:17:12 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:17:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:17:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4056: Waiting for Server - FAILED kill -0 17170 >/dev/null 2>/dev/null selfserv_9159 with PID 17170 found at Fri Jan 8 13:17:18 EST 2016 selfserv_9159 with PID 17170 started at Fri Jan 8 13:17:18 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -c 100 -C c -V :ssl3 -N -n TestUser \ localhost.localdomain strsclnt started at Fri Jan 8 13:17:18 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:17:18 EST 2016 ssl.sh: #4057: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 17170 at Fri Jan 8 13:17:18 EST 2016 kill -USR1 17170 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17170 killed at Fri Jan 8 13:17:19 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:17:19 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:17:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:17:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4058: Waiting for Server - FAILED kill -0 17249 >/dev/null 2>/dev/null selfserv_9159 with PID 17249 found at Fri Jan 8 13:17:25 EST 2016 selfserv_9159 with PID 17249 started at Fri Jan 8 13:17:25 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Fri Jan 8 13:17:25 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:17:25 EST 2016 ssl.sh: #4059: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 17249 at Fri Jan 8 13:17:25 EST 2016 kill -USR1 17249 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17249 killed at Fri Jan 8 13:17:26 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:17:26 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:17:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:17:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4060: Waiting for Server - FAILED kill -0 17328 >/dev/null 2>/dev/null selfserv_9159 with PID 17328 found at Fri Jan 8 13:17:32 EST 2016 selfserv_9159 with PID 17328 started at Fri Jan 8 13:17:32 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Fri Jan 8 13:17:32 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:17:32 EST 2016 ssl.sh: #4061: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 17328 at Fri Jan 8 13:17:32 EST 2016 kill -USR1 17328 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17328 killed at Fri Jan 8 13:17:33 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:17:33 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:17:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:17:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4062: Waiting for Server - FAILED kill -0 17408 >/dev/null 2>/dev/null selfserv_9159 with PID 17408 found at Fri Jan 8 13:17:39 EST 2016 selfserv_9159 with PID 17408 started at Fri Jan 8 13:17:39 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Fri Jan 8 13:17:39 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:17:39 EST 2016 ssl.sh: #4063: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 17408 at Fri Jan 8 13:17:39 EST 2016 kill -USR1 17408 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17408 killed at Fri Jan 8 13:17:40 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9159 starting at Fri Jan 8 13:17:40 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:17:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:17:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4064: Waiting for Server - FAILED kill -0 17487 >/dev/null 2>/dev/null selfserv_9159 with PID 17487 found at Fri Jan 8 13:17:46 EST 2016 selfserv_9159 with PID 17487 started at Fri Jan 8 13:17:46 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 13:17:46 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:17:46 EST 2016 ssl.sh: #4065: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 17487 at Fri Jan 8 13:17:46 EST 2016 kill -USR1 17487 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17487 killed at Fri Jan 8 13:17:47 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:17:47 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:17:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:17:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4066: Waiting for Server - FAILED kill -0 17566 >/dev/null 2>/dev/null selfserv_9159 with PID 17566 found at Fri Jan 8 13:17:53 EST 2016 selfserv_9159 with PID 17566 started at Fri Jan 8 13:17:53 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 13:17:53 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:17:53 EST 2016 ssl.sh: #4067: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 17566 at Fri Jan 8 13:17:53 EST 2016 kill -USR1 17566 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17566 killed at Fri Jan 8 13:17:54 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9159 starting at Fri Jan 8 13:17:54 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:17:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:17:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4068: Waiting for Server - FAILED kill -0 17646 >/dev/null 2>/dev/null selfserv_9159 with PID 17646 found at Fri Jan 8 13:18:00 EST 2016 selfserv_9159 with PID 17646 started at Fri Jan 8 13:18:00 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 13:18:00 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:18:00 EST 2016 ssl.sh: #4069: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 17646 at Fri Jan 8 13:18:01 EST 2016 kill -USR1 17646 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17646 killed at Fri Jan 8 13:18:01 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9159 starting at Fri Jan 8 13:18:01 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:18:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:18:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4070: Waiting for Server - FAILED kill -0 17731 >/dev/null 2>/dev/null selfserv_9159 with PID 17731 found at Fri Jan 8 13:18:07 EST 2016 selfserv_9159 with PID 17731 started at Fri Jan 8 13:18:07 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 13:18:07 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:18:07 EST 2016 ssl.sh: #4071: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 17731 at Fri Jan 8 13:18:08 EST 2016 kill -USR1 17731 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17731 killed at Fri Jan 8 13:18:08 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9159 starting at Fri Jan 8 13:18:08 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:18:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:18:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4072: Waiting for Server - FAILED kill -0 17818 >/dev/null 2>/dev/null selfserv_9159 with PID 17818 found at Fri Jan 8 13:18:14 EST 2016 selfserv_9159 with PID 17818 started at Fri Jan 8 13:18:14 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V tls1.0: -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Fri Jan 8 13:18:14 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:18:15 EST 2016 ssl.sh: #4073: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 17818 at Fri Jan 8 13:18:15 EST 2016 kill -USR1 17818 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17818 killed at Fri Jan 8 13:18:15 EST 2016 ssl.sh: skipping (non-FIPS only) ssl.sh: skipping ############################ (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA256 (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 GCM (non-FIPS only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:18:15 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:18:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:18:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4074: Waiting for Server - FAILED kill -0 17961 >/dev/null 2>/dev/null selfserv_9159 with PID 17961 found at Fri Jan 8 13:18:21 EST 2016 selfserv_9159 with PID 17961 started at Fri Jan 8 13:18:21 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 10 -C :C009 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 13:18:21 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:18:22 EST 2016 ssl.sh: #4075: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 17961 at Fri Jan 8 13:18:22 EST 2016 kill -USR1 17961 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17961 killed at Fri Jan 8 13:18:22 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:18:22 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:18:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:18:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4076: Waiting for Server - FAILED kill -0 18040 >/dev/null 2>/dev/null selfserv_9159 with PID 18040 found at Fri Jan 8 13:18:28 EST 2016 selfserv_9159 with PID 18040 started at Fri Jan 8 13:18:28 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 13:18:28 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:18:29 EST 2016 ssl.sh: #4077: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 18040 at Fri Jan 8 13:18:29 EST 2016 kill -USR1 18040 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18040 killed at Fri Jan 8 13:18:29 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:18:30 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:18:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:18:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4078: Waiting for Server - FAILED kill -0 18120 >/dev/null 2>/dev/null selfserv_9159 with PID 18120 found at Fri Jan 8 13:18:35 EST 2016 selfserv_9159 with PID 18120 started at Fri Jan 8 13:18:35 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 10 -C :C004 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 13:18:35 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:18:36 EST 2016 ssl.sh: #4079: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 18120 at Fri Jan 8 13:18:36 EST 2016 kill -USR1 18120 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18120 killed at Fri Jan 8 13:18:36 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:18:37 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:18:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:18:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4080: Waiting for Server - FAILED kill -0 18199 >/dev/null 2>/dev/null selfserv_9159 with PID 18199 found at Fri Jan 8 13:18:42 EST 2016 selfserv_9159 with PID 18199 started at Fri Jan 8 13:18:42 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 10 -C :C00E -N -n TestUser-ecmixed \ localhost.localdomain strsclnt started at Fri Jan 8 13:18:43 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:18:43 EST 2016 ssl.sh: #4081: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 18199 at Fri Jan 8 13:18:43 EST 2016 kill -USR1 18199 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18199 killed at Fri Jan 8 13:18:43 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9159 starting at Fri Jan 8 13:18:44 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:18:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:18:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4082: Waiting for Server - FAILED kill -0 18278 >/dev/null 2>/dev/null selfserv_9159 with PID 18278 found at Fri Jan 8 13:18:50 EST 2016 selfserv_9159 with PID 18278 started at Fri Jan 8 13:18:50 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 13:18:50 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:18:50 EST 2016 ssl.sh: #4083: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 18278 at Fri Jan 8 13:18:50 EST 2016 kill -USR1 18278 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18278 killed at Fri Jan 8 13:18:51 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:18:51 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:18:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:18:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4084: Waiting for Server - FAILED kill -0 18358 >/dev/null 2>/dev/null selfserv_9159 with PID 18358 found at Fri Jan 8 13:18:57 EST 2016 selfserv_9159 with PID 18358 started at Fri Jan 8 13:18:57 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \ localhost.localdomain strsclnt started at Fri Jan 8 13:18:57 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:18:57 EST 2016 ssl.sh: #4085: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 18358 at Fri Jan 8 13:18:57 EST 2016 kill -USR1 18358 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18358 killed at Fri Jan 8 13:18:58 EST 2016 ssl.sh: skipping (non-FIPS only) ssl.sh: skipping ############################ (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping -V_ssl3:_-c_1000_-C_:0038_-u Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (session ticket) (non-FIPS only) ssl.sh: skipping session ticket test, once session tickets with DHE_DSS are working (non-FIPS only) ssl.sh: skipping Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) (non-FIPS only) ssl.sh: skipping -V_ssl3:_-c_1000_-C_:006A Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (non-FIPS only) ssl.sh: skipping reuse test, once the session cache with DHE_DSS is working (non-FIPS only) ssl.sh: skipping Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:18:58 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:18:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:19:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4086: Waiting for Server - FAILED kill -0 18509 >/dev/null 2>/dev/null selfserv_9159 with PID 18509 found at Fri Jan 8 13:19:04 EST 2016 selfserv_9159 with PID 18509 started at Fri Jan 8 13:19:04 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 100 -C :0032 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 13:19:04 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:19:04 EST 2016 ssl.sh: #4087: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 18509 at Fri Jan 8 13:19:05 EST 2016 kill -USR1 18509 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18509 killed at Fri Jan 8 13:19:05 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:19:05 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:19:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:19:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4088: Waiting for Server - FAILED kill -0 18589 >/dev/null 2>/dev/null selfserv_9159 with PID 18589 found at Fri Jan 8 13:19:11 EST 2016 selfserv_9159 with PID 18589 started at Fri Jan 8 13:19:11 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 1000 -C :0067 -n TestUser-dsamixed \ localhost.localdomain strsclnt started at Fri Jan 8 13:19:11 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:19:11 EST 2016 ssl.sh: #4089: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 18589 at Fri Jan 8 13:19:12 EST 2016 kill -USR1 18589 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18589 killed at Fri Jan 8 13:19:12 EST 2016 ssl.sh: skipping session ticket test, once session tickets with DHE_DSS are working (non-FIPS only) ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:19:12 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:19:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:19:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4090: Waiting for Server - FAILED kill -0 18680 >/dev/null 2>/dev/null selfserv_9159 with PID 18680 found at Fri Jan 8 13:19:18 EST 2016 selfserv_9159 with PID 18680 started at Fri Jan 8 13:19:18 EST 2016 strsclnt -q -p 9159 -d ../client -w nss -V ssl3: -c 1000 -C :00A2 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 13:19:18 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:19:19 EST 2016 ssl.sh: #4091: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 18680 at Fri Jan 8 13:19:19 EST 2016 kill -USR1 18680 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18680 killed at Fri Jan 8 13:19:19 EST 2016 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips - with ECC =============================== selfserv_9159 starting at Fri Jan 8 13:19:19 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:19:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:19:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4092: Waiting for Server - FAILED kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:25 EST 2016 selfserv_9159 with PID 18746 started at Fri Jan 8 13:19:25 EST 2016 ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping A SSL2_RC4_128_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping B SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping C SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping D SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping E SSL2_DES_64_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping F SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping B SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping C SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping E SSL2_DES_64_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4093: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4094: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4095: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping f SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping g SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4096: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4097: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4098: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping l SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping m SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4099: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4100: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4101: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4102: SSL3_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4103: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4104: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4105: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4106: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4107: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4108: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping f TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping g TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4109: TLS_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4110: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4111: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping l TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping m TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4112: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4113: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4114: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4115: TLS_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4116: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4117: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4118: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping f TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping g TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4119: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4120: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4121: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping l TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping m TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4122: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4123: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4124: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4125: TLS11_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4126: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4127: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4128: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4129: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4130: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4131: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping l TLS12_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: skipping m TLS12_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4132: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4133: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4134: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4135: TLS12_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4136: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4137: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4138: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4139: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4140: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4141: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4142: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4143: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4144: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4145: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4146: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4147: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4148: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4149: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4150: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4151: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4152: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4153: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4154: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4155: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:19:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4156: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:20:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4157: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:20:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4158: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:20:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4159: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 18746 >/dev/null 2>/dev/null selfserv_9159 with PID 18746 found at Fri Jan 8 13:20:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4160: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 18746 at Fri Jan 8 13:20:02 EST 2016 kill -USR1 18746 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18746 killed at Fri Jan 8 13:20:02 EST 2016 ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 13:20:02 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:20:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:20:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4161: Waiting for Server - FAILED kill -0 20782 >/dev/null 2>/dev/null selfserv_9159 with PID 20782 found at Fri Jan 8 13:20:08 EST 2016 selfserv_9159 with PID 20782 started at Fri Jan 8 13:20:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4162: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 20782 >/dev/null 2>/dev/null selfserv_9159 with PID 20782 found at Fri Jan 8 13:20:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4163: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 20782 >/dev/null 2>/dev/null selfserv_9159 with PID 20782 found at Fri Jan 8 13:20:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4164: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 20782 >/dev/null 2>/dev/null selfserv_9159 with PID 20782 found at Fri Jan 8 13:20:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4165: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 20782 >/dev/null 2>/dev/null selfserv_9159 with PID 20782 found at Fri Jan 8 13:20:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4166: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 20782 at Fri Jan 8 13:20:11 EST 2016 kill -USR1 20782 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20782 killed at Fri Jan 8 13:20:11 EST 2016 ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 13:20:12 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:20:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:20:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4167: Waiting for Server - FAILED kill -0 20948 >/dev/null 2>/dev/null selfserv_9159 with PID 20948 found at Fri Jan 8 13:20:17 EST 2016 selfserv_9159 with PID 20948 started at Fri Jan 8 13:20:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4168: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 20948 >/dev/null 2>/dev/null selfserv_9159 with PID 20948 found at Fri Jan 8 13:20:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4169: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 20948 >/dev/null 2>/dev/null selfserv_9159 with PID 20948 found at Fri Jan 8 13:20:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4170: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 20948 >/dev/null 2>/dev/null selfserv_9159 with PID 20948 found at Fri Jan 8 13:20:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4171: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 20948 >/dev/null 2>/dev/null selfserv_9159 with PID 20948 found at Fri Jan 8 13:20:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4172: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 20948 >/dev/null 2>/dev/null selfserv_9159 with PID 20948 found at Fri Jan 8 13:20:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4173: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 20948 >/dev/null 2>/dev/null selfserv_9159 with PID 20948 found at Fri Jan 8 13:20:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4174: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 20948 >/dev/null 2>/dev/null selfserv_9159 with PID 20948 found at Fri Jan 8 13:20:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4175: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 20948 >/dev/null 2>/dev/null selfserv_9159 with PID 20948 found at Fri Jan 8 13:20:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4176: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 20948 >/dev/null 2>/dev/null selfserv_9159 with PID 20948 found at Fri Jan 8 13:20:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4177: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 20948 >/dev/null 2>/dev/null selfserv_9159 with PID 20948 found at Fri Jan 8 13:20:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4178: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 20948 >/dev/null 2>/dev/null selfserv_9159 with PID 20948 found at Fri Jan 8 13:20:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4179: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 20948 >/dev/null 2>/dev/null selfserv_9159 with PID 20948 found at Fri Jan 8 13:20:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4180: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 20948 >/dev/null 2>/dev/null selfserv_9159 with PID 20948 found at Fri Jan 8 13:20:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4181: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 20948 >/dev/null 2>/dev/null selfserv_9159 with PID 20948 found at Fri Jan 8 13:20:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4182: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 20948 at Fri Jan 8 13:20:25 EST 2016 kill -USR1 20948 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20948 killed at Fri Jan 8 13:20:26 EST 2016 ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 13:20:26 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:20:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:20:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4183: Waiting for Server - FAILED kill -0 21361 >/dev/null 2>/dev/null selfserv_9159 with PID 21361 found at Fri Jan 8 13:20:32 EST 2016 selfserv_9159 with PID 21361 started at Fri Jan 8 13:20:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4184: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 21361 >/dev/null 2>/dev/null selfserv_9159 with PID 21361 found at Fri Jan 8 13:20:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4185: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 21361 >/dev/null 2>/dev/null selfserv_9159 with PID 21361 found at Fri Jan 8 13:20:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4186: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 21361 >/dev/null 2>/dev/null selfserv_9159 with PID 21361 found at Fri Jan 8 13:20:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4187: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 21361 >/dev/null 2>/dev/null selfserv_9159 with PID 21361 found at Fri Jan 8 13:20:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4188: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 21361 at Fri Jan 8 13:20:34 EST 2016 kill -USR1 21361 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21361 killed at Fri Jan 8 13:20:35 EST 2016 ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 13:20:35 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:20:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:20:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4189: Waiting for Server - FAILED kill -0 21527 >/dev/null 2>/dev/null selfserv_9159 with PID 21527 found at Fri Jan 8 13:20:41 EST 2016 selfserv_9159 with PID 21527 started at Fri Jan 8 13:20:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4190: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 21527 >/dev/null 2>/dev/null selfserv_9159 with PID 21527 found at Fri Jan 8 13:20:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4191: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 21527 >/dev/null 2>/dev/null selfserv_9159 with PID 21527 found at Fri Jan 8 13:20:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4192: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 21527 >/dev/null 2>/dev/null selfserv_9159 with PID 21527 found at Fri Jan 8 13:20:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4193: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 21527 >/dev/null 2>/dev/null selfserv_9159 with PID 21527 found at Fri Jan 8 13:20:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4194: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 21527 >/dev/null 2>/dev/null selfserv_9159 with PID 21527 found at Fri Jan 8 13:20:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4195: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 21527 >/dev/null 2>/dev/null selfserv_9159 with PID 21527 found at Fri Jan 8 13:20:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4196: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 21527 >/dev/null 2>/dev/null selfserv_9159 with PID 21527 found at Fri Jan 8 13:20:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4197: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 21527 >/dev/null 2>/dev/null selfserv_9159 with PID 21527 found at Fri Jan 8 13:20:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4198: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 21527 >/dev/null 2>/dev/null selfserv_9159 with PID 21527 found at Fri Jan 8 13:20:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4199: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 21527 >/dev/null 2>/dev/null selfserv_9159 with PID 21527 found at Fri Jan 8 13:20:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4200: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 21527 >/dev/null 2>/dev/null selfserv_9159 with PID 21527 found at Fri Jan 8 13:20:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4201: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 21527 >/dev/null 2>/dev/null selfserv_9159 with PID 21527 found at Fri Jan 8 13:20:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4202: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 21527 >/dev/null 2>/dev/null selfserv_9159 with PID 21527 found at Fri Jan 8 13:20:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4203: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 21527 >/dev/null 2>/dev/null selfserv_9159 with PID 21527 found at Fri Jan 8 13:20:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4204: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 21527 at Fri Jan 8 13:20:49 EST 2016 kill -USR1 21527 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21527 killed at Fri Jan 8 13:20:49 EST 2016 ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 13:20:49 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:20:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:20:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4205: Waiting for Server - FAILED kill -0 21940 >/dev/null 2>/dev/null selfserv_9159 with PID 21940 found at Fri Jan 8 13:20:55 EST 2016 selfserv_9159 with PID 21940 started at Fri Jan 8 13:20:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4206: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 21940 >/dev/null 2>/dev/null selfserv_9159 with PID 21940 found at Fri Jan 8 13:20:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4207: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 21940 >/dev/null 2>/dev/null selfserv_9159 with PID 21940 found at Fri Jan 8 13:20:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4208: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 21940 >/dev/null 2>/dev/null selfserv_9159 with PID 21940 found at Fri Jan 8 13:20:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4209: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 21940 >/dev/null 2>/dev/null selfserv_9159 with PID 21940 found at Fri Jan 8 13:20:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4210: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 21940 at Fri Jan 8 13:20:58 EST 2016 kill -USR1 21940 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21940 killed at Fri Jan 8 13:20:58 EST 2016 ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 13:20:58 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:20:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:21:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4211: Waiting for Server - FAILED kill -0 22106 >/dev/null 2>/dev/null selfserv_9159 with PID 22106 found at Fri Jan 8 13:21:04 EST 2016 selfserv_9159 with PID 22106 started at Fri Jan 8 13:21:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4212: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 22106 >/dev/null 2>/dev/null selfserv_9159 with PID 22106 found at Fri Jan 8 13:21:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4213: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 22106 >/dev/null 2>/dev/null selfserv_9159 with PID 22106 found at Fri Jan 8 13:21:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4214: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 22106 >/dev/null 2>/dev/null selfserv_9159 with PID 22106 found at Fri Jan 8 13:21:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4215: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 22106 >/dev/null 2>/dev/null selfserv_9159 with PID 22106 found at Fri Jan 8 13:21:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4216: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 22106 >/dev/null 2>/dev/null selfserv_9159 with PID 22106 found at Fri Jan 8 13:21:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4217: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 22106 >/dev/null 2>/dev/null selfserv_9159 with PID 22106 found at Fri Jan 8 13:21:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4218: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 22106 >/dev/null 2>/dev/null selfserv_9159 with PID 22106 found at Fri Jan 8 13:21:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4219: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 22106 >/dev/null 2>/dev/null selfserv_9159 with PID 22106 found at Fri Jan 8 13:21:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4220: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 22106 >/dev/null 2>/dev/null selfserv_9159 with PID 22106 found at Fri Jan 8 13:21:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4221: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 22106 >/dev/null 2>/dev/null selfserv_9159 with PID 22106 found at Fri Jan 8 13:21:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4222: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 22106 >/dev/null 2>/dev/null selfserv_9159 with PID 22106 found at Fri Jan 8 13:21:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4223: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 22106 >/dev/null 2>/dev/null selfserv_9159 with PID 22106 found at Fri Jan 8 13:21:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4224: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 22106 at Fri Jan 8 13:21:11 EST 2016 kill -USR1 22106 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22106 killed at Fri Jan 8 13:21:11 EST 2016 ssl.sh: SSL Client Authentication Extended Test - server normal/client fips - with ECC =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 13:21:11 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:21:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:21:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4225: Waiting for Server - FAILED kill -0 22519 >/dev/null 2>/dev/null selfserv_9159 with PID 22519 found at Fri Jan 8 13:21:17 EST 2016 selfserv_9159 with PID 22519 started at Fri Jan 8 13:21:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4226: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 22519 at Fri Jan 8 13:21:18 EST 2016 kill -USR1 22519 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22519 killed at Fri Jan 8 13:21:18 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:21:18 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:21:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:21:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4227: Waiting for Server - FAILED kill -0 22589 >/dev/null 2>/dev/null selfserv_9159 with PID 22589 found at Fri Jan 8 13:21:24 EST 2016 selfserv_9159 with PID 22589 started at Fri Jan 8 13:21:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4228: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 22589 at Fri Jan 8 13:21:25 EST 2016 kill -USR1 22589 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22589 killed at Fri Jan 8 13:21:25 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:21:25 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:21:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:21:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4229: Waiting for Server - FAILED kill -0 22658 >/dev/null 2>/dev/null selfserv_9159 with PID 22658 found at Fri Jan 8 13:21:31 EST 2016 selfserv_9159 with PID 22658 started at Fri Jan 8 13:21:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4230: TLS Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 22658 at Fri Jan 8 13:21:32 EST 2016 kill -USR1 22658 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22658 killed at Fri Jan 8 13:21:32 EST 2016 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 13:21:32 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:21:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:21:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4231: Waiting for Server - FAILED kill -0 22733 >/dev/null 2>/dev/null selfserv_9159 with PID 22733 found at Fri Jan 8 13:21:38 EST 2016 selfserv_9159 with PID 22733 started at Fri Jan 8 13:21:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4232: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 22733 at Fri Jan 8 13:21:39 EST 2016 kill -USR1 22733 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22733 killed at Fri Jan 8 13:21:39 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:21:39 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:21:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:21:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4233: Waiting for Server - FAILED kill -0 22803 >/dev/null 2>/dev/null selfserv_9159 with PID 22803 found at Fri Jan 8 13:21:45 EST 2016 selfserv_9159 with PID 22803 started at Fri Jan 8 13:21:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4234: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 22803 at Fri Jan 8 13:21:45 EST 2016 kill -USR1 22803 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22803 killed at Fri Jan 8 13:21:46 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:21:46 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:21:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:21:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4235: Waiting for Server - FAILED kill -0 22872 >/dev/null 2>/dev/null selfserv_9159 with PID 22872 found at Fri Jan 8 13:21:52 EST 2016 selfserv_9159 with PID 22872 started at Fri Jan 8 13:21:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4236: SSL3 Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 22872 at Fri Jan 8 13:21:52 EST 2016 kill -USR1 22872 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22872 killed at Fri Jan 8 13:21:53 EST 2016 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 13:21:53 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:21:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:21:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4237: Waiting for Server - FAILED kill -0 22947 >/dev/null 2>/dev/null selfserv_9159 with PID 22947 found at Fri Jan 8 13:21:59 EST 2016 selfserv_9159 with PID 22947 started at Fri Jan 8 13:21:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4238: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 22947 at Fri Jan 8 13:21:59 EST 2016 kill -USR1 22947 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22947 killed at Fri Jan 8 13:22:00 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:22:00 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:22:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:22:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4239: Waiting for Server - FAILED kill -0 23017 >/dev/null 2>/dev/null selfserv_9159 with PID 23017 found at Fri Jan 8 13:22:06 EST 2016 selfserv_9159 with PID 23017 started at Fri Jan 8 13:22:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4240: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 23017 at Fri Jan 8 13:22:06 EST 2016 kill -USR1 23017 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23017 killed at Fri Jan 8 13:22:07 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:22:07 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:22:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:22:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4241: Waiting for Server - FAILED kill -0 23086 >/dev/null 2>/dev/null selfserv_9159 with PID 23086 found at Fri Jan 8 13:22:13 EST 2016 selfserv_9159 with PID 23086 started at Fri Jan 8 13:22:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4242: TLS Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23086 at Fri Jan 8 13:22:13 EST 2016 kill -USR1 23086 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23086 killed at Fri Jan 8 13:22:14 EST 2016 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 13:22:14 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:22:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:22:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4243: Waiting for Server - FAILED kill -0 23161 >/dev/null 2>/dev/null selfserv_9159 with PID 23161 found at Fri Jan 8 13:22:20 EST 2016 selfserv_9159 with PID 23161 started at Fri Jan 8 13:22:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4244: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 23161 at Fri Jan 8 13:22:20 EST 2016 kill -USR1 23161 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23161 killed at Fri Jan 8 13:22:21 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:22:21 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:22:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:22:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4245: Waiting for Server - FAILED kill -0 23231 >/dev/null 2>/dev/null selfserv_9159 with PID 23231 found at Fri Jan 8 13:22:27 EST 2016 selfserv_9159 with PID 23231 started at Fri Jan 8 13:22:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4246: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 23231 at Fri Jan 8 13:22:27 EST 2016 kill -USR1 23231 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23231 killed at Fri Jan 8 13:22:27 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:22:28 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:22:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:22:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4247: Waiting for Server - FAILED kill -0 23300 >/dev/null 2>/dev/null selfserv_9159 with PID 23300 found at Fri Jan 8 13:22:33 EST 2016 selfserv_9159 with PID 23300 started at Fri Jan 8 13:22:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4248: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23300 at Fri Jan 8 13:22:34 EST 2016 kill -USR1 23300 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23300 killed at Fri Jan 8 13:22:34 EST 2016 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 13:22:35 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:22:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:22:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4249: Waiting for Server - FAILED kill -0 23375 >/dev/null 2>/dev/null selfserv_9159 with PID 23375 found at Fri Jan 8 13:22:40 EST 2016 selfserv_9159 with PID 23375 started at Fri Jan 8 13:22:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4250: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 23375 at Fri Jan 8 13:22:41 EST 2016 kill -USR1 23375 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23375 killed at Fri Jan 8 13:22:41 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:22:41 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:22:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:22:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4251: Waiting for Server - FAILED kill -0 23445 >/dev/null 2>/dev/null selfserv_9159 with PID 23445 found at Fri Jan 8 13:22:47 EST 2016 selfserv_9159 with PID 23445 started at Fri Jan 8 13:22:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4252: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 23445 at Fri Jan 8 13:22:48 EST 2016 kill -USR1 23445 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23445 killed at Fri Jan 8 13:22:48 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:22:48 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:22:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:22:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4253: Waiting for Server - FAILED kill -0 23514 >/dev/null 2>/dev/null selfserv_9159 with PID 23514 found at Fri Jan 8 13:22:54 EST 2016 selfserv_9159 with PID 23514 started at Fri Jan 8 13:22:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4254: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23514 at Fri Jan 8 13:22:55 EST 2016 kill -USR1 23514 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23514 killed at Fri Jan 8 13:22:55 EST 2016 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:22:55 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:22:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:23:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4255: Waiting for Server - FAILED kill -0 23602 >/dev/null 2>/dev/null selfserv_9159 with PID 23602 found at Fri Jan 8 13:23:01 EST 2016 selfserv_9159 with PID 23602 started at Fri Jan 8 13:23:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4256: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 23602 at Fri Jan 8 13:23:02 EST 2016 kill -USR1 23602 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23602 killed at Fri Jan 8 13:23:02 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:23:02 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:23:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:23:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4257: Waiting for Server - FAILED kill -0 23672 >/dev/null 2>/dev/null selfserv_9159 with PID 23672 found at Fri Jan 8 13:23:08 EST 2016 selfserv_9159 with PID 23672 started at Fri Jan 8 13:23:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4258: TLS Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23672 at Fri Jan 8 13:23:09 EST 2016 kill -USR1 23672 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23672 killed at Fri Jan 8 13:23:09 EST 2016 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:23:09 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:23:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:23:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4259: Waiting for Server - FAILED kill -0 23745 >/dev/null 2>/dev/null selfserv_9159 with PID 23745 found at Fri Jan 8 13:23:15 EST 2016 selfserv_9159 with PID 23745 started at Fri Jan 8 13:23:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4260: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 23745 at Fri Jan 8 13:23:16 EST 2016 kill -USR1 23745 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23745 killed at Fri Jan 8 13:23:16 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:23:16 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:23:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:23:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4261: Waiting for Server - FAILED kill -0 23815 >/dev/null 2>/dev/null selfserv_9159 with PID 23815 found at Fri Jan 8 13:23:22 EST 2016 selfserv_9159 with PID 23815 started at Fri Jan 8 13:23:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V :ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4262: SSL3 Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23815 at Fri Jan 8 13:23:23 EST 2016 kill -USR1 23815 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23815 killed at Fri Jan 8 13:23:23 EST 2016 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:23:23 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:23:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:23:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4263: Waiting for Server - FAILED kill -0 23888 >/dev/null 2>/dev/null selfserv_9159 with PID 23888 found at Fri Jan 8 13:23:29 EST 2016 selfserv_9159 with PID 23888 started at Fri Jan 8 13:23:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4264: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 23888 at Fri Jan 8 13:23:30 EST 2016 kill -USR1 23888 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23888 killed at Fri Jan 8 13:23:30 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:23:30 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:23:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:23:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4265: Waiting for Server - FAILED kill -0 23957 >/dev/null 2>/dev/null selfserv_9159 with PID 23957 found at Fri Jan 8 13:23:36 EST 2016 selfserv_9159 with PID 23957 started at Fri Jan 8 13:23:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4266: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23957 at Fri Jan 8 13:23:36 EST 2016 kill -USR1 23957 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23957 killed at Fri Jan 8 13:23:37 EST 2016 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:23:37 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:23:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:23:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4267: Waiting for Server - FAILED kill -0 24031 >/dev/null 2>/dev/null selfserv_9159 with PID 24031 found at Fri Jan 8 13:23:43 EST 2016 selfserv_9159 with PID 24031 started at Fri Jan 8 13:23:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4268: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 24031 at Fri Jan 8 13:23:43 EST 2016 kill -USR1 24031 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24031 killed at Fri Jan 8 13:23:44 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:23:44 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:23:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:23:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4269: Waiting for Server - FAILED kill -0 24100 >/dev/null 2>/dev/null selfserv_9159 with PID 24100 found at Fri Jan 8 13:23:50 EST 2016 selfserv_9159 with PID 24100 started at Fri Jan 8 13:23:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4270: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 24100 at Fri Jan 8 13:23:50 EST 2016 kill -USR1 24100 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24100 killed at Fri Jan 8 13:23:51 EST 2016 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 13:23:51 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:23:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:23:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4271: Waiting for Server - FAILED kill -0 24173 >/dev/null 2>/dev/null selfserv_9159 with PID 24173 found at Fri Jan 8 13:23:57 EST 2016 selfserv_9159 with PID 24173 started at Fri Jan 8 13:23:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4272: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 24173 at Fri Jan 8 13:23:57 EST 2016 kill -USR1 24173 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24173 killed at Fri Jan 8 13:23:58 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:23:58 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:23:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:24:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4273: Waiting for Server - FAILED kill -0 24243 >/dev/null 2>/dev/null selfserv_9159 with PID 24243 found at Fri Jan 8 13:24:04 EST 2016 selfserv_9159 with PID 24243 started at Fri Jan 8 13:24:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4274: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 24243 at Fri Jan 8 13:24:04 EST 2016 kill -USR1 24243 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24243 killed at Fri Jan 8 13:24:05 EST 2016 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client fips - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Stress Test Extended Test - server normal/client fips - with ECC =============================== ssl.sh: skipping Form is subject to the terms of the Mozilla Public (non-FIPS only) ssl.sh: skipping If a copy of the MPL was not distributed with this (non-FIPS only) ssl.sh: skipping obtain one at http://mozilla.org/MPL/2.0/. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping the stress tests for SSL/TLS. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping client Test Case name (non-FIPS only) ssl.sh: skipping params (non-FIPS only) ssl.sh: skipping ------ --------------- (non-FIPS only) ssl.sh: skipping -c_1000_-C_A Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: skipping Stress SSL3 RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (false start) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (compression) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression, false start) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping -c_100_-C_A_-N_-n_TestUser Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:24:05 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:24:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:24:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4275: Waiting for Server - FAILED kill -0 24444 >/dev/null 2>/dev/null selfserv_9159 with PID 24444 found at Fri Jan 8 13:24:11 EST 2016 selfserv_9159 with PID 24444 started at Fri Jan 8 13:24:11 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Fri Jan 8 13:24:11 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:24:12 EST 2016 ssl.sh: #4276: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 24444 at Fri Jan 8 13:24:12 EST 2016 kill -USR1 24444 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24444 killed at Fri Jan 8 13:24:12 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:24:12 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:24:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:24:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4277: Waiting for Server - FAILED kill -0 24523 >/dev/null 2>/dev/null selfserv_9159 with PID 24523 found at Fri Jan 8 13:24:18 EST 2016 selfserv_9159 with PID 24523 started at Fri Jan 8 13:24:18 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Fri Jan 8 13:24:18 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:24:19 EST 2016 ssl.sh: #4278: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 24523 at Fri Jan 8 13:24:19 EST 2016 kill -USR1 24523 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24523 killed at Fri Jan 8 13:24:19 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:24:19 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:24:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:24:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4279: Waiting for Server - FAILED kill -0 24603 >/dev/null 2>/dev/null selfserv_9159 with PID 24603 found at Fri Jan 8 13:24:25 EST 2016 selfserv_9159 with PID 24603 started at Fri Jan 8 13:24:25 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Fri Jan 8 13:24:25 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:24:26 EST 2016 ssl.sh: #4280: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 24603 at Fri Jan 8 13:24:26 EST 2016 kill -USR1 24603 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24603 killed at Fri Jan 8 13:24:26 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:24:26 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:24:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:24:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4281: Waiting for Server - FAILED kill -0 24682 >/dev/null 2>/dev/null selfserv_9159 with PID 24682 found at Fri Jan 8 13:24:32 EST 2016 selfserv_9159 with PID 24682 started at Fri Jan 8 13:24:32 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Fri Jan 8 13:24:32 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:24:33 EST 2016 ssl.sh: #4282: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 24682 at Fri Jan 8 13:24:33 EST 2016 kill -USR1 24682 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24682 killed at Fri Jan 8 13:24:33 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9159 starting at Fri Jan 8 13:24:33 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:24:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:24:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4283: Waiting for Server - FAILED kill -0 24761 >/dev/null 2>/dev/null selfserv_9159 with PID 24761 found at Fri Jan 8 13:24:39 EST 2016 selfserv_9159 with PID 24761 started at Fri Jan 8 13:24:39 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 13:24:39 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:24:40 EST 2016 ssl.sh: #4284: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 24761 at Fri Jan 8 13:24:40 EST 2016 kill -USR1 24761 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24761 killed at Fri Jan 8 13:24:40 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:24:40 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:24:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:24:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4285: Waiting for Server - FAILED kill -0 24843 >/dev/null 2>/dev/null selfserv_9159 with PID 24843 found at Fri Jan 8 13:24:46 EST 2016 selfserv_9159 with PID 24843 started at Fri Jan 8 13:24:46 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 13:24:46 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:24:47 EST 2016 ssl.sh: #4286: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 24843 at Fri Jan 8 13:24:47 EST 2016 kill -USR1 24843 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24843 killed at Fri Jan 8 13:24:47 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9159 starting at Fri Jan 8 13:24:47 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:24:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:24:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4287: Waiting for Server - FAILED kill -0 24922 >/dev/null 2>/dev/null selfserv_9159 with PID 24922 found at Fri Jan 8 13:24:53 EST 2016 selfserv_9159 with PID 24922 started at Fri Jan 8 13:24:53 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 13:24:53 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:24:54 EST 2016 ssl.sh: #4288: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 24922 at Fri Jan 8 13:24:54 EST 2016 kill -USR1 24922 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24922 killed at Fri Jan 8 13:24:54 EST 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: skipping (non-FIPS only) ssl.sh: skipping ############################ (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA256 (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 GCM (non-FIPS only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:24:55 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:24:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:25:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4289: Waiting for Server - FAILED kill -0 25075 >/dev/null 2>/dev/null selfserv_9159 with PID 25075 found at Fri Jan 8 13:25:01 EST 2016 selfserv_9159 with PID 25075 started at Fri Jan 8 13:25:01 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 10 -C :C009 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 13:25:01 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:25:01 EST 2016 ssl.sh: #4290: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 25075 at Fri Jan 8 13:25:01 EST 2016 kill -USR1 25075 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25075 killed at Fri Jan 8 13:25:02 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:25:02 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:25:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:25:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4291: Waiting for Server - FAILED kill -0 25157 >/dev/null 2>/dev/null selfserv_9159 with PID 25157 found at Fri Jan 8 13:25:08 EST 2016 selfserv_9159 with PID 25157 started at Fri Jan 8 13:25:08 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 13:25:08 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:25:08 EST 2016 ssl.sh: #4292: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 25157 at Fri Jan 8 13:25:08 EST 2016 kill -USR1 25157 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25157 killed at Fri Jan 8 13:25:09 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:25:09 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:25:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:25:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4293: Waiting for Server - FAILED kill -0 25237 >/dev/null 2>/dev/null selfserv_9159 with PID 25237 found at Fri Jan 8 13:25:15 EST 2016 selfserv_9159 with PID 25237 started at Fri Jan 8 13:25:15 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 10 -C :C004 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 13:25:15 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:25:15 EST 2016 ssl.sh: #4294: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 25237 at Fri Jan 8 13:25:15 EST 2016 kill -USR1 25237 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25237 killed at Fri Jan 8 13:25:16 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:25:16 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:25:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:25:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4295: Waiting for Server - FAILED kill -0 25316 >/dev/null 2>/dev/null selfserv_9159 with PID 25316 found at Fri Jan 8 13:25:22 EST 2016 selfserv_9159 with PID 25316 started at Fri Jan 8 13:25:22 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \ localhost.localdomain strsclnt started at Fri Jan 8 13:25:22 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:25:22 EST 2016 ssl.sh: #4296: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 25316 at Fri Jan 8 13:25:22 EST 2016 kill -USR1 25316 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25316 killed at Fri Jan 8 13:25:23 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9159 starting at Fri Jan 8 13:25:23 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:25:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:25:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4297: Waiting for Server - FAILED kill -0 25396 >/dev/null 2>/dev/null selfserv_9159 with PID 25396 found at Fri Jan 8 13:25:29 EST 2016 selfserv_9159 with PID 25396 started at Fri Jan 8 13:25:29 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 13:25:29 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:25:29 EST 2016 ssl.sh: #4298: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 25396 at Fri Jan 8 13:25:29 EST 2016 kill -USR1 25396 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25396 killed at Fri Jan 8 13:25:30 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:25:30 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:25:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:25:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4299: Waiting for Server - FAILED kill -0 25475 >/dev/null 2>/dev/null selfserv_9159 with PID 25475 found at Fri Jan 8 13:25:36 EST 2016 selfserv_9159 with PID 25475 started at Fri Jan 8 13:25:36 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \ localhost.localdomain strsclnt started at Fri Jan 8 13:25:36 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:25:36 EST 2016 ssl.sh: #4300: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 25475 at Fri Jan 8 13:25:37 EST 2016 kill -USR1 25475 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25475 killed at Fri Jan 8 13:25:37 EST 2016 ssl.sh: skipping (non-FIPS only) ssl.sh: skipping ############################ (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping -V_ssl3:_-c_1000_-C_:0038_-u Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (session ticket) (non-FIPS only) ssl.sh: skipping session ticket test, once session tickets with DHE_DSS are working (non-FIPS only) ssl.sh: skipping Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) (non-FIPS only) ssl.sh: skipping -V_ssl3:_-c_1000_-C_:006A Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (non-FIPS only) ssl.sh: skipping reuse test, once the session cache with DHE_DSS is working (non-FIPS only) ssl.sh: skipping Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:25:37 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:25:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:25:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4301: Waiting for Server - FAILED kill -0 25626 >/dev/null 2>/dev/null selfserv_9159 with PID 25626 found at Fri Jan 8 13:25:43 EST 2016 selfserv_9159 with PID 25626 started at Fri Jan 8 13:25:43 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 13:25:43 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:25:44 EST 2016 ssl.sh: #4302: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 25626 at Fri Jan 8 13:25:44 EST 2016 kill -USR1 25626 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25626 killed at Fri Jan 8 13:25:44 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9159 starting at Fri Jan 8 13:25:44 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:25:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:25:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4303: Waiting for Server - FAILED kill -0 25706 >/dev/null 2>/dev/null selfserv_9159 with PID 25706 found at Fri Jan 8 13:25:50 EST 2016 selfserv_9159 with PID 25706 started at Fri Jan 8 13:25:50 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \ localhost.localdomain strsclnt started at Fri Jan 8 13:25:50 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:25:51 EST 2016 ssl.sh: #4304: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 25706 at Fri Jan 8 13:25:51 EST 2016 kill -USR1 25706 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25706 killed at Fri Jan 8 13:25:51 EST 2016 ssl.sh: skipping session ticket test, once session tickets with DHE_DSS are working (non-FIPS only) ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 13:25:51 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 13:25:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 13:25:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #4305: Waiting for Server - FAILED kill -0 25796 >/dev/null 2>/dev/null selfserv_9159 with PID 25796 found at Fri Jan 8 13:25:57 EST 2016 selfserv_9159 with PID 25796 started at Fri Jan 8 13:25:57 EST 2016 strsclnt -q -p 9159 -d ../ext_client -w nss -V ssl3: -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 13:25:57 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 13:25:58 EST 2016 ssl.sh: #4306: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 25796 at Fri Jan 8 13:25:58 EST 2016 kill -USR1 25796 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25796 killed at Fri Jan 8 13:25:58 EST 2016 ssl.sh: SSL - FIPS mode off for client =============================== ssl.sh: Turning FIPS off for the client modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -fips false -force FIPS mode disabled. ssl.sh: #4307: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/client -list ssl.sh: #4308: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #4309: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -fips false -force FIPS mode disabled. ssl.sh: #4310: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/ext_client -list ssl.sh: #4311: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #4312: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED TIMESTAMP ssl END: Fri Jan 8 13:26:01 EST 2016 Running tests for ocsp TIMESTAMP ocsp BEGIN: Fri Jan 8 13:26:01 EST 2016 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Fri Jan 8 13:26:01 EST 2016 Running tests for merge TIMESTAMP merge BEGIN: Fri Jan 8 13:26:01 EST 2016 merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests.v3.27064 -t Test2 -f ../tests.pw merge.sh: #4313: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw merge.sh: #4314: Merging Dave - PASSED merge.sh: Merging in new user certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw merge.sh: #4315: Merging server - PASSED merge.sh: Merging in new chain certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw merge.sh: #4316: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #4317: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #4318: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:19:01 2016 Not After : Fri Jan 08 16:19:01 2021 Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:af:f1:41:16:95:ad:42:a9:d4:ea:28:e0:b7:0d:e0: f8:41:25:11:3a:93:9c:9c:53:0d:ed:cd:1b:9b:15:f9: a3:7f:b6:16:c7:ed:2b:ef:d1:d6:a4:cb:78:05:39:43: 1e:00:23:c1:43:96:0c:6d:fb:39:64:fa:ba:e5:8b:e5: 68:b0:71:cf:20:47:82:9e:75:e8:bc:23:93:aa:4f:84: 1c:d7:64:9b:96:26:04:4f:03:57:25:65:06:03:d9:c2: ad:93:08:be:f3:5b:97:ff:2b:b8:33:9d:78:54:d2:17: 83:6b:7b:80:72:c3:10:ef:a4:32:d5:70:02:7c:35:88: 59:28:b2:f1:36:32:86:88:9e:2b:44:80:48:39:f6:0a: 05:4b:54:a5:fc:4e:cb:71:3b:1e:f9:32:d7:c4:1e:73: 0d:08:a8:36:eb:b7:78:61:ba:e7:b9:00:e4:eb:c3:74: c6:b3:3f:e5:25:7b:11:a9:dd:cc:c2:46:0f:92:09:e3: 33:cc:44:53:78:c5:b3:85:ad:e4:87:3e:50:0a:23:30: 9c:62:67:c7:ef:01:15:5b:63:10:7b:21:10:10:39:fa: 15:33:fa:94:39:56:08:27:38:0f:db:41:c7:d2:76:2d: e3:7e:60:49:72:99:a5:ea:f5:59:a2:30:1e:2f:83:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:33:a2:aa:d0:eb:2d:ff:48:6c:99:5c:9d:fa:ba:e0: ef:96:8a:f8:3a:b5:40:fd:2d:5c:2d:7a:7b:a8:11:4e: 5b:66:fa:96:e1:08:50:1f:8c:9c:d9:36:b2:d6:71:5e: 2e:43:46:99:e5:95:c2:d1:b5:23:da:be:59:8c:90:5a: 11:22:c5:9a:72:38:aa:6d:e1:06:4d:c4:0d:fd:b0:fe: 25:f7:5f:49:a5:1d:84:91:dc:af:25:ac:7a:68:1c:a8: a8:03:ec:1c:8e:f4:7f:d8:59:94:e4:c7:8e:24:bc:06: ba:7c:04:ac:e0:fd:34:37:33:43:33:54:21:90:11:6a: 37:12:fd:d8:83:7f:e3:e0:0f:ac:9d:b0:66:bb:dd:3f: 7a:33:bb:3a:3a:27:40:4f:dc:3d:a4:9d:1e:a8:39:26: 26:ac:fc:a4:c0:2b:b3:d1:47:02:ca:ab:22:a2:a6:42: 02:b1:2c:ae:05:f4:f1:8e:2a:ff:af:e7:b5:67:4f:40: 3b:02:6a:3e:3e:c0:96:be:4b:02:32:f6:56:bf:50:41: dc:b9:3b:db:75:6a:98:06:00:e5:90:55:ea:ad:31:2c: cf:04:7b:49:2a:e3:e5:d0:0e:9e:56:21:eb:3e:cf:e4: 6e:ab:9a:56:69:25:c0:cb:4d:51:83:e2:16:26:32:2f Fingerprint (SHA-256): F3:BD:03:C9:93:56:D0:0B:21:A2:03:85:98:04:98:17:5C:90:EA:40:B9:37:8E:E3:3F:19:63:94:B3:39:D8:38 Fingerprint (SHA1): B8:6B:1D:77:A2:99:7F:C3:B5:29:28:EC:7E:0E:B5:ED:24:6A:B1:C9 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #4319: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:19:14 2016 Not After : Fri Jan 08 16:19:14 2021 Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:b3:ee:5f:92:e8:6d:58:30:fe:ab:c6:ea:9a:6d:39: d8:a8:bd:54:f8:e2:a6:3e:d4:8b:9a:07:e6:71:48:fe: 69:5e:a6:60:85:f8:09:ec:05:f2:4f:46:67:cb:d0:d8: ce:79:89:6f:30:b1:cf:2a:11:ad:ba:e3:27:91:96:6a: 89:1d:b3:59:82:d8:e0:7d:ca:d4:52:a2:b7:f9:3b:e7: 93:b8:43:2b:54:0e:8d:e9:3e:5f:dc:9f:4a:80:eb:8e: 4b:57:af:25:10:f7:ed:b6:c6:0e:a4:7a:a5:bb:3f:f6: 3d:8b:35:18:42:f4:2b:03:82:2f:86:9a:0b:ec:93:20: 3f:f7:78:12:c3:27:6d:eb:7c:01:19:4d:de:15:75:98: a1:47:85:2b:33:89:7f:12:e6:d8:d7:0f:24:31:cb:aa: c8:ed:e0:9c:79:c8:b1:1d:75:e5:7d:7c:b3:ad:a0:ca: f8:03:b7:8b:c6:66:02:3c:8e:4a:ba:ef:c9:54:6b:5c: eb:cc:29:c1:f1:e1:96:92:e5:0f:1f:ff:d9:93:89:db: 7c:af:cd:9d:a5:37:56:fd:a4:d9:7a:2a:0a:f7:f3:18: e3:9d:c8:93:fa:07:1a:c5:e6:e2:8d:ad:91:d6:0c:f9: de:42:ea:c6:fb:b6:fb:50:bb:ca:b5:61:39:21:82:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:fc:a8:01:cc:eb:3c:17:42:ce:1b:7e:d6:dd:9f:f4: 6f:5e:00:54:a6:74:4f:60:09:55:b2:31:8d:43:56:85: b7:4a:92:41:50:39:52:5a:e8:58:bd:76:93:5f:5f:99: d8:ee:4c:66:2c:2c:cd:9b:cf:16:67:4a:16:c6:41:ff: 84:1e:a1:5c:c9:24:e6:19:a8:6e:62:64:28:b8:48:9d: 1c:21:9b:bf:45:42:7f:61:04:79:d7:29:42:74:da:b4: d4:bf:19:ed:65:7d:4f:1b:62:b4:82:3a:04:08:2e:ce: 3c:c9:ec:cc:18:8f:95:87:ee:db:59:73:d4:cb:64:df: 74:65:ee:37:62:c5:91:9a:69:1b:60:0e:99:35:de:56: b0:96:ce:c0:9b:87:7d:00:37:65:96:bd:9b:ed:9b:bf: af:16:6c:9e:28:a1:77:d5:93:e4:12:0c:f1:4b:a1:6e: 13:eb:84:65:9e:f6:c9:ad:33:ee:4f:04:fb:e0:1a:7b: 76:e4:6c:22:d8:4c:fc:77:c6:d7:53:2b:9f:72:bf:22: 22:a5:eb:82:6e:b8:28:3b:86:aa:f1:d5:e1:15:91:d3: db:36:df:08:00:f7:41:a7:4c:c4:43:1b:2c:a1:75:a9: d3:35:b4:c6:1a:c3:13:a1:6d:87:f9:e4:19:0f:f8:d4 Fingerprint (SHA-256): 36:58:FE:31:6D:89:01:BC:80:46:7F:B4:79:93:16:6B:56:60:31:44:5B:A1:8C:DF:3B:CC:8F:79:40:C2:7F:D4 Fingerprint (SHA1): A0:5D:A1:20:AF:BB:02:D9:D0:8E:66:34:AA:5D:53:CF:2A:85:6C:97 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #4320: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw merge.sh: #4321: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI TestCA-dsa CT,C,C Alice-ec u,u,u Dave u,u,u localhost.localdomain-dsamixed ,, serverCA-dsa C,C,C chain-2-clientCA-ec ,, Alice #1 ,, Dave-dsa ,, localhost.localdomain-ecmixed ,, localhost-sni.localdomain-dsamixed ,, Alice #99 ,, Alice-dsamixed u,u,u eve@bogus.com ,, bob-ec@bogus.com ,, localhost.localdomain u,u,u localhost-sni.localdomain-ecmixed ,, clientCA T,C,C Alice #3 ,, TestCA CT,C,C TestCA-ec CT,C,C Alice-ecmixed u,u,u Dave-ecmixed ,, localhost.localdomain-dsa ,, localhost-sni.localdomain u,u,u localhost-sni.localdomain-ec ,, ExtendedSSLUser u,u,u serverCA C,C,C ExtendedSSLUser-ec ,, serverCA-ec C,C,C clientCA-dsa T,C,C chain-1-clientCA ,, chain-1-clientCA-ec ,, Alice #2 ,, Alice #4 ,, Alice u,u,u Dave-ec ,, localhost-sni.localdomain-dsa ,, ExtendedSSLUser-dsa ,, ExtendedSSLUser-ecmixed ,, chain-1-clientCA-dsa ,, chain-2-clientCA ,, Alice #100 ,, Alice-dsa u,u,u ExtendedSSLUser-dsamixed ,, chain-2-clientCA-dsa ,, bob@bogus.com ,, Dave-dsamixed ,, localhost.localdomain-ec ,, clientCA-ec T,C,C CRL names CRL Type TestCA CRL TestCA-ec CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests.v3.27064 -t Test2 -f ../tests.pw merge.sh: #4322: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests.v1.27064 -t Test1 -f ../tests.pw merge.sh: #4323: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #4324: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. merge.sh: #4325: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #4326: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Fri Jan 08 16:21:22 2016 Entry 1 (0x1): Serial Number: 40 (0x28) Revocation Date: Fri Jan 08 16:07:40 2016 Entry Extensions: Name: CRL reason code Entry 2 (0x2): Serial Number: 42 (0x2a) Revocation Date: Fri Jan 08 16:21:15 2016 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #4327: Verifying TestCA CRL - PASSED TIMESTAMP merge END: Fri Jan 8 13:26:14 EST 2016 Running tests for pkits TIMESTAMP pkits BEGIN: Fri Jan 8 13:26:14 EST 2016 pkits.sh: PKITS data directory not defined, skipping. TIMESTAMP pkits END: Fri Jan 8 13:26:14 EST 2016 Running tests for chains TIMESTAMP chains BEGIN: Fri Jan 8 13:26:14 EST 2016 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #4328: OCSPD: Creating DB OCSPRootDB - PASSED chains.sh: Creating Root CA OCSPRoot certutil -s "CN=OCSPRoot ROOT CA, O=OCSPRoot, C=US" -S -n OCSPRoot -t CTu,CTu,CTu -v 600 -x -d OCSPRootDB -1 -2 -5 -f OCSPRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132615 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4329: OCSPD: Creating Root CA OCSPRoot - PASSED chains.sh: Exporting Root CA OCSPRoot.der certutil -L -d OCSPRootDB -r -n OCSPRoot -o OCSPRoot.der chains.sh: #4330: OCSPD: Exporting Root CA OCSPRoot.der - PASSED chains.sh: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPRootDB -o OCSPRoot.p12 -n OCSPRoot -k OCSPRootDB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #4331: OCSPD: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #4332: OCSPD: Creating DB OCSPCA1DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA1Req.der certutil -s "CN=OCSPCA1 Intermediate, O=OCSPCA1, C=US" -R -2 -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o OCSPCA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4333: OCSPD: Creating Intermediate certifiate request OCSPCA1Req.der - PASSED chains.sh: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA1Req.der -o OCSPCA1OCSPRoot.der -f OCSPRootDB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9169/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4334: OCSPD: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database certutil -A -n OCSPCA1 -t u,u,u -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -i OCSPCA1OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4335: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database - PASSED chains.sh: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA1DB -o OCSPCA1.p12 -n OCSPCA1 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #4336: OCSPD: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database - PASSED chains.sh: Creating DB OCSPCA2DB certutil -N -d OCSPCA2DB -f OCSPCA2DB/dbpasswd chains.sh: #4337: OCSPD: Creating DB OCSPCA2DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA2Req.der certutil -s "CN=OCSPCA2 Intermediate, O=OCSPCA2, C=US" -R -2 -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o OCSPCA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4338: OCSPD: Creating Intermediate certifiate request OCSPCA2Req.der - PASSED chains.sh: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA2Req.der -o OCSPCA2OCSPRoot.der -f OCSPRootDB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9169/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4339: OCSPD: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database certutil -A -n OCSPCA2 -t u,u,u -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -i OCSPCA2OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4340: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database - PASSED chains.sh: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA2DB -o OCSPCA2.p12 -n OCSPCA2 -k OCSPCA2DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #4341: OCSPD: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database - PASSED chains.sh: Creating DB OCSPCA3DB certutil -N -d OCSPCA3DB -f OCSPCA3DB/dbpasswd chains.sh: #4342: OCSPD: Creating DB OCSPCA3DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA3Req.der certutil -s "CN=OCSPCA3 Intermediate, O=OCSPCA3, C=US" -R -2 -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o OCSPCA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4343: OCSPD: Creating Intermediate certifiate request OCSPCA3Req.der - PASSED chains.sh: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA3Req.der -o OCSPCA3OCSPRoot.der -f OCSPRootDB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9170 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4344: OCSPD: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database certutil -A -n OCSPCA3 -t u,u,u -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -i OCSPCA3OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4345: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database - PASSED chains.sh: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA3DB -o OCSPCA3.p12 -n OCSPCA3 -k OCSPCA3DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #4346: OCSPD: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database - PASSED chains.sh: Creating DB OCSPEE11DB certutil -N -d OCSPEE11DB -f OCSPEE11DB/dbpasswd chains.sh: #4347: OCSPD: Creating DB OCSPEE11DB - PASSED chains.sh: Creating EE certifiate request OCSPEE11Req.der certutil -s "CN=OCSPEE11 EE, O=OCSPEE11, C=US" -R -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o OCSPEE11Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4348: OCSPD: Creating EE certifiate request OCSPEE11Req.der - PASSED chains.sh: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE11Req.der -o OCSPEE11OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9169/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4349: OCSPD: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database certutil -A -n OCSPEE11 -t u,u,u -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -i OCSPEE11OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4350: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database - PASSED chains.sh: Creating DB OCSPEE12DB certutil -N -d OCSPEE12DB -f OCSPEE12DB/dbpasswd chains.sh: #4351: OCSPD: Creating DB OCSPEE12DB - PASSED chains.sh: Creating EE certifiate request OCSPEE12Req.der certutil -s "CN=OCSPEE12 EE, O=OCSPEE12, C=US" -R -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o OCSPEE12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4352: OCSPD: Creating EE certifiate request OCSPEE12Req.der - PASSED chains.sh: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE12Req.der -o OCSPEE12OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9169/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4353: OCSPD: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database certutil -A -n OCSPEE12 -t u,u,u -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -i OCSPEE12OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4354: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database - PASSED chains.sh: Creating DB OCSPEE13DB certutil -N -d OCSPEE13DB -f OCSPEE13DB/dbpasswd chains.sh: #4355: OCSPD: Creating DB OCSPEE13DB - PASSED chains.sh: Creating EE certifiate request OCSPEE13Req.der certutil -s "CN=OCSPEE13 EE, O=OCSPEE13, C=US" -R -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o OCSPEE13Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4356: OCSPD: Creating EE certifiate request OCSPEE13Req.der - PASSED chains.sh: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE13Req.der -o OCSPEE13OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9169/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4357: OCSPD: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database certutil -A -n OCSPEE13 -t u,u,u -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -i OCSPEE13OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4358: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database - PASSED chains.sh: Creating DB OCSPEE14DB certutil -N -d OCSPEE14DB -f OCSPEE14DB/dbpasswd chains.sh: #4359: OCSPD: Creating DB OCSPEE14DB - PASSED chains.sh: Creating EE certifiate request OCSPEE14Req.der certutil -s "CN=OCSPEE14 EE, O=OCSPEE14, C=US" -R -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o OCSPEE14Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4360: OCSPD: Creating EE certifiate request OCSPEE14Req.der - PASSED chains.sh: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE14Req.der -o OCSPEE14OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 4 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9169/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4361: OCSPD: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database certutil -A -n OCSPEE14 -t u,u,u -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -i OCSPEE14OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4362: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database - PASSED chains.sh: Creating DB OCSPEE15DB certutil -N -d OCSPEE15DB -f OCSPEE15DB/dbpasswd chains.sh: #4363: OCSPD: Creating DB OCSPEE15DB - PASSED chains.sh: Creating EE certifiate request OCSPEE15Req.der certutil -s "CN=OCSPEE15 EE, O=OCSPEE15, C=US" -R -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o OCSPEE15Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4364: OCSPD: Creating EE certifiate request OCSPEE15Req.der - PASSED chains.sh: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE15Req.der -o OCSPEE15OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 5 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9170 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4365: OCSPD: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database certutil -A -n OCSPEE15 -t u,u,u -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -i OCSPEE15OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4366: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database - PASSED chains.sh: Creating DB OCSPEE21DB certutil -N -d OCSPEE21DB -f OCSPEE21DB/dbpasswd chains.sh: #4367: OCSPD: Creating DB OCSPEE21DB - PASSED chains.sh: Creating EE certifiate request OCSPEE21Req.der certutil -s "CN=OCSPEE21 EE, O=OCSPEE21, C=US" -R -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o OCSPEE21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4368: OCSPD: Creating EE certifiate request OCSPEE21Req.der - PASSED chains.sh: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE21Req.der -o OCSPEE21OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9169/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4369: OCSPD: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database certutil -A -n OCSPEE21 -t u,u,u -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -i OCSPEE21OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4370: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database - PASSED chains.sh: Creating DB OCSPEE22DB certutil -N -d OCSPEE22DB -f OCSPEE22DB/dbpasswd chains.sh: #4371: OCSPD: Creating DB OCSPEE22DB - PASSED chains.sh: Creating EE certifiate request OCSPEE22Req.der certutil -s "CN=OCSPEE22 EE, O=OCSPEE22, C=US" -R -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o OCSPEE22Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4372: OCSPD: Creating EE certifiate request OCSPEE22Req.der - PASSED chains.sh: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE22Req.der -o OCSPEE22OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9169/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4373: OCSPD: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database certutil -A -n OCSPEE22 -t u,u,u -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -i OCSPEE22OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4374: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database - PASSED chains.sh: Creating DB OCSPEE23DB certutil -N -d OCSPEE23DB -f OCSPEE23DB/dbpasswd chains.sh: #4375: OCSPD: Creating DB OCSPEE23DB - PASSED chains.sh: Creating EE certifiate request OCSPEE23Req.der certutil -s "CN=OCSPEE23 EE, O=OCSPEE23, C=US" -R -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o OCSPEE23Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4376: OCSPD: Creating EE certifiate request OCSPEE23Req.der - PASSED chains.sh: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE23Req.der -o OCSPEE23OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9170 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4377: OCSPD: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database certutil -A -n OCSPEE23 -t u,u,u -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -i OCSPEE23OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4378: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database - PASSED chains.sh: Creating DB OCSPEE31DB certutil -N -d OCSPEE31DB -f OCSPEE31DB/dbpasswd chains.sh: #4379: OCSPD: Creating DB OCSPEE31DB - PASSED chains.sh: Creating EE certifiate request OCSPEE31Req.der certutil -s "CN=OCSPEE31 EE, O=OCSPEE31, C=US" -R -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o OCSPEE31Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4380: OCSPD: Creating EE certifiate request OCSPEE31Req.der - PASSED chains.sh: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE31Req.der -o OCSPEE31OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9169/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4381: OCSPD: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database certutil -A -n OCSPEE31 -t u,u,u -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -i OCSPEE31OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4382: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database - PASSED chains.sh: Creating DB OCSPEE32DB certutil -N -d OCSPEE32DB -f OCSPEE32DB/dbpasswd chains.sh: #4383: OCSPD: Creating DB OCSPEE32DB - PASSED chains.sh: Creating EE certifiate request OCSPEE32Req.der certutil -s "CN=OCSPEE32 EE, O=OCSPEE32, C=US" -R -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o OCSPEE32Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4384: OCSPD: Creating EE certifiate request OCSPEE32Req.der - PASSED chains.sh: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE32Req.der -o OCSPEE32OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9169/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4385: OCSPD: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database certutil -A -n OCSPEE32 -t u,u,u -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -i OCSPEE32OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4386: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database - PASSED chains.sh: Creating DB OCSPEE33DB certutil -N -d OCSPEE33DB -f OCSPEE33DB/dbpasswd chains.sh: #4387: OCSPD: Creating DB OCSPEE33DB - PASSED chains.sh: Creating EE certifiate request OCSPEE33Req.der certutil -s "CN=OCSPEE33 EE, O=OCSPEE33, C=US" -R -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o OCSPEE33Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4388: OCSPD: Creating EE certifiate request OCSPEE33Req.der - PASSED chains.sh: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE33Req.der -o OCSPEE33OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9170 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4389: OCSPD: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database certutil -A -n OCSPEE33 -t u,u,u -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -i OCSPEE33OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4390: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database - PASSED chains.sh: Create CRL for OCSPRootDB crlutil -G -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20160108182942Z nextupdate=20170108182942Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Fri Jan 08 18:29:42 2016 Next Update: Sun Jan 08 18:29:42 2017 CRL Extensions: chains.sh: #4391: OCSPD: Create CRL for OCSPRootDB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPRoot crlutil -M -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20160108182943Z addcert 2 20160108182943Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Fri Jan 08 18:29:43 2016 Next Update: Sun Jan 08 18:29:42 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 18:29:43 2016 CRL Extensions: chains.sh: #4392: OCSPD: Revoking certificate with SN 2 issued by OCSPRoot - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20160108182943Z nextupdate=20170108182943Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Jan 08 18:29:43 2016 Next Update: Sun Jan 08 18:29:43 2017 CRL Extensions: chains.sh: #4393: OCSPD: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20160108182944Z addcert 2 20160108182944Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Jan 08 18:29:44 2016 Next Update: Sun Jan 08 18:29:43 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 18:29:44 2016 CRL Extensions: chains.sh: #4394: OCSPD: Revoking certificate with SN 2 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20160108182945Z addcert 4 20160108182945Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Jan 08 18:29:45 2016 Next Update: Sun Jan 08 18:29:43 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 18:29:44 2016 Entry 2 (0x2): Serial Number: 4 (0x4) Revocation Date: Fri Jan 08 18:29:45 2016 CRL Extensions: chains.sh: #4395: OCSPD: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Create CRL for OCSPCA2DB crlutil -G -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20160108182946Z nextupdate=20170108182946Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Jan 08 18:29:46 2016 Next Update: Sun Jan 08 18:29:46 2017 CRL Extensions: chains.sh: #4396: OCSPD: Create CRL for OCSPCA2DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20160108182947Z addcert 2 20160108182947Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Jan 08 18:29:47 2016 Next Update: Sun Jan 08 18:29:46 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 18:29:47 2016 CRL Extensions: chains.sh: #4397: OCSPD: Revoking certificate with SN 2 issued by OCSPCA2 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20160108182948Z addcert 3 20160108182948Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Jan 08 18:29:48 2016 Next Update: Sun Jan 08 18:29:46 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 18:29:47 2016 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Fri Jan 08 18:29:48 2016 CRL Extensions: chains.sh: #4398: OCSPD: Revoking certificate with SN 3 issued by OCSPCA2 - PASSED chains.sh: Create CRL for OCSPCA3DB crlutil -G -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20160108182949Z nextupdate=20170108182949Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Jan 08 18:29:49 2016 Next Update: Sun Jan 08 18:29:49 2017 CRL Extensions: chains.sh: #4399: OCSPD: Create CRL for OCSPCA3DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20160108182950Z addcert 2 20160108182950Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Jan 08 18:29:50 2016 Next Update: Sun Jan 08 18:29:49 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 18:29:50 2016 CRL Extensions: chains.sh: #4400: OCSPD: Revoking certificate with SN 2 issued by OCSPCA3 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20160108182951Z addcert 3 20160108182951Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Jan 08 18:29:51 2016 Next Update: Sun Jan 08 18:29:49 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 18:29:50 2016 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Fri Jan 08 18:29:51 2016 CRL Extensions: chains.sh: #4401: OCSPD: Revoking certificate with SN 3 issued by OCSPCA3 - PASSED chains.sh: Creating DB ServerDB certutil -N -d ServerDB -f ServerDB/dbpasswd chains.sh: #4402: OCSPD: Creating DB ServerDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ServerDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.der chains.sh: #4403: OCSPD: Importing certificate OCSPRoot.der to ServerDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ServerDB database crlutil -I -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.crl chains.sh: #4404: OCSPD: Importing CRL OCSPRoot.crl to ServerDB database - PASSED chains.sh: Importing p12 key OCSPRoot.p12 to ServerDB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPRoot.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #4405: OCSPD: Importing p12 key OCSPRoot.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to ServerDB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA1.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #4406: OCSPD: Importing p12 key OCSPCA1.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA2.p12 to ServerDB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA2.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #4407: OCSPD: Importing p12 key OCSPCA2.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA3.p12 to ServerDB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA3.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #4408: OCSPD: Importing p12 key OCSPCA3.p12 to ServerDB database - PASSED chains.sh: Creating DB ClientDB certutil -N -d ClientDB -f ClientDB/dbpasswd chains.sh: #4409: OCSPD: Creating DB ClientDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ClientDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.der chains.sh: #4410: OCSPD: Importing certificate OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ClientDB database crlutil -I -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.crl chains.sh: #4411: OCSPD: Importing CRL OCSPRoot.crl to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database certutil -A -n OCSPCA1OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA1OCSPRoot.der chains.sh: #4412: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database certutil -A -n OCSPCA2OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA2OCSPRoot.der chains.sh: #4413: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database certutil -A -n OCSPCA3OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA3OCSPRoot.der chains.sh: #4414: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database certutil -A -n OCSPEE11OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE11OCSPCA1.der chains.sh: #4415: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database certutil -A -n OCSPEE12OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE12OCSPCA1.der chains.sh: #4416: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database certutil -A -n OCSPEE13OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE13OCSPCA1.der chains.sh: #4417: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database certutil -A -n OCSPEE14OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE14OCSPCA1.der chains.sh: #4418: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database certutil -A -n OCSPEE15OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE15OCSPCA1.der chains.sh: #4419: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database certutil -A -n OCSPEE21OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE21OCSPCA2.der chains.sh: #4420: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database certutil -A -n OCSPEE22OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE22OCSPCA2.der chains.sh: #4421: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database certutil -A -n OCSPEE23OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE23OCSPCA2.der chains.sh: #4422: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database certutil -A -n OCSPEE31OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE31OCSPCA3.der chains.sh: #4423: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database certutil -A -n OCSPEE32OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE32OCSPCA3.der chains.sh: #4424: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database certutil -A -n OCSPEE33OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE33OCSPCA3.der chains.sh: #4425: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database - PASSED httpserv starting at Fri Jan 8 13:30:05 EST 2016 httpserv -D -p 9169 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O get -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/aiahttp/http_pid.27064 & trying to connect to httpserv at Fri Jan 8 13:30:05 EST 2016 tstclnt -p 9169 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to httpserv at Fri Jan 8 13:30:11 EST 2016 tstclnt -p 9169 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #4426: Waiting for Server - FAILED kill -0 27497 >/dev/null 2>/dev/null httpserv with PID 27497 found at Fri Jan 8 13:30:11 EST 2016 httpserv with PID 27497 started at Fri Jan 8 13:30:11 EST 2016 tstclnt -h localhost.localdomain -p 9169 -q -t 20 tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #4427: Test that OCSP server is reachable - FAILED trying to kill httpserv with PID 27497 at Fri Jan 8 13:30:12 EST 2016 kill -USR1 27497 httpserv: normal termination httpserv -b -p 9169 2>/dev/null; httpserv with PID 27497 killed at Fri Jan 8 13:30:13 EST 2016 httpserv starting at Fri Jan 8 13:30:13 EST 2016 httpserv -D -p 9169 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O post -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/aiahttp/http_pid.27064 & trying to connect to httpserv at Fri Jan 8 13:30:13 EST 2016 tstclnt -p 9169 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to httpserv at Fri Jan 8 13:30:18 EST 2016 tstclnt -p 9169 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #4428: Waiting for Server - FAILED kill -0 27583 >/dev/null 2>/dev/null httpserv with PID 27583 found at Fri Jan 8 13:30:19 EST 2016 httpserv with PID 27583 started at Fri Jan 8 13:30:19 EST 2016 tstclnt -h localhost.localdomain -p 9169 -q -t 20 tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #4429: Test that OCSP server is reachable - FAILED trying to kill httpserv with PID 27583 at Fri Jan 8 13:30:20 EST 2016 kill -USR1 27583 httpserv: normal termination httpserv -b -p 9169 2>/dev/null; httpserv with PID 27583 killed at Fri Jan 8 13:30:21 EST 2016 httpserv starting at Fri Jan 8 13:30:21 EST 2016 httpserv -D -p 9169 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/aiahttp/http_pid.27064 & trying to connect to httpserv at Fri Jan 8 13:30:21 EST 2016 tstclnt -p 9169 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to httpserv at Fri Jan 8 13:30:26 EST 2016 tstclnt -p 9169 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #4430: Waiting for Server - FAILED kill -0 27668 >/dev/null 2>/dev/null httpserv with PID 27668 found at Fri Jan 8 13:30:27 EST 2016 httpserv with PID 27668 started at Fri Jan 8 13:30:27 EST 2016 chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #4431: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132616 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4432: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #4433: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #4434: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132617 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4435: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #4436: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #4437: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4438: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108132618 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4439: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4440: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108132619 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4441: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4442: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #4443: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #4444: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4445: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 108132620 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4446: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4447: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4448: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #4449: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #4450: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132617 (0x671f909) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 18:30:42 2016 Not After : Fri Jan 08 18:30:42 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:0d:2b:40:ab:1c:74:96:d4:a1:95:00:30:f2:0f:95: 16:1a:1f:34:4b:b1:b6:80:9a:4f:48:41:45:8a:2f:b0: a6:8b:65:f7:09:bc:7c:a5:5b:75:b2:43:67:d6:a4:14: e2:db:f7:db:eb:22:1a:01:73:73:74:93:07:37:e8:73: 61:85:21:b0:21:15:c1:69:cf:27:56:2a:83:b7:21:f5: f6:af:b3:a7:40:a1:0a:8c:16:91:88:ea:2c:4c:ee:6c: 9e:d0:b2:46:0d:6b:e5:64:c4:4f:4d:ea:65:da:97:87: e7:49:9f:3b:a5:e8:b8:51:f6:24:ef:13:df:a8:ac:41: 0f:cc:5f:86:ff:09:70:ac:23:9a:98:db:f9:a2:fc:9c: 39:f8:b1:3a:f5:c9:8b:2f:3b:52:3e:f1:1e:47:b0:53: 88:9c:ca:6c:e8:7f:3d:79:bf:17:46:4b:6f:4c:a8:07: a8:b4:6d:3b:ce:3c:4d:9d:92:06:ab:73:cc:6b:51:37: 67:f4:7f:13:0f:3d:46:68:e0:1a:09:25:aa:39:3a:53: 2e:bf:bf:f1:a9:86:47:0f:d3:b1:8a:57:89:cb:d9:e9: fa:2a:f0:91:53:9c:0e:7d:36:c3:6c:44:c9:3f:6c:ac: 83:82:53:3a:88:1e:e3:de:c2:93:08:90:76:6a:e1:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 57:a8:62:f4:9f:32:47:bf:65:c6:09:4c:52:f9:9c:ee: 6a:9d:68:a0:f3:d5:78:f6:e2:9f:64:a5:f4:c5:c1:42: a7:bc:91:e8:4a:d4:ce:fc:97:df:90:15:21:94:38:b1: 67:ce:66:19:ae:d3:54:84:77:22:bd:38:da:3e:ab:48: 62:89:19:aa:f4:76:3f:af:52:f3:b2:e7:88:e7:31:d9: 95:a8:b5:7d:ee:62:03:8d:af:02:f2:96:70:c7:1f:54: db:60:a6:3a:4b:4b:fc:16:ae:dd:f3:82:61:88:a9:00: e3:f3:b6:f1:29:9d:f7:b5:96:08:0e:c3:0d:77:08:b3: d0:fe:26:5e:8e:c7:fc:d8:f6:aa:0a:ac:f2:78:20:bb: 82:cb:39:68:bc:7a:ad:7d:f6:25:20:97:14:20:5b:e7: da:47:b6:f0:d8:61:5f:07:ad:33:47:81:c7:6c:8e:36: db:3d:5b:0e:07:04:45:8b:42:81:0f:9f:96:99:39:1c: 29:ce:fa:91:ff:1d:74:ca:72:60:9e:66:54:db:98:fa: 63:3c:8a:9b:85:7f:8b:5f:18:b2:c9:c9:94:67:8f:d6: 1d:25:70:9e:f2:71:b0:13:2f:9d:ca:2c:a3:ec:bb:b7: 14:93:54:8c:ac:f4:47:13:08:50:a8:0c:bc:d8:7c:05 Fingerprint (SHA-256): F6:09:AC:58:3A:C7:CD:89:96:6D:05:CD:0B:2F:30:2D:86:5D:E6:67:22:11:E4:EA:65:A7:05:F1:1E:DB:2F:F9 Fingerprint (SHA1): 64:81:6C:9E:60:87:94:FE:C9:50:87:2C:30:59:FE:C3:E7:2E:51:A0 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4451: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132616 (0x671f908) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 18:30:31 2016 Not After : Fri Jan 08 18:30:31 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9c:48:da:62:91:ba:ff:e2:f5:af:75:54:0d:38:4d: a1:30:e0:97:a3:cd:37:a4:cd:c5:b5:33:cd:6b:96:bb: 28:0c:ed:42:b3:aa:a8:84:21:e1:7f:05:df:72:67:8d: 2e:3d:3f:69:c4:1a:45:4a:c4:37:69:00:d7:df:7c:17: 26:1c:4a:a0:56:25:72:30:5c:5a:b1:e4:49:ff:e1:3b: c6:51:74:3b:ce:37:ee:02:80:f8:45:90:34:67:1c:d1: fb:95:2e:2b:b9:01:cd:62:c6:c3:86:ba:53:98:24:b4: 97:83:72:b3:f4:a0:26:b1:0a:e5:38:75:f8:9a:c6:4c: 36:04:f9:49:dd:d2:52:03:48:92:77:98:96:32:f4:3b: 31:55:a0:77:78:51:6b:54:10:b5:bd:22:c3:a0:30:65: a4:f2:70:cb:01:7f:a8:a3:d9:86:d5:2e:70:e7:5e:4c: 71:fe:5d:d4:2d:a0:d1:d0:ff:46:4c:61:5a:72:66:44: 29:44:d9:1a:7e:ee:3c:9b:dd:75:9d:98:f3:26:07:53: 2f:76:53:81:38:78:8f:85:8f:15:5e:1f:fc:4b:7d:0d: 65:bf:b8:84:fe:f0:12:16:4b:92:64:10:95:63:8b:4c: ae:d0:bf:78:f2:5e:93:bc:ba:97:74:49:5a:42:23:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: aa:6e:1e:19:b5:1f:17:08:62:18:eb:71:48:a0:28:af: cf:96:8f:96:02:de:e8:d1:df:e8:d5:9a:61:30:f5:f0: 58:d3:ab:e6:79:39:b9:b1:fa:91:d9:07:ea:25:27:75: 95:6e:ee:45:7c:23:e5:bf:96:c7:01:bf:c1:4b:63:cb: 80:3d:14:96:9a:32:c2:1c:55:fb:6d:b9:a0:38:12:10: f3:47:0d:19:06:56:38:71:e4:a2:df:f3:13:38:6d:e0: 92:37:ad:39:0a:4d:8e:74:95:45:22:10:67:ab:0f:64: 42:9e:43:9d:e6:2f:c6:5d:59:2f:39:91:6e:24:d1:31: 50:bb:9b:c0:72:d5:79:a0:6f:63:40:2d:82:ff:7a:68: cc:f4:e8:0b:a5:94:2f:5c:ce:f4:73:cd:7f:96:ce:9a: 0a:2d:5d:7e:91:d6:f2:9e:0c:90:f2:9b:df:2c:6d:e1: 70:0b:49:85:af:68:31:b0:49:d7:1e:8d:6c:7e:56:67: 35:0d:7e:0f:b5:87:bf:08:a7:30:32:9f:1a:cd:45:93: c4:4d:74:9c:b0:f7:f1:8f:38:29:40:a6:f7:50:ea:0e: 4f:7f:7b:d1:5c:97:7b:d9:6c:05:22:02:ef:6f:be:87: bc:46:4b:9a:e3:52:cd:09:ef:89:cd:57:d9:05:12:d1 Fingerprint (SHA-256): 03:D2:D2:40:58:23:EA:63:BA:B0:0D:6B:78:00:BE:75:FF:7A:E6:53:C3:8F:43:76:53:02:3C:40:A4:F4:5B:6B Fingerprint (SHA1): 4F:CE:70:8A:7A:DD:E2:09:9E:6B:2C:E3:C2:E7:1D:97:21:51:45:E1 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4452: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #4453: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #4454: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #4455: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132616 (0x671f908) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 18:30:31 2016 Not After : Fri Jan 08 18:30:31 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9c:48:da:62:91:ba:ff:e2:f5:af:75:54:0d:38:4d: a1:30:e0:97:a3:cd:37:a4:cd:c5:b5:33:cd:6b:96:bb: 28:0c:ed:42:b3:aa:a8:84:21:e1:7f:05:df:72:67:8d: 2e:3d:3f:69:c4:1a:45:4a:c4:37:69:00:d7:df:7c:17: 26:1c:4a:a0:56:25:72:30:5c:5a:b1:e4:49:ff:e1:3b: c6:51:74:3b:ce:37:ee:02:80:f8:45:90:34:67:1c:d1: fb:95:2e:2b:b9:01:cd:62:c6:c3:86:ba:53:98:24:b4: 97:83:72:b3:f4:a0:26:b1:0a:e5:38:75:f8:9a:c6:4c: 36:04:f9:49:dd:d2:52:03:48:92:77:98:96:32:f4:3b: 31:55:a0:77:78:51:6b:54:10:b5:bd:22:c3:a0:30:65: a4:f2:70:cb:01:7f:a8:a3:d9:86:d5:2e:70:e7:5e:4c: 71:fe:5d:d4:2d:a0:d1:d0:ff:46:4c:61:5a:72:66:44: 29:44:d9:1a:7e:ee:3c:9b:dd:75:9d:98:f3:26:07:53: 2f:76:53:81:38:78:8f:85:8f:15:5e:1f:fc:4b:7d:0d: 65:bf:b8:84:fe:f0:12:16:4b:92:64:10:95:63:8b:4c: ae:d0:bf:78:f2:5e:93:bc:ba:97:74:49:5a:42:23:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: aa:6e:1e:19:b5:1f:17:08:62:18:eb:71:48:a0:28:af: cf:96:8f:96:02:de:e8:d1:df:e8:d5:9a:61:30:f5:f0: 58:d3:ab:e6:79:39:b9:b1:fa:91:d9:07:ea:25:27:75: 95:6e:ee:45:7c:23:e5:bf:96:c7:01:bf:c1:4b:63:cb: 80:3d:14:96:9a:32:c2:1c:55:fb:6d:b9:a0:38:12:10: f3:47:0d:19:06:56:38:71:e4:a2:df:f3:13:38:6d:e0: 92:37:ad:39:0a:4d:8e:74:95:45:22:10:67:ab:0f:64: 42:9e:43:9d:e6:2f:c6:5d:59:2f:39:91:6e:24:d1:31: 50:bb:9b:c0:72:d5:79:a0:6f:63:40:2d:82:ff:7a:68: cc:f4:e8:0b:a5:94:2f:5c:ce:f4:73:cd:7f:96:ce:9a: 0a:2d:5d:7e:91:d6:f2:9e:0c:90:f2:9b:df:2c:6d:e1: 70:0b:49:85:af:68:31:b0:49:d7:1e:8d:6c:7e:56:67: 35:0d:7e:0f:b5:87:bf:08:a7:30:32:9f:1a:cd:45:93: c4:4d:74:9c:b0:f7:f1:8f:38:29:40:a6:f7:50:ea:0e: 4f:7f:7b:d1:5c:97:7b:d9:6c:05:22:02:ef:6f:be:87: bc:46:4b:9a:e3:52:cd:09:ef:89:cd:57:d9:05:12:d1 Fingerprint (SHA-256): 03:D2:D2:40:58:23:EA:63:BA:B0:0D:6B:78:00:BE:75:FF:7A:E6:53:C3:8F:43:76:53:02:3C:40:A4:F4:5B:6B Fingerprint (SHA1): 4F:CE:70:8A:7A:DD:E2:09:9E:6B:2C:E3:C2:E7:1D:97:21:51:45:E1 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4456: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132617 (0x671f909) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 18:30:42 2016 Not After : Fri Jan 08 18:30:42 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:0d:2b:40:ab:1c:74:96:d4:a1:95:00:30:f2:0f:95: 16:1a:1f:34:4b:b1:b6:80:9a:4f:48:41:45:8a:2f:b0: a6:8b:65:f7:09:bc:7c:a5:5b:75:b2:43:67:d6:a4:14: e2:db:f7:db:eb:22:1a:01:73:73:74:93:07:37:e8:73: 61:85:21:b0:21:15:c1:69:cf:27:56:2a:83:b7:21:f5: f6:af:b3:a7:40:a1:0a:8c:16:91:88:ea:2c:4c:ee:6c: 9e:d0:b2:46:0d:6b:e5:64:c4:4f:4d:ea:65:da:97:87: e7:49:9f:3b:a5:e8:b8:51:f6:24:ef:13:df:a8:ac:41: 0f:cc:5f:86:ff:09:70:ac:23:9a:98:db:f9:a2:fc:9c: 39:f8:b1:3a:f5:c9:8b:2f:3b:52:3e:f1:1e:47:b0:53: 88:9c:ca:6c:e8:7f:3d:79:bf:17:46:4b:6f:4c:a8:07: a8:b4:6d:3b:ce:3c:4d:9d:92:06:ab:73:cc:6b:51:37: 67:f4:7f:13:0f:3d:46:68:e0:1a:09:25:aa:39:3a:53: 2e:bf:bf:f1:a9:86:47:0f:d3:b1:8a:57:89:cb:d9:e9: fa:2a:f0:91:53:9c:0e:7d:36:c3:6c:44:c9:3f:6c:ac: 83:82:53:3a:88:1e:e3:de:c2:93:08:90:76:6a:e1:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 57:a8:62:f4:9f:32:47:bf:65:c6:09:4c:52:f9:9c:ee: 6a:9d:68:a0:f3:d5:78:f6:e2:9f:64:a5:f4:c5:c1:42: a7:bc:91:e8:4a:d4:ce:fc:97:df:90:15:21:94:38:b1: 67:ce:66:19:ae:d3:54:84:77:22:bd:38:da:3e:ab:48: 62:89:19:aa:f4:76:3f:af:52:f3:b2:e7:88:e7:31:d9: 95:a8:b5:7d:ee:62:03:8d:af:02:f2:96:70:c7:1f:54: db:60:a6:3a:4b:4b:fc:16:ae:dd:f3:82:61:88:a9:00: e3:f3:b6:f1:29:9d:f7:b5:96:08:0e:c3:0d:77:08:b3: d0:fe:26:5e:8e:c7:fc:d8:f6:aa:0a:ac:f2:78:20:bb: 82:cb:39:68:bc:7a:ad:7d:f6:25:20:97:14:20:5b:e7: da:47:b6:f0:d8:61:5f:07:ad:33:47:81:c7:6c:8e:36: db:3d:5b:0e:07:04:45:8b:42:81:0f:9f:96:99:39:1c: 29:ce:fa:91:ff:1d:74:ca:72:60:9e:66:54:db:98:fa: 63:3c:8a:9b:85:7f:8b:5f:18:b2:c9:c9:94:67:8f:d6: 1d:25:70:9e:f2:71:b0:13:2f:9d:ca:2c:a3:ec:bb:b7: 14:93:54:8c:ac:f4:47:13:08:50:a8:0c:bc:d8:7c:05 Fingerprint (SHA-256): F6:09:AC:58:3A:C7:CD:89:96:6D:05:CD:0B:2F:30:2D:86:5D:E6:67:22:11:E4:EA:65:A7:05:F1:1E:DB:2F:F9 Fingerprint (SHA1): 64:81:6C:9E:60:87:94:FE:C9:50:87:2C:30:59:FE:C3:E7:2E:51:A0 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4457: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #4458: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #4459: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #4460: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #4461: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #4462: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132617 (0x671f909) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 18:30:42 2016 Not After : Fri Jan 08 18:30:42 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:0d:2b:40:ab:1c:74:96:d4:a1:95:00:30:f2:0f:95: 16:1a:1f:34:4b:b1:b6:80:9a:4f:48:41:45:8a:2f:b0: a6:8b:65:f7:09:bc:7c:a5:5b:75:b2:43:67:d6:a4:14: e2:db:f7:db:eb:22:1a:01:73:73:74:93:07:37:e8:73: 61:85:21:b0:21:15:c1:69:cf:27:56:2a:83:b7:21:f5: f6:af:b3:a7:40:a1:0a:8c:16:91:88:ea:2c:4c:ee:6c: 9e:d0:b2:46:0d:6b:e5:64:c4:4f:4d:ea:65:da:97:87: e7:49:9f:3b:a5:e8:b8:51:f6:24:ef:13:df:a8:ac:41: 0f:cc:5f:86:ff:09:70:ac:23:9a:98:db:f9:a2:fc:9c: 39:f8:b1:3a:f5:c9:8b:2f:3b:52:3e:f1:1e:47:b0:53: 88:9c:ca:6c:e8:7f:3d:79:bf:17:46:4b:6f:4c:a8:07: a8:b4:6d:3b:ce:3c:4d:9d:92:06:ab:73:cc:6b:51:37: 67:f4:7f:13:0f:3d:46:68:e0:1a:09:25:aa:39:3a:53: 2e:bf:bf:f1:a9:86:47:0f:d3:b1:8a:57:89:cb:d9:e9: fa:2a:f0:91:53:9c:0e:7d:36:c3:6c:44:c9:3f:6c:ac: 83:82:53:3a:88:1e:e3:de:c2:93:08:90:76:6a:e1:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 57:a8:62:f4:9f:32:47:bf:65:c6:09:4c:52:f9:9c:ee: 6a:9d:68:a0:f3:d5:78:f6:e2:9f:64:a5:f4:c5:c1:42: a7:bc:91:e8:4a:d4:ce:fc:97:df:90:15:21:94:38:b1: 67:ce:66:19:ae:d3:54:84:77:22:bd:38:da:3e:ab:48: 62:89:19:aa:f4:76:3f:af:52:f3:b2:e7:88:e7:31:d9: 95:a8:b5:7d:ee:62:03:8d:af:02:f2:96:70:c7:1f:54: db:60:a6:3a:4b:4b:fc:16:ae:dd:f3:82:61:88:a9:00: e3:f3:b6:f1:29:9d:f7:b5:96:08:0e:c3:0d:77:08:b3: d0:fe:26:5e:8e:c7:fc:d8:f6:aa:0a:ac:f2:78:20:bb: 82:cb:39:68:bc:7a:ad:7d:f6:25:20:97:14:20:5b:e7: da:47:b6:f0:d8:61:5f:07:ad:33:47:81:c7:6c:8e:36: db:3d:5b:0e:07:04:45:8b:42:81:0f:9f:96:99:39:1c: 29:ce:fa:91:ff:1d:74:ca:72:60:9e:66:54:db:98:fa: 63:3c:8a:9b:85:7f:8b:5f:18:b2:c9:c9:94:67:8f:d6: 1d:25:70:9e:f2:71:b0:13:2f:9d:ca:2c:a3:ec:bb:b7: 14:93:54:8c:ac:f4:47:13:08:50:a8:0c:bc:d8:7c:05 Fingerprint (SHA-256): F6:09:AC:58:3A:C7:CD:89:96:6D:05:CD:0B:2F:30:2D:86:5D:E6:67:22:11:E4:EA:65:A7:05:F1:1E:DB:2F:F9 Fingerprint (SHA1): 64:81:6C:9E:60:87:94:FE:C9:50:87:2C:30:59:FE:C3:E7:2E:51:A0 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4463: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132617 (0x671f909) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 18:30:42 2016 Not After : Fri Jan 08 18:30:42 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:0d:2b:40:ab:1c:74:96:d4:a1:95:00:30:f2:0f:95: 16:1a:1f:34:4b:b1:b6:80:9a:4f:48:41:45:8a:2f:b0: a6:8b:65:f7:09:bc:7c:a5:5b:75:b2:43:67:d6:a4:14: e2:db:f7:db:eb:22:1a:01:73:73:74:93:07:37:e8:73: 61:85:21:b0:21:15:c1:69:cf:27:56:2a:83:b7:21:f5: f6:af:b3:a7:40:a1:0a:8c:16:91:88:ea:2c:4c:ee:6c: 9e:d0:b2:46:0d:6b:e5:64:c4:4f:4d:ea:65:da:97:87: e7:49:9f:3b:a5:e8:b8:51:f6:24:ef:13:df:a8:ac:41: 0f:cc:5f:86:ff:09:70:ac:23:9a:98:db:f9:a2:fc:9c: 39:f8:b1:3a:f5:c9:8b:2f:3b:52:3e:f1:1e:47:b0:53: 88:9c:ca:6c:e8:7f:3d:79:bf:17:46:4b:6f:4c:a8:07: a8:b4:6d:3b:ce:3c:4d:9d:92:06:ab:73:cc:6b:51:37: 67:f4:7f:13:0f:3d:46:68:e0:1a:09:25:aa:39:3a:53: 2e:bf:bf:f1:a9:86:47:0f:d3:b1:8a:57:89:cb:d9:e9: fa:2a:f0:91:53:9c:0e:7d:36:c3:6c:44:c9:3f:6c:ac: 83:82:53:3a:88:1e:e3:de:c2:93:08:90:76:6a:e1:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 57:a8:62:f4:9f:32:47:bf:65:c6:09:4c:52:f9:9c:ee: 6a:9d:68:a0:f3:d5:78:f6:e2:9f:64:a5:f4:c5:c1:42: a7:bc:91:e8:4a:d4:ce:fc:97:df:90:15:21:94:38:b1: 67:ce:66:19:ae:d3:54:84:77:22:bd:38:da:3e:ab:48: 62:89:19:aa:f4:76:3f:af:52:f3:b2:e7:88:e7:31:d9: 95:a8:b5:7d:ee:62:03:8d:af:02:f2:96:70:c7:1f:54: db:60:a6:3a:4b:4b:fc:16:ae:dd:f3:82:61:88:a9:00: e3:f3:b6:f1:29:9d:f7:b5:96:08:0e:c3:0d:77:08:b3: d0:fe:26:5e:8e:c7:fc:d8:f6:aa:0a:ac:f2:78:20:bb: 82:cb:39:68:bc:7a:ad:7d:f6:25:20:97:14:20:5b:e7: da:47:b6:f0:d8:61:5f:07:ad:33:47:81:c7:6c:8e:36: db:3d:5b:0e:07:04:45:8b:42:81:0f:9f:96:99:39:1c: 29:ce:fa:91:ff:1d:74:ca:72:60:9e:66:54:db:98:fa: 63:3c:8a:9b:85:7f:8b:5f:18:b2:c9:c9:94:67:8f:d6: 1d:25:70:9e:f2:71:b0:13:2f:9d:ca:2c:a3:ec:bb:b7: 14:93:54:8c:ac:f4:47:13:08:50:a8:0c:bc:d8:7c:05 Fingerprint (SHA-256): F6:09:AC:58:3A:C7:CD:89:96:6D:05:CD:0B:2F:30:2D:86:5D:E6:67:22:11:E4:EA:65:A7:05:F1:1E:DB:2F:F9 Fingerprint (SHA1): 64:81:6C:9E:60:87:94:FE:C9:50:87:2C:30:59:FE:C3:E7:2E:51:A0 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4464: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #4465: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #4466: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #4467: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #4468: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #4469: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132616 (0x671f908) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 18:30:31 2016 Not After : Fri Jan 08 18:30:31 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9c:48:da:62:91:ba:ff:e2:f5:af:75:54:0d:38:4d: a1:30:e0:97:a3:cd:37:a4:cd:c5:b5:33:cd:6b:96:bb: 28:0c:ed:42:b3:aa:a8:84:21:e1:7f:05:df:72:67:8d: 2e:3d:3f:69:c4:1a:45:4a:c4:37:69:00:d7:df:7c:17: 26:1c:4a:a0:56:25:72:30:5c:5a:b1:e4:49:ff:e1:3b: c6:51:74:3b:ce:37:ee:02:80:f8:45:90:34:67:1c:d1: fb:95:2e:2b:b9:01:cd:62:c6:c3:86:ba:53:98:24:b4: 97:83:72:b3:f4:a0:26:b1:0a:e5:38:75:f8:9a:c6:4c: 36:04:f9:49:dd:d2:52:03:48:92:77:98:96:32:f4:3b: 31:55:a0:77:78:51:6b:54:10:b5:bd:22:c3:a0:30:65: a4:f2:70:cb:01:7f:a8:a3:d9:86:d5:2e:70:e7:5e:4c: 71:fe:5d:d4:2d:a0:d1:d0:ff:46:4c:61:5a:72:66:44: 29:44:d9:1a:7e:ee:3c:9b:dd:75:9d:98:f3:26:07:53: 2f:76:53:81:38:78:8f:85:8f:15:5e:1f:fc:4b:7d:0d: 65:bf:b8:84:fe:f0:12:16:4b:92:64:10:95:63:8b:4c: ae:d0:bf:78:f2:5e:93:bc:ba:97:74:49:5a:42:23:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: aa:6e:1e:19:b5:1f:17:08:62:18:eb:71:48:a0:28:af: cf:96:8f:96:02:de:e8:d1:df:e8:d5:9a:61:30:f5:f0: 58:d3:ab:e6:79:39:b9:b1:fa:91:d9:07:ea:25:27:75: 95:6e:ee:45:7c:23:e5:bf:96:c7:01:bf:c1:4b:63:cb: 80:3d:14:96:9a:32:c2:1c:55:fb:6d:b9:a0:38:12:10: f3:47:0d:19:06:56:38:71:e4:a2:df:f3:13:38:6d:e0: 92:37:ad:39:0a:4d:8e:74:95:45:22:10:67:ab:0f:64: 42:9e:43:9d:e6:2f:c6:5d:59:2f:39:91:6e:24:d1:31: 50:bb:9b:c0:72:d5:79:a0:6f:63:40:2d:82:ff:7a:68: cc:f4:e8:0b:a5:94:2f:5c:ce:f4:73:cd:7f:96:ce:9a: 0a:2d:5d:7e:91:d6:f2:9e:0c:90:f2:9b:df:2c:6d:e1: 70:0b:49:85:af:68:31:b0:49:d7:1e:8d:6c:7e:56:67: 35:0d:7e:0f:b5:87:bf:08:a7:30:32:9f:1a:cd:45:93: c4:4d:74:9c:b0:f7:f1:8f:38:29:40:a6:f7:50:ea:0e: 4f:7f:7b:d1:5c:97:7b:d9:6c:05:22:02:ef:6f:be:87: bc:46:4b:9a:e3:52:cd:09:ef:89:cd:57:d9:05:12:d1 Fingerprint (SHA-256): 03:D2:D2:40:58:23:EA:63:BA:B0:0D:6B:78:00:BE:75:FF:7A:E6:53:C3:8F:43:76:53:02:3C:40:A4:F4:5B:6B Fingerprint (SHA1): 4F:CE:70:8A:7A:DD:E2:09:9E:6B:2C:E3:C2:E7:1D:97:21:51:45:E1 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4470: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132616 (0x671f908) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 18:30:31 2016 Not After : Fri Jan 08 18:30:31 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9c:48:da:62:91:ba:ff:e2:f5:af:75:54:0d:38:4d: a1:30:e0:97:a3:cd:37:a4:cd:c5:b5:33:cd:6b:96:bb: 28:0c:ed:42:b3:aa:a8:84:21:e1:7f:05:df:72:67:8d: 2e:3d:3f:69:c4:1a:45:4a:c4:37:69:00:d7:df:7c:17: 26:1c:4a:a0:56:25:72:30:5c:5a:b1:e4:49:ff:e1:3b: c6:51:74:3b:ce:37:ee:02:80:f8:45:90:34:67:1c:d1: fb:95:2e:2b:b9:01:cd:62:c6:c3:86:ba:53:98:24:b4: 97:83:72:b3:f4:a0:26:b1:0a:e5:38:75:f8:9a:c6:4c: 36:04:f9:49:dd:d2:52:03:48:92:77:98:96:32:f4:3b: 31:55:a0:77:78:51:6b:54:10:b5:bd:22:c3:a0:30:65: a4:f2:70:cb:01:7f:a8:a3:d9:86:d5:2e:70:e7:5e:4c: 71:fe:5d:d4:2d:a0:d1:d0:ff:46:4c:61:5a:72:66:44: 29:44:d9:1a:7e:ee:3c:9b:dd:75:9d:98:f3:26:07:53: 2f:76:53:81:38:78:8f:85:8f:15:5e:1f:fc:4b:7d:0d: 65:bf:b8:84:fe:f0:12:16:4b:92:64:10:95:63:8b:4c: ae:d0:bf:78:f2:5e:93:bc:ba:97:74:49:5a:42:23:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: aa:6e:1e:19:b5:1f:17:08:62:18:eb:71:48:a0:28:af: cf:96:8f:96:02:de:e8:d1:df:e8:d5:9a:61:30:f5:f0: 58:d3:ab:e6:79:39:b9:b1:fa:91:d9:07:ea:25:27:75: 95:6e:ee:45:7c:23:e5:bf:96:c7:01:bf:c1:4b:63:cb: 80:3d:14:96:9a:32:c2:1c:55:fb:6d:b9:a0:38:12:10: f3:47:0d:19:06:56:38:71:e4:a2:df:f3:13:38:6d:e0: 92:37:ad:39:0a:4d:8e:74:95:45:22:10:67:ab:0f:64: 42:9e:43:9d:e6:2f:c6:5d:59:2f:39:91:6e:24:d1:31: 50:bb:9b:c0:72:d5:79:a0:6f:63:40:2d:82:ff:7a:68: cc:f4:e8:0b:a5:94:2f:5c:ce:f4:73:cd:7f:96:ce:9a: 0a:2d:5d:7e:91:d6:f2:9e:0c:90:f2:9b:df:2c:6d:e1: 70:0b:49:85:af:68:31:b0:49:d7:1e:8d:6c:7e:56:67: 35:0d:7e:0f:b5:87:bf:08:a7:30:32:9f:1a:cd:45:93: c4:4d:74:9c:b0:f7:f1:8f:38:29:40:a6:f7:50:ea:0e: 4f:7f:7b:d1:5c:97:7b:d9:6c:05:22:02:ef:6f:be:87: bc:46:4b:9a:e3:52:cd:09:ef:89:cd:57:d9:05:12:d1 Fingerprint (SHA-256): 03:D2:D2:40:58:23:EA:63:BA:B0:0D:6B:78:00:BE:75:FF:7A:E6:53:C3:8F:43:76:53:02:3C:40:A4:F4:5B:6B Fingerprint (SHA1): 4F:CE:70:8A:7A:DD:E2:09:9E:6B:2C:E3:C2:E7:1D:97:21:51:45:E1 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4471: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #4472: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132621 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4473: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #4474: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #4475: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132622 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4476: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #4477: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #4478: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132623 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4479: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #4480: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #4481: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132624 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4482: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #4483: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #4484: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132625 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4485: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #4486: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #4487: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132626 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4488: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #4489: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #4490: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132627 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4491: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #4492: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #4493: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132628 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4494: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #4495: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #4496: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132629 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4497: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #4498: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #4499: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4500: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 108132630 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4501: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4502: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 108132631 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4503: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4504: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 108132632 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4505: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4506: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #4507: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #4508: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4509: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 108132633 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4510: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4511: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 108132634 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4512: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4513: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 108132635 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4514: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4515: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #4516: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #4517: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4518: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 108132636 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4519: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4520: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 108132637 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4521: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4522: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 108132638 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4523: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4524: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #4525: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #4526: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4527: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 108132639 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4528: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4529: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 108132640 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4530: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4531: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 108132641 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4532: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4533: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #4534: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4535: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4536: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 108132642 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4537: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4538: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #4539: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4540: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108132643 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4541: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4542: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132621 (0x671f90d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Fri Jan 08 18:31:30 2016 Not After : Fri Jan 08 18:31:30 2066 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:78:21:75:ec:1c:57:bd:4b:e2:7a:9f:73:7b:5e:55: ab:e6:00:2e:61:bd:63:2f:79:90:db:8e:81:a2:a0:3c: 55:3f:18:2c:80:f7:88:b5:2d:c6:42:41:0a:22:96:a6: 74:2d:56:92:e6:14:cc:22:c3:1b:e5:fe:61:5e:f1:63: a7:1e:d8:a6:53:ec:0f:d8:19:e8:e3:15:14:76:4d:bc: 9e:8c:6b:6c:bb:0c:be:cf:b5:25:8a:00:65:67:ef:11: e7:de:5f:4d:4b:ca:b6:ce:81:d1:80:2b:d6:fc:91:e0: 41:76:04:79:bf:4c:8e:23:fc:4e:b1:a9:40:22:47:13: 09:d8:55:93:96:00:9f:09:e4:01:56:a8:44:a5:0f:09: 03:60:cc:05:ec:bc:6e:94:ca:5a:e9:81:97:d2:e6:ef: 7b:64:c1:60:86:19:a3:01:59:ca:a3:5c:18:7c:e3:da: 56:73:43:b2:94:c1:bc:8d:10:8f:54:b4:93:7c:ee:d6: e0:ae:99:49:1e:f7:d4:00:1d:1d:dc:33:5f:6b:7c:3e: 7e:70:54:75:b1:4b:5a:4b:55:aa:72:00:90:0c:51:fc: 55:da:a9:60:0e:3a:ff:e2:31:b5:e7:63:fa:9b:1c:52: c0:7c:94:1c:9e:fe:44:5d:32:ff:67:df:88:04:99:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ab:ee:ca:cc:1d:32:f4:7a:32:c6:05:10:17:84:63:62: 58:ea:9c:a8:d8:c8:cf:d3:22:f5:2e:5d:34:7b:09:98: 71:2e:0b:a0:52:8e:98:04:c6:e9:10:b3:10:71:08:a3: 6d:42:c9:61:c0:b7:0b:f0:ff:c5:d2:5b:f5:81:39:46: 65:26:5d:fa:fc:82:f2:37:aa:b7:7e:db:1b:e3:d3:6b: 03:12:a3:24:d9:4c:55:17:63:94:eb:4a:c9:08:31:21: e2:56:57:67:fa:74:f8:4c:d7:6b:bc:f9:7f:d0:9b:02: ef:2d:7f:e7:dc:3c:42:d1:e2:cc:5c:0c:bb:fd:31:cd: 4d:54:3d:39:f6:4b:e4:ea:67:06:83:7c:97:33:c9:da: e5:94:8d:71:c4:d6:2e:b4:cb:1e:49:62:ce:d2:13:12: e6:bf:cb:d8:0a:bb:24:11:5f:b7:4b:50:a4:83:a2:7c: 7d:f8:fd:d0:4c:06:14:4a:3a:1e:53:f9:cc:50:5a:37: fe:61:a4:c5:5b:c2:f4:22:a3:04:03:d3:0a:06:0c:ea: a2:bd:cd:7d:e5:e7:08:3f:92:a0:e1:48:61:c0:80:5d: 08:7f:a1:a5:79:44:3b:96:f5:db:5a:b3:df:8e:bf:41: d1:23:b1:4e:8c:75:3f:20:d1:4d:ba:2c:09:29:cb:cf Fingerprint (SHA-256): 51:9D:E6:37:8D:66:99:BC:42:04:CB:23:7A:5E:F5:E0:E8:D4:90:02:40:C4:CC:28:23:6A:4E:3B:C3:A7:0C:16 Fingerprint (SHA1): CA:63:84:B8:D1:D0:6B:73:5B:B2:EC:5B:FE:C6:D1:89:D4:B2:28:6D Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #4543: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132622 (0x671f90e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Fri Jan 08 18:32:00 2016 Not After : Fri Jan 08 18:32:00 2066 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f2:ee:12:4d:2a:e2:46:a2:f1:d3:c9:aa:e8:d1:14:df: a5:72:d9:4f:41:12:11:48:1c:63:cf:a8:81:c2:3a:1b: 8c:a6:6a:cc:61:e1:f6:5c:37:c4:e1:67:04:09:4d:e0: 8d:47:2d:29:20:98:1a:f6:50:1d:59:8b:ba:54:17:c0: ed:0a:df:d2:ae:94:71:a2:73:52:c2:6b:94:e9:ae:98: 8e:d4:f6:d0:8e:97:7d:d1:21:3f:19:ad:7a:ae:13:9c: 3b:37:62:f9:65:63:6a:21:a8:18:80:78:3f:50:a6:87: 99:55:4b:7b:9c:77:ae:64:95:da:97:13:bc:85:65:69: 77:e4:57:1c:46:2f:38:b5:d3:71:80:0f:9e:37:9d:1c: a2:23:cd:e4:1e:ae:45:43:71:80:25:8b:da:ce:e1:46: f5:a5:78:f1:a1:be:c2:59:76:3e:27:ab:aa:e6:43:19: e1:46:0b:c9:f3:88:17:b2:7c:50:f8:82:39:37:ae:03: a0:db:8b:5f:4e:05:95:10:d5:c1:cd:dc:52:36:a8:76: 25:79:da:2d:c7:e6:e4:b1:d2:88:ae:63:63:d8:3e:75: 11:79:ab:6f:dc:44:db:f9:16:51:fe:12:b4:f5:3d:d6: 28:41:0a:1a:4e:28:f7:2b:b5:76:7a:34:da:a5:9d:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:54:47:f0:89:a9:46:2c:a4:b3:8b:0e:66:88:0f:e7: 9f:20:1e:8c:f8:3d:6b:3e:31:88:66:42:21:e8:1c:bb: 7e:fd:fb:98:ff:67:ca:1e:94:5e:05:ce:6a:b7:53:0a: 7c:02:64:f5:44:5a:7f:7e:75:af:9f:ac:34:df:51:e0: 9d:19:6f:a1:33:16:7b:6d:70:66:5f:ad:2f:ee:99:aa: ed:28:1d:22:69:18:1b:b8:1e:3b:54:a7:97:4d:19:ee: 02:00:89:39:c0:49:14:2f:28:2c:8c:67:d9:c2:ff:fa: 8b:4e:3f:74:95:16:f7:9c:e3:ba:19:15:00:1f:80:b9: 99:27:65:fd:10:1a:9b:c9:b9:65:b2:22:31:4f:35:fc: 52:20:9f:d5:b2:30:3a:c6:7f:6c:8f:13:6b:2a:72:34: 08:2f:87:cd:0f:f1:2c:b1:78:58:e3:8e:16:51:5b:07: e0:46:c8:a6:d2:57:43:c0:02:85:51:a8:db:b5:74:8a: e3:1a:92:ac:32:f6:58:1f:50:41:40:df:96:1c:95:d3: db:ed:d2:b2:e7:d7:4b:58:a4:da:13:a3:06:8f:22:de: 6f:48:ef:29:99:ba:ae:59:20:10:76:45:22:52:8d:06: 78:4e:36:8b:60:cd:4b:d1:db:ae:13:65:a6:64:cf:d9 Fingerprint (SHA-256): DF:FD:73:5D:46:97:95:55:32:54:F2:C4:E5:BD:A6:DD:79:F6:EC:B3:1E:8A:D2:41:8D:53:75:E4:8E:C3:01:E3 Fingerprint (SHA1): 1A:E2:48:12:2D:70:0B:C5:2A:66:1F:33:8B:6F:D9:FB:87:E4:B8:6F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #4544: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132623 (0x671f90f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Fri Jan 08 18:32:06 2016 Not After : Fri Jan 08 18:32:06 2066 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:37:1f:f6:59:d8:9f:18:3f:ea:24:68:8e:33:63:55: 3b:15:44:cd:69:89:9e:9d:0a:6a:da:ef:cd:ce:5f:15: 62:e4:c3:80:f6:fa:5d:c2:0d:ee:98:7c:86:bf:ab:85: 5d:f1:ab:66:01:ea:52:d2:ff:72:d0:c2:f1:55:e2:60: f8:20:cd:19:8d:ae:ad:3a:7c:2f:0c:0a:ed:a3:89:07: f2:c3:47:67:63:6e:1d:c6:db:3b:22:31:07:d3:8c:4a: 9e:37:c5:11:b1:3f:e5:c5:58:c0:41:04:11:b8:0a:9f: 6a:5a:a7:f8:77:14:ab:71:06:55:1f:4c:73:b7:73:0c: e0:32:46:50:7a:c5:6d:8c:48:fb:b4:a7:39:bc:9b:58: f3:65:19:f7:71:d5:fd:86:12:4f:d1:5b:89:6a:87:df: 47:1f:da:b6:d7:f7:7a:c7:84:2e:57:5e:d6:70:23:b0: 3d:2a:86:18:1f:93:79:94:0d:85:5e:18:91:66:36:d1: 42:b2:f9:c2:09:c6:3d:ce:59:c3:f5:51:1a:89:a7:c9: cf:85:e7:30:a8:3c:eb:27:2a:06:8d:44:2d:d7:38:b8: d8:0a:bf:79:3d:bb:ff:28:01:6a:42:94:e3:4f:98:56: c7:6f:61:a5:e7:6d:54:ff:2d:77:6e:3f:ea:78:6c:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5a:ca:eb:05:4e:ef:ae:c7:06:ff:aa:f9:e8:10:b4:ea: 59:a7:c7:db:7f:78:51:1a:4a:3b:95:f6:15:ad:3e:51: 8f:ad:40:a3:9a:30:d8:b9:32:c8:88:b7:88:9a:31:95: f2:5e:65:04:c2:55:4c:af:f5:ac:20:54:bd:d3:6d:a5: 07:9f:b1:4a:66:80:6b:f1:e6:76:7e:67:ef:8c:db:41: 02:4c:35:69:42:86:b4:c7:ec:b6:04:6a:ef:fd:19:13: 36:74:f6:00:2d:76:23:e4:4a:6f:ef:66:3e:85:69:51: 18:e8:f2:d8:ce:0d:24:5f:62:73:15:44:f2:e7:d3:8f: ce:2b:dd:54:56:eb:ee:b6:4a:5a:ce:e8:dd:2f:d7:35: 33:55:93:c6:58:4a:3c:39:7a:10:ad:cc:0a:d6:19:bc: 7c:b9:30:64:ff:b3:2e:23:d4:c4:24:9c:d8:66:d3:7d: e1:81:d6:99:61:57:b0:ae:6c:49:9f:ee:f2:3f:79:e8: 14:98:8c:b0:3b:ff:8a:89:c0:af:2b:d4:62:fa:6b:56: 09:2a:81:d3:b8:dd:ef:4a:48:b2:35:b6:e5:3e:c4:16: ab:5a:c3:92:7c:94:44:57:89:68:99:84:ed:bd:91:e1: 4b:dc:03:71:0c:43:de:27:ec:0a:a5:18:d8:65:e9:dc Fingerprint (SHA-256): D3:12:01:4D:08:64:A8:48:7F:AE:AC:F4:A0:E6:FC:F1:23:5F:8A:A1:B9:01:05:B6:20:BB:EF:43:02:D8:48:FF Fingerprint (SHA1): 52:9A:30:BC:AA:49:44:A5:69:8F:38:75:7B:32:7E:94:48:D0:11:28 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #4545: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132624 (0x671f910) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Fri Jan 08 18:32:18 2016 Not After : Fri Jan 08 18:32:18 2066 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:e0:59:61:6d:18:22:0b:45:93:af:c4:00:b5:5d:e5: 60:bd:0b:cf:23:e0:71:27:53:af:23:6c:52:fd:12:67: b2:97:3c:43:d1:0d:71:ed:7f:c4:28:07:b0:b4:7e:be: ba:ba:c2:1f:bd:e4:41:2c:a7:26:3c:0e:12:02:5e:22: 49:b7:d5:b5:b7:d6:b5:3c:e5:f6:e8:4e:e3:04:24:80: 79:15:c5:7d:89:8c:56:83:83:d6:a9:f0:73:f8:3e:6d: 36:d9:1f:f4:82:e1:ef:09:84:9d:37:ba:b0:88:a8:be: 00:7f:a1:c2:b6:b5:a4:0d:ef:1b:83:43:ab:97:68:52: 8b:89:8e:7d:3f:fc:58:06:61:8e:7e:ff:ce:7d:33:df: 28:ad:cd:95:d9:80:ed:1b:8e:27:b2:08:a7:2f:d7:16: 06:bc:38:d8:40:ac:cb:d0:6d:9e:b9:00:f9:5d:57:fd: 77:8f:23:c2:1d:57:b9:29:55:1d:43:85:de:db:22:7f: 4d:1c:8d:ea:14:fd:42:7a:65:23:e7:01:b3:d4:da:76: 10:9e:54:51:b0:ff:dc:ec:c1:b2:92:d8:10:81:9e:ba: e7:f8:ca:d3:51:fd:56:50:d2:8a:62:47:87:1b:a9:4e: e2:58:21:ae:97:1a:03:2b:00:37:d3:4b:36:b4:95:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:16:8e:92:fc:17:6a:bd:52:22:f8:8f:82:5b:d7:a0: b4:cd:96:15:09:ff:83:fe:0b:bc:89:73:74:44:88:e0: 92:db:41:92:08:1c:f9:60:cc:6c:8d:ee:49:fa:92:27: 92:9d:a8:8d:24:eb:a2:01:b8:5e:78:5d:a6:f5:94:f8: b2:87:2d:56:d2:cb:30:b7:cb:fe:07:4a:b6:80:9a:87: 14:fa:3a:c2:7c:99:04:2b:ea:45:81:8e:5b:90:11:cf: 38:1c:3e:f7:a1:f8:62:cd:fd:f0:1b:8a:02:d7:a7:1a: 53:18:3e:33:46:c4:29:37:84:63:a6:35:7e:52:00:88: d9:84:27:11:9b:06:ea:66:6b:db:55:54:98:98:ff:3e: 04:1f:dd:66:7d:71:cd:8f:b1:39:c0:e7:b3:ba:db:a8: dd:57:ea:ff:52:49:e6:f3:43:dc:46:67:13:50:dd:92: 4d:d6:7c:5c:22:85:eb:65:7a:0d:3e:56:39:9a:67:a4: 43:c4:b2:88:c9:c9:a6:6a:01:11:07:29:87:01:d8:3b: 61:c2:e2:8c:24:3d:aa:af:96:3f:83:36:db:97:a4:9c: fd:9c:5d:f3:a3:5d:ca:d8:46:e1:87:b1:e9:75:ef:a4: 91:61:af:62:59:f2:20:48:5a:ad:ae:3b:8b:3a:4b:74 Fingerprint (SHA-256): 03:4D:91:BC:F6:38:FE:C9:D3:FF:FE:7A:3C:67:A0:F2:EA:35:DD:1B:69:34:A4:60:38:88:59:41:45:69:3D:20 Fingerprint (SHA1): A7:97:7E:C0:6B:BC:44:EB:ED:4A:0B:84:8F:77:4F:81:1B:16:CC:64 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #4546: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132625 (0x671f911) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Fri Jan 08 18:32:40 2016 Not After : Fri Jan 08 18:32:40 2066 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:d8:b1:e9:cf:3b:64:59:60:1c:1d:7a:af:e6:e4:ae: 49:75:94:9b:12:4c:c3:fe:1a:5e:76:1e:27:0b:95:06: 27:ce:41:bd:24:8d:f7:2b:85:3a:0d:4b:34:51:dd:13: 23:a6:84:e8:1f:e3:ed:b9:9d:4f:79:eb:21:a8:3e:3d: 95:38:d7:f5:05:9d:ff:29:da:60:84:27:e9:6e:89:94: de:dc:6d:cf:0b:6d:7b:12:94:b7:cb:03:51:50:d6:71: dd:8c:44:0a:3c:22:50:bc:c4:10:d1:21:0a:b1:32:2f: 88:e2:04:e8:28:f5:7d:c8:f1:fa:aa:e6:7c:9a:20:ae: 52:7e:02:00:bc:ec:a6:db:3e:19:3b:a4:e0:a6:c6:9b: 93:0c:ea:49:e9:d5:8a:8c:a4:d3:95:d2:f4:fe:f0:88: 38:87:bb:66:fe:99:4b:37:09:b3:dc:70:e8:b6:64:69: af:6e:4d:c9:cd:fc:fd:7c:3b:4b:68:95:92:cc:2f:34: 08:9a:0d:de:a9:da:85:7a:b4:68:13:20:22:52:9f:9d: d4:7b:1d:32:6b:37:17:16:c3:10:94:52:fa:f7:8f:40: 74:6d:ef:2b:f1:d9:52:50:8a:79:37:83:10:91:c0:f9: be:66:49:01:ba:2d:5b:c7:c0:79:e4:d0:66:d2:60:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:4e:37:31:b5:0e:1c:4e:46:78:9a:d0:66:ad:fc:16: 59:c6:c9:ee:9f:70:5e:0b:d0:5e:9c:66:4c:b1:d2:af: 1d:f0:d5:21:42:56:2d:1a:7e:85:b0:44:b3:4a:1a:86: a3:f7:31:23:d9:8f:7d:49:6f:91:0f:05:0f:24:10:1f: df:e0:99:73:c3:1f:df:cf:6a:41:41:f8:2b:82:4f:63: e5:a4:b2:5b:c0:c6:76:11:2a:f4:3e:e4:e1:e4:76:b2: 62:e1:b5:e9:7b:dc:ac:f6:d0:05:23:6b:af:66:35:50: 45:4e:b6:3a:63:0d:cf:c3:59:df:e9:4e:b9:99:28:b9: ff:a5:6e:bb:fb:eb:cf:e3:f7:e8:f0:3d:0d:b8:59:bb: 8e:1b:fd:40:ec:f4:9d:af:54:d0:34:64:18:18:1d:e1: 18:84:17:35:45:e9:88:68:e0:c3:ff:00:1b:74:e8:ab: 4b:9f:bd:59:d4:1d:66:7f:71:c3:0c:aa:22:5e:65:bd: 03:ce:79:e9:c7:46:fb:36:4f:71:5d:e2:a1:bb:33:be: fb:d7:d4:dd:25:48:f6:9b:67:38:d2:52:00:20:c8:ee: e5:d5:e3:e3:df:b4:dd:5a:29:6d:f9:13:a3:50:f3:ae: 02:a7:25:6f:19:2b:73:dd:50:bb:fa:9b:a9:fb:f0:d9 Fingerprint (SHA-256): 75:6A:A1:06:9F:FD:24:8C:16:37:65:04:1D:A0:AE:41:84:D8:70:CA:B6:9B:64:A6:F9:5F:9F:7C:20:74:03:C3 Fingerprint (SHA1): 74:51:F0:D5:87:B2:53:80:D9:32:D3:C2:7A:DF:1E:C1:F9:84:F4:CF Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #4547: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132626 (0x671f912) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Fri Jan 08 18:32:50 2016 Not After : Fri Jan 08 18:32:50 2066 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:06:12:91:61:ba:de:4f:46:e4:30:ee:6f:47:08:4e: 49:94:3a:fd:59:6b:33:d7:70:06:00:a9:21:17:9c:7c: d3:1a:4e:d5:75:a5:43:f8:eb:c8:70:90:f0:93:d6:86: 45:33:c5:3f:f4:dd:97:2d:84:0e:ad:9d:5d:51:3a:cc: 38:79:e7:76:e1:c2:1c:df:77:1e:b5:d6:6a:a3:82:d5: 01:ce:0e:84:0c:9a:22:5b:3b:59:06:08:b1:0e:66:f4: f9:50:f4:5a:14:61:7c:72:a6:85:af:4f:a0:03:c3:4b: ff:f4:3c:67:72:04:17:25:10:34:41:31:e4:9a:20:4e: 82:4b:49:52:fe:11:44:6c:0b:05:31:08:fc:dd:be:dc: 66:4c:f1:23:8f:93:c1:49:c8:d3:56:84:55:c3:2d:f0: 3e:b1:54:67:b2:3b:f4:ae:e8:ca:7c:a1:dd:0f:de:56: ec:9c:fc:34:b9:21:d0:66:d7:66:4e:e5:a5:c0:1a:33: 4e:39:3a:c4:55:fc:df:f8:52:2b:2c:84:5f:76:1e:f6: 11:e3:d1:37:82:41:c0:ea:32:3d:ca:fb:4c:c7:4f:5a: 4b:69:b7:78:d7:74:aa:25:63:dc:82:70:2c:f0:7f:70: 6d:38:cb:32:85:8c:11:9b:d6:fe:3b:3d:cf:08:50:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:91:d9:13:1d:5e:08:e3:c2:5a:af:90:12:2f:30:0e: 24:18:2f:26:3b:5a:84:4e:15:7d:61:c6:15:55:ba:c7: 56:b4:49:46:0e:23:be:4f:5f:27:34:52:53:f5:5f:c0: bb:03:91:8a:2b:dd:97:9a:a3:94:a0:c0:2c:57:78:0f: 10:29:89:c5:6c:bc:e2:73:be:53:fc:6b:48:55:aa:ed: 85:55:47:e4:c8:ce:b6:af:43:a9:b8:83:23:2d:31:da: 57:17:ca:05:ec:c9:6e:40:ec:c9:ea:00:18:56:c2:11: 50:bd:68:ca:d8:67:78:5d:12:b6:d8:40:99:f3:2e:e0: cc:0b:f2:36:88:03:82:82:a6:6e:e1:ec:96:04:98:64: eb:28:2c:37:6b:4a:25:aa:87:44:5a:9f:eb:43:65:38: e2:f8:c5:1a:12:23:74:9e:d1:dc:c8:e7:a1:15:60:1f: cf:0d:1b:f5:82:a1:91:6b:f8:d8:ec:41:02:3c:75:ef: f6:6a:22:f5:44:64:06:f2:49:76:5c:3c:0e:25:24:de: 2e:7d:42:30:c0:a8:a1:0a:62:dc:d6:91:b9:64:0a:73: 1e:f3:b8:10:57:0b:45:1a:9b:0b:4c:3a:3b:17:37:83: 65:8f:47:b0:b5:d2:0d:4c:45:bd:89:07:14:66:ef:09 Fingerprint (SHA-256): 64:86:1A:31:2C:06:BA:2F:0A:C2:69:1B:9F:CC:5E:DA:25:98:C2:6B:4B:E4:DD:88:7A:DE:9C:E6:7B:4E:FB:83 Fingerprint (SHA1): 9E:48:4E:1B:12:79:56:D2:57:E9:36:F7:2A:AE:A7:09:D4:45:AF:23 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #4548: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132627 (0x671f913) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Fri Jan 08 18:32:57 2016 Not After : Fri Jan 08 18:32:57 2066 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:25:6b:49:45:93:e5:b4:5b:98:19:7e:97:a6:ee:9f: 8e:c5:d7:aa:d7:ad:48:44:bc:b0:3d:51:a3:8c:28:07: b1:97:03:ba:a2:fe:33:d9:09:55:b9:9c:86:5d:9b:7d: a9:1d:df:3c:49:fe:33:b1:2c:f6:d6:ef:6f:9e:42:48: 19:ba:a2:ad:7c:1f:76:dd:98:17:26:4b:d1:69:4e:d5: f1:37:f2:77:ba:62:39:e7:fa:26:7d:0d:fb:28:cd:e7: 91:0e:6c:80:1d:7c:e2:b1:1b:68:e8:bd:42:d0:36:4c: ec:b4:f5:36:8b:42:4b:ce:22:b6:a8:73:f0:89:b3:02: a3:a2:40:7a:a0:02:b9:2b:5a:b2:87:e4:d6:2e:ce:b2: 84:58:03:15:c4:6b:0d:d1:f3:71:0e:e9:64:fa:53:a4: 6c:0d:25:b4:8f:55:2d:72:dc:de:a1:4a:dc:f1:15:61: cf:aa:98:54:a5:7b:d7:84:84:94:84:4f:08:4b:38:96: c2:c2:4e:49:4e:07:92:51:ce:57:96:e6:1b:a2:02:49: 79:c2:c1:b7:f9:bc:55:3d:7f:cf:bb:6f:4f:d2:7d:ef: 29:50:79:e1:58:57:7f:e3:48:ea:94:62:93:eb:8b:9c: 8d:98:c8:e3:e4:6e:6b:f3:4c:27:a3:4d:db:95:87:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c9:aa:27:60:9c:b8:f9:37:86:bb:56:cb:b5:a9:0e:fe: a1:0c:43:60:d6:47:17:f4:2c:47:b2:56:9e:1b:83:76: 9a:c0:fe:92:cf:e9:c4:34:dc:e7:2f:25:9d:68:0b:16: 0e:f4:d7:13:64:70:1b:fa:6b:db:7e:5a:e6:33:d2:44: 52:9c:bd:3c:9e:f1:dc:15:b8:4e:19:30:c9:9a:8b:20: 79:b0:63:b9:b7:bb:23:95:5c:bd:9a:48:11:dd:ce:29: 90:28:cf:ed:0e:fb:26:4e:d9:8d:bd:28:52:06:f7:72: a2:9c:13:d0:86:49:94:81:79:a0:a3:27:48:69:ed:de: d8:e1:36:2a:70:c7:cf:53:0d:21:7e:f2:e8:60:e4:76: 39:e4:36:e9:ea:2d:16:a6:02:2e:b5:08:7d:c8:e1:20: 20:11:85:3e:1c:e5:fa:b0:6c:c3:02:38:63:79:10:9d: 5f:ef:04:7d:36:54:27:6f:03:d0:36:8b:7a:33:df:66: 64:a1:43:fe:19:df:ca:cf:90:de:eb:fa:42:e0:f9:62: fe:69:4b:1a:83:29:2b:7b:ba:6d:f1:03:4c:ff:cb:6a: b8:3e:44:96:b2:87:0f:1c:3e:d7:cb:09:ee:53:e6:bf: 7f:67:b1:bf:b1:4f:07:8d:f6:99:c1:83:3f:fd:02:e0 Fingerprint (SHA-256): 60:FF:9B:D0:E4:6A:AE:2B:21:AE:7D:22:FC:98:2E:C6:4C:03:D2:A1:30:B0:35:E4:00:BA:3C:F3:00:53:7F:1B Fingerprint (SHA1): 2E:91:EB:E1:99:AD:F2:00:1D:89:8F:E7:D4:D0:1C:87:62:6B:6E:1A Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #4549: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132628 (0x671f914) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Fri Jan 08 18:33:19 2016 Not After : Fri Jan 08 18:33:19 2066 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:58:00:7e:9e:74:91:5e:4e:a6:ae:37:24:f5:90:24: 2d:49:f2:3e:1a:e2:a8:5a:f7:ce:09:c5:25:a3:71:02: 1a:f7:ae:47:14:e3:9d:a5:23:36:78:30:ec:ff:23:14: 3a:f2:22:58:50:89:cf:0b:8c:d3:7b:96:14:63:b3:52: b3:fb:5d:db:e9:f6:ee:a6:6f:ad:dd:0d:04:d4:ed:27: fd:09:03:9e:48:12:34:68:73:ed:d0:41:ca:d7:48:2d: 50:14:81:14:78:79:68:a6:55:25:b1:dc:2c:c0:74:b4: c4:b0:c4:95:a9:e6:00:b5:c6:5a:c0:49:23:fc:a4:ad: 5a:6c:0a:c1:49:70:a0:dd:08:9d:86:97:f0:71:b1:15: 0b:78:e4:2b:12:62:df:8c:8c:e8:50:0a:4d:61:7a:fc: 23:9f:27:a2:71:53:ce:3f:af:9b:ba:3c:b8:ab:ed:ad: 87:37:80:a6:bf:5f:37:d0:b2:5f:b7:b9:82:fb:a3:1f: c1:bb:04:f4:80:22:eb:53:13:d3:40:15:48:fc:5e:fe: 5c:79:70:4c:23:f5:be:41:7d:db:81:b6:95:d6:f1:e6: fa:4b:7b:47:73:ee:81:6e:68:48:aa:0b:f4:2f:dc:68: ac:b0:e2:6c:16:d0:31:4c:5d:b1:91:8f:5c:37:c9:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 58:76:44:b3:95:4c:2d:3b:52:d5:6b:02:40:a5:26:2d: 00:39:c5:e1:b6:47:20:de:d7:57:54:8b:95:0d:a7:22: cb:d7:aa:8a:9c:e5:ab:bd:f0:59:f7:2f:30:cf:50:7a: 74:de:04:ae:37:9c:b3:ef:d4:1b:8c:8e:e6:6a:57:d7: 5d:dd:7c:fc:dc:b9:a9:92:39:2e:63:a0:ae:a2:0f:38: 65:fa:09:07:ff:71:2a:b0:50:c1:b1:23:db:c6:b9:48: b2:31:51:44:14:5f:2d:ed:95:4d:47:10:e8:58:1d:57: 95:84:8c:17:7b:d7:58:a6:35:f4:03:19:26:0a:95:73: 3f:ff:25:76:45:9c:19:32:7b:ba:37:85:b1:8c:a1:cf: c2:27:85:2d:3d:22:97:7f:2f:6a:9c:cc:8e:3e:5f:f5: a1:c8:c0:06:11:3c:d7:84:8c:c1:ff:58:99:6b:25:89: 19:2d:54:e0:42:f7:c2:c7:e2:f1:12:96:52:98:0f:8d: a9:21:94:1a:3e:55:ed:0a:f3:64:24:d7:f0:47:80:72: 01:51:b9:49:d9:9c:99:15:8e:91:5c:a2:43:b3:f9:86: 9b:7f:87:89:0b:a4:eb:d5:ca:cb:ee:87:60:c8:6b:bd: a6:02:33:87:76:eb:81:f1:8f:1a:7f:ce:53:54:f0:01 Fingerprint (SHA-256): E8:5F:CE:BD:45:57:B2:E4:FF:60:4D:44:B4:5A:28:61:7B:8C:05:02:94:9B:1E:0D:83:7C:2B:94:60:60:92:91 Fingerprint (SHA1): 1D:8E:F5:B6:F5:57:CE:76:DE:58:0F:77:FC:BA:CD:DA:FC:97:92:5F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #4550: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132629 (0x671f915) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Fri Jan 08 18:33:33 2016 Not After : Fri Jan 08 18:33:33 2066 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:a9:bc:39:97:ac:9a:4a:e9:f3:fc:c0:47:7d:90:3f: 3b:53:2b:49:d9:8b:c3:b5:7e:35:54:c4:1d:c0:c9:c0: 48:66:2f:b3:4f:dc:28:cb:12:fa:2c:d0:72:a0:71:ac: 8b:f5:e3:a4:9b:7f:a1:93:63:d2:de:a3:ac:cf:84:d4: f7:f5:59:9c:fb:40:64:bc:cb:bb:e5:a5:c4:97:ed:b0: 90:d1:cc:e6:08:5c:80:99:cd:9b:b9:e6:77:4a:a7:f2: 62:3f:15:60:65:eb:4c:7d:73:59:5c:7d:60:7b:42:9d: a8:44:74:5d:2e:52:c9:32:20:5a:e1:74:9c:1e:d4:c8: 05:c9:ba:79:28:6a:48:bc:ee:45:42:e3:6c:37:f8:0f: 57:0c:32:90:2a:28:0c:48:12:fa:ee:dc:b4:20:de:16: ff:96:c9:47:ee:6c:89:cf:a4:ce:02:1c:a8:72:6a:44: f8:ff:93:8e:e3:a7:8e:5d:fe:c9:a6:f3:38:6d:de:fc: e5:0c:63:8b:c8:c7:8c:f0:db:c4:18:a4:e9:8f:d1:ed: 82:a6:26:f0:45:9c:f2:cd:e2:8e:ad:1f:29:9e:1b:a5: c4:c8:3f:6f:af:74:2e:b9:54:66:48:40:c5:01:16:73: 74:e1:f3:88:38:b0:ab:1f:36:6f:44:e8:01:e4:98:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:82:03:81:64:2a:42:1d:53:08:5e:e9:65:5f:c5:aa: bc:a7:d6:ee:25:60:9d:97:c1:f1:ab:d6:98:77:7c:a5: e5:34:32:a7:86:31:78:6a:19:dd:1e:4a:5a:ac:67:ad: cc:07:19:06:6f:0a:4b:57:ca:da:52:1c:81:7a:fd:06: c9:ca:e6:05:8c:c0:95:30:a7:07:41:3e:bf:c9:97:7d: 05:9c:90:df:3d:2b:e0:d2:b3:a9:19:c7:44:c1:78:7c: a2:f4:b7:ac:62:2a:ff:d8:9a:fc:d7:11:f0:a2:90:5e: 12:63:ad:e0:01:44:b0:a1:d6:21:b0:ff:29:e5:ad:11: 50:9b:6f:82:b7:e1:8e:3f:8d:06:8b:38:81:09:11:0a: e3:98:ce:c3:82:c0:b2:ac:06:f5:f5:da:87:a3:54:d7: f3:b1:5c:49:ec:c4:6b:65:8c:38:2c:b6:2a:be:af:46: d9:95:92:73:43:62:38:3a:5d:a1:69:a2:b2:69:14:9e: e3:26:73:b9:84:8c:26:10:83:a8:7c:9c:d4:a3:b8:1d: ba:a3:71:7f:a6:4d:73:c2:66:e8:f0:73:de:38:19:14: ff:2c:ba:b6:9c:b9:b4:20:3e:b4:2e:d3:04:02:52:c1: e4:ac:71:0d:c3:20:87:f7:61:d8:dc:64:8a:0a:9f:71 Fingerprint (SHA-256): 6C:59:35:F2:68:48:E4:21:43:A0:4B:91:B7:77:05:6D:20:D1:CC:4C:ED:A9:6F:C9:AB:C2:76:BD:05:85:20:EF Fingerprint (SHA1): 94:0C:3F:90:7A:A4:F3:1E:99:9C:48:22:26:6F:DF:A1:61:90:C0:3F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #4551: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4552: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132644 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4553: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4554: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4555: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4556: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108132645 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4557: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4558: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4559: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4560: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108132646 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4561: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4562: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #4563: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4564: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108132647 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4565: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4566: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4567: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132644 (0x671f924) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 18:35:52 2016 Not After : Fri Jan 08 18:35:52 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:d1:7f:06:01:b1:1f:01:57:87:4d:1d:ba:b7:07:b1: 87:e0:22:84:13:23:a3:6a:05:a6:b1:05:33:24:09:c8: 3f:42:00:e3:5e:f7:16:39:1c:e8:79:81:b6:2a:ab:fa: 29:c7:4f:22:b7:e0:c2:e9:6a:c8:99:b5:5b:f8:96:65: d4:b0:a4:4f:3c:25:43:9b:4a:23:d7:c7:a2:b0:12:5a: 29:84:0d:c9:7f:ee:a2:02:33:c1:8d:15:3c:17:5b:8c: fa:6e:0d:8c:96:25:a9:9b:48:f3:02:a2:7f:2d:4d:0f: 24:56:9f:35:fe:9f:c5:b6:e2:18:c0:9a:a9:c6:fd:d2: 14:54:2d:10:ed:0e:2d:5e:ee:7d:03:09:7d:d5:95:74: 55:6d:3d:7d:92:a3:5d:f2:b3:a5:fe:da:ba:92:bc:df: 5d:c4:82:54:74:19:20:54:ad:6a:67:ec:7a:88:14:e1: df:2e:05:cc:d6:51:90:4d:9e:49:ff:c3:4d:37:d0:da: 17:e1:e1:a8:3a:58:57:3c:65:1b:1a:83:fd:06:9e:3e: 31:0a:55:1e:76:58:8f:f8:eb:ab:c0:76:84:cd:c6:44: 24:4e:46:6a:46:b9:c2:50:21:c4:4b:0a:90:86:48:15: 29:ed:7c:c4:da:a9:27:a2:90:d5:ad:32:c5:73:9b:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:44:85:5a:8b:d2:fd:d0:61:ba:8b:6b:3e:12:34:68: fa:b8:5c:27:00:9d:f9:e4:fc:e0:5d:86:4f:6c:ea:e0: 62:76:1b:88:b0:1e:1d:73:34:eb:64:62:66:23:bd:b9: f3:93:92:6d:1a:cf:35:af:94:ab:dd:44:29:ad:4c:58: 3e:08:e4:b4:41:e3:bf:6a:63:7f:1a:60:0f:6e:1f:5b: 57:00:e6:8a:c7:65:a3:d7:e6:26:af:67:4c:22:1d:71: c8:d5:17:99:5f:2f:d9:3e:1a:4b:d9:44:c0:2d:cb:b9: be:d5:43:8a:08:03:91:67:f8:22:bc:08:5d:42:29:d3: f9:6f:55:6c:1c:62:e4:bf:a4:73:4c:99:7f:34:4b:d7: 33:f9:80:04:1e:8b:87:3a:26:74:03:23:97:2f:d0:99: 1d:06:cd:32:82:3f:65:3b:0e:8c:46:23:3a:f4:b9:58: d8:ba:7c:03:47:fb:b3:b8:3c:ba:d9:74:08:47:5c:d0: 66:ea:5a:ae:76:b4:aa:d3:49:f9:92:47:da:d0:df:1f: dc:2c:ab:2f:80:76:4a:91:01:30:ac:02:1d:44:68:b6: c8:e2:24:37:fd:1e:4d:62:44:89:eb:74:0c:6e:39:a2: 5f:bf:03:ad:6c:3d:97:1a:43:3f:ca:c1:7d:60:37:1e Fingerprint (SHA-256): E7:EE:C2:12:B6:53:4C:C6:77:2E:71:76:E4:DC:84:9B:AC:9C:73:A9:98:6A:27:16:3D:0F:53:E2:87:FA:DE:D3 Fingerprint (SHA1): AD:80:9D:A7:EB:AD:FD:54:C0:DC:C1:23:8E:81:DE:79:B3:D4:6D:EF Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4568: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4569: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132645 (0x671f925) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 18:36:00 2016 Not After : Fri Jan 08 18:36:00 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:16:b2:9c:1e:45:cb:71:87:62:b0:bf:90:9b:a6:16: 10:43:34:bc:c8:b5:04:7b:7a:b6:40:a4:34:ff:32:c4: e7:b6:e6:9d:7b:a0:f1:1d:c9:05:42:b4:a0:d1:06:8e: e2:30:d9:c8:fc:26:e8:cc:20:53:e9:40:eb:70:9f:77: 76:9b:90:60:af:94:a0:10:7b:2f:f2:d7:a9:7a:75:3e: 2d:4c:5a:d7:9a:f4:fd:40:10:22:14:65:e1:3c:85:1e: ce:01:24:c7:0d:fd:d7:05:fd:d8:fe:b3:39:bb:3c:81: bb:0a:ee:d6:f0:83:ce:d1:55:9e:25:d6:bc:c6:1f:21: 60:8d:2a:e1:b3:84:5e:82:9c:06:c6:d3:24:e4:55:82: 02:ef:a2:22:af:26:3f:bb:52:ac:c8:b0:a1:6b:c2:01: 7d:3a:56:65:59:ae:b0:ef:3d:bc:78:1f:d0:60:0c:33: 78:44:8c:fa:59:fa:e7:05:5c:23:2e:0f:38:98:a2:9c: fa:36:eb:82:66:0f:fa:b2:ea:dd:12:88:83:33:df:82: 42:07:5a:9b:77:ef:fb:09:d4:51:1c:f4:1e:6c:0d:bd: 31:ef:bb:af:cb:e9:96:16:2f:65:89:84:17:40:a2:59: d5:a3:31:8b:60:67:a4:5f:d8:bc:af:f3:93:eb:9d:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d6:d4:6a:8f:e8:f2:43:03:da:62:fa:1c:35:4c:88:e5: 89:11:98:76:7d:ca:96:2f:cf:e9:fb:9f:1c:50:88:20: 2b:bf:fc:75:93:2c:84:8f:52:ce:6d:31:95:a9:91:6d: 24:b7:e7:7e:8c:c5:f4:1e:78:4e:19:6d:6b:9b:f7:ff: db:7e:98:ee:27:79:90:64:26:e6:82:db:f2:a4:a1:80: a1:b8:1a:0e:bb:93:9a:3f:b2:5a:6a:09:d6:3d:77:ac: e5:16:c9:8c:30:ed:9a:78:2e:1b:f9:90:44:dc:10:53: 37:06:9b:5c:50:9b:7d:7c:c7:9c:ab:11:cd:45:c3:5c: e3:6e:b9:c2:ac:cf:b0:6c:e5:13:ac:fe:6e:92:e5:5d: e1:ec:aa:23:62:0b:3f:e0:4d:94:f4:a6:ea:36:e0:97: 53:62:78:24:95:e3:25:49:97:6d:dc:0a:23:2a:29:ee: bc:71:97:d3:f2:4d:f0:a7:19:79:ba:4e:1a:c7:b7:c0: 9f:51:78:4f:fa:42:95:6a:d6:c8:9b:3d:35:1b:3a:45: b9:5f:b2:a8:6a:9f:bf:a8:ed:d7:dd:52:bc:c6:3a:49: 93:1a:92:a7:0e:0f:5e:75:d2:59:4f:da:6d:41:0b:ed: d5:9f:8b:28:8f:7c:ba:94:05:18:d8:d5:68:1b:25:97 Fingerprint (SHA-256): B8:62:96:80:0E:01:F0:AA:20:CA:78:DC:D3:53:80:02:6D:15:5C:4B:25:59:E0:5B:8D:21:BE:83:BA:E5:C0:F1 Fingerprint (SHA1): CA:CB:5B:BF:5A:4D:C8:14:F0:CA:D5:56:31:A4:C4:EA:F0:49:1A:1C Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4570: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4571: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132646 (0x671f926) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 18:36:07 2016 Not After : Fri Jan 08 18:36:07 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:13:ce:1b:16:9e:26:c9:b8:20:e5:f5:72:8c:7c:20: f0:49:bd:ae:5a:87:92:0b:b1:c1:40:b5:40:3f:03:71: 13:f0:eb:06:ad:dc:52:49:d5:16:b8:7b:d2:ce:00:d7: 35:6c:70:85:1f:36:54:60:bd:3a:d0:e5:50:84:88:45: 94:cc:d9:20:a3:b6:4b:e0:d3:53:5a:63:66:c1:2e:78: 59:1b:1e:72:42:d9:2c:15:03:82:52:63:92:58:31:92: 9b:25:fc:ee:66:13:85:cb:ff:42:67:cc:2c:6d:55:9c: 57:10:4d:45:11:ed:7d:f4:d2:a9:c5:8d:2c:51:28:62: fc:48:6c:b4:4f:59:10:e1:9d:5d:e5:02:2c:87:8e:e6: 2c:15:b5:cd:a7:5f:58:34:cb:31:b3:8e:28:92:72:36: 08:63:16:74:5c:61:98:22:1f:42:3f:a5:55:28:e2:af: 0a:e7:fe:cf:cc:22:ce:25:9e:e0:81:c9:18:fa:a3:01: d4:36:0d:96:f1:4c:2b:31:c3:07:12:b9:ec:96:b0:e6: a3:25:59:7e:e5:72:cc:13:e9:cf:19:d6:5a:ca:76:b7: 78:08:c0:79:eb:06:7f:98:3a:a2:93:2d:7d:54:a3:73: 6f:21:d3:91:ac:d4:11:e9:80:8a:72:70:28:b0:d6:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:21:b4:2a:d1:e9:34:33:f5:4f:9f:b4:2e:15:18:3e: 08:a8:37:07:18:34:70:ca:63:b9:a1:28:f5:69:ee:1f: 33:26:14:48:99:56:24:df:50:57:6c:4d:43:ce:8d:ea: 6a:26:53:37:69:b5:74:1c:92:5b:48:ad:b7:e7:16:ea: 7c:a4:28:4e:54:55:80:c1:b6:fb:f4:bb:57:03:ae:24: b1:b3:10:fc:0a:5a:c0:6e:17:65:5f:08:d8:b6:a0:88: 32:32:2a:42:72:78:ec:b0:83:5b:b7:ef:b9:3d:64:f6: b1:75:2e:2f:8b:b8:ed:0a:a5:23:13:e2:99:1b:cb:ae: d9:2d:93:c9:36:4f:ea:2c:2e:6a:6c:f2:30:74:5c:c6: 2c:8c:f4:76:fc:46:8b:63:db:ba:65:96:0b:16:c6:ed: 3a:48:d6:a4:4e:af:b5:06:c2:60:f2:e2:7c:9c:64:a6: 4d:c7:3c:86:dc:30:78:ed:34:db:9a:03:fd:ab:b9:c9: 28:22:3e:e7:fe:38:0d:a8:f9:77:3c:d0:4c:03:32:f6: e7:83:16:fc:ae:25:ed:c5:97:a8:ee:bb:dc:38:40:8d: 0c:bc:e2:22:37:72:4a:70:61:ab:c1:bb:59:87:1c:3f: 13:94:ab:58:79:de:bc:8f:9a:40:31:bb:e6:9e:c3:8b Fingerprint (SHA-256): C8:DB:E5:4F:B1:9C:56:F9:0C:CC:96:92:22:C7:2E:00:81:53:44:96:B3:41:88:6C:31:D4:C5:5C:59:9E:FE:72 Fingerprint (SHA1): C3:B7:8A:BD:7C:17:43:35:C2:F3:2A:7B:FD:06:53:D7:BC:83:14:60 Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #4572: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4573: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #4574: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #4575: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #4576: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132644 (0x671f924) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 18:35:52 2016 Not After : Fri Jan 08 18:35:52 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:d1:7f:06:01:b1:1f:01:57:87:4d:1d:ba:b7:07:b1: 87:e0:22:84:13:23:a3:6a:05:a6:b1:05:33:24:09:c8: 3f:42:00:e3:5e:f7:16:39:1c:e8:79:81:b6:2a:ab:fa: 29:c7:4f:22:b7:e0:c2:e9:6a:c8:99:b5:5b:f8:96:65: d4:b0:a4:4f:3c:25:43:9b:4a:23:d7:c7:a2:b0:12:5a: 29:84:0d:c9:7f:ee:a2:02:33:c1:8d:15:3c:17:5b:8c: fa:6e:0d:8c:96:25:a9:9b:48:f3:02:a2:7f:2d:4d:0f: 24:56:9f:35:fe:9f:c5:b6:e2:18:c0:9a:a9:c6:fd:d2: 14:54:2d:10:ed:0e:2d:5e:ee:7d:03:09:7d:d5:95:74: 55:6d:3d:7d:92:a3:5d:f2:b3:a5:fe:da:ba:92:bc:df: 5d:c4:82:54:74:19:20:54:ad:6a:67:ec:7a:88:14:e1: df:2e:05:cc:d6:51:90:4d:9e:49:ff:c3:4d:37:d0:da: 17:e1:e1:a8:3a:58:57:3c:65:1b:1a:83:fd:06:9e:3e: 31:0a:55:1e:76:58:8f:f8:eb:ab:c0:76:84:cd:c6:44: 24:4e:46:6a:46:b9:c2:50:21:c4:4b:0a:90:86:48:15: 29:ed:7c:c4:da:a9:27:a2:90:d5:ad:32:c5:73:9b:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:44:85:5a:8b:d2:fd:d0:61:ba:8b:6b:3e:12:34:68: fa:b8:5c:27:00:9d:f9:e4:fc:e0:5d:86:4f:6c:ea:e0: 62:76:1b:88:b0:1e:1d:73:34:eb:64:62:66:23:bd:b9: f3:93:92:6d:1a:cf:35:af:94:ab:dd:44:29:ad:4c:58: 3e:08:e4:b4:41:e3:bf:6a:63:7f:1a:60:0f:6e:1f:5b: 57:00:e6:8a:c7:65:a3:d7:e6:26:af:67:4c:22:1d:71: c8:d5:17:99:5f:2f:d9:3e:1a:4b:d9:44:c0:2d:cb:b9: be:d5:43:8a:08:03:91:67:f8:22:bc:08:5d:42:29:d3: f9:6f:55:6c:1c:62:e4:bf:a4:73:4c:99:7f:34:4b:d7: 33:f9:80:04:1e:8b:87:3a:26:74:03:23:97:2f:d0:99: 1d:06:cd:32:82:3f:65:3b:0e:8c:46:23:3a:f4:b9:58: d8:ba:7c:03:47:fb:b3:b8:3c:ba:d9:74:08:47:5c:d0: 66:ea:5a:ae:76:b4:aa:d3:49:f9:92:47:da:d0:df:1f: dc:2c:ab:2f:80:76:4a:91:01:30:ac:02:1d:44:68:b6: c8:e2:24:37:fd:1e:4d:62:44:89:eb:74:0c:6e:39:a2: 5f:bf:03:ad:6c:3d:97:1a:43:3f:ca:c1:7d:60:37:1e Fingerprint (SHA-256): E7:EE:C2:12:B6:53:4C:C6:77:2E:71:76:E4:DC:84:9B:AC:9C:73:A9:98:6A:27:16:3D:0F:53:E2:87:FA:DE:D3 Fingerprint (SHA1): AD:80:9D:A7:EB:AD:FD:54:C0:DC:C1:23:8E:81:DE:79:B3:D4:6D:EF Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4577: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4578: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132645 (0x671f925) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 18:36:00 2016 Not After : Fri Jan 08 18:36:00 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:16:b2:9c:1e:45:cb:71:87:62:b0:bf:90:9b:a6:16: 10:43:34:bc:c8:b5:04:7b:7a:b6:40:a4:34:ff:32:c4: e7:b6:e6:9d:7b:a0:f1:1d:c9:05:42:b4:a0:d1:06:8e: e2:30:d9:c8:fc:26:e8:cc:20:53:e9:40:eb:70:9f:77: 76:9b:90:60:af:94:a0:10:7b:2f:f2:d7:a9:7a:75:3e: 2d:4c:5a:d7:9a:f4:fd:40:10:22:14:65:e1:3c:85:1e: ce:01:24:c7:0d:fd:d7:05:fd:d8:fe:b3:39:bb:3c:81: bb:0a:ee:d6:f0:83:ce:d1:55:9e:25:d6:bc:c6:1f:21: 60:8d:2a:e1:b3:84:5e:82:9c:06:c6:d3:24:e4:55:82: 02:ef:a2:22:af:26:3f:bb:52:ac:c8:b0:a1:6b:c2:01: 7d:3a:56:65:59:ae:b0:ef:3d:bc:78:1f:d0:60:0c:33: 78:44:8c:fa:59:fa:e7:05:5c:23:2e:0f:38:98:a2:9c: fa:36:eb:82:66:0f:fa:b2:ea:dd:12:88:83:33:df:82: 42:07:5a:9b:77:ef:fb:09:d4:51:1c:f4:1e:6c:0d:bd: 31:ef:bb:af:cb:e9:96:16:2f:65:89:84:17:40:a2:59: d5:a3:31:8b:60:67:a4:5f:d8:bc:af:f3:93:eb:9d:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d6:d4:6a:8f:e8:f2:43:03:da:62:fa:1c:35:4c:88:e5: 89:11:98:76:7d:ca:96:2f:cf:e9:fb:9f:1c:50:88:20: 2b:bf:fc:75:93:2c:84:8f:52:ce:6d:31:95:a9:91:6d: 24:b7:e7:7e:8c:c5:f4:1e:78:4e:19:6d:6b:9b:f7:ff: db:7e:98:ee:27:79:90:64:26:e6:82:db:f2:a4:a1:80: a1:b8:1a:0e:bb:93:9a:3f:b2:5a:6a:09:d6:3d:77:ac: e5:16:c9:8c:30:ed:9a:78:2e:1b:f9:90:44:dc:10:53: 37:06:9b:5c:50:9b:7d:7c:c7:9c:ab:11:cd:45:c3:5c: e3:6e:b9:c2:ac:cf:b0:6c:e5:13:ac:fe:6e:92:e5:5d: e1:ec:aa:23:62:0b:3f:e0:4d:94:f4:a6:ea:36:e0:97: 53:62:78:24:95:e3:25:49:97:6d:dc:0a:23:2a:29:ee: bc:71:97:d3:f2:4d:f0:a7:19:79:ba:4e:1a:c7:b7:c0: 9f:51:78:4f:fa:42:95:6a:d6:c8:9b:3d:35:1b:3a:45: b9:5f:b2:a8:6a:9f:bf:a8:ed:d7:dd:52:bc:c6:3a:49: 93:1a:92:a7:0e:0f:5e:75:d2:59:4f:da:6d:41:0b:ed: d5:9f:8b:28:8f:7c:ba:94:05:18:d8:d5:68:1b:25:97 Fingerprint (SHA-256): B8:62:96:80:0E:01:F0:AA:20:CA:78:DC:D3:53:80:02:6D:15:5C:4B:25:59:E0:5B:8D:21:BE:83:BA:E5:C0:F1 Fingerprint (SHA1): CA:CB:5B:BF:5A:4D:C8:14:F0:CA:D5:56:31:A4:C4:EA:F0:49:1A:1C Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4579: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4580: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132646 (0x671f926) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 18:36:07 2016 Not After : Fri Jan 08 18:36:07 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:13:ce:1b:16:9e:26:c9:b8:20:e5:f5:72:8c:7c:20: f0:49:bd:ae:5a:87:92:0b:b1:c1:40:b5:40:3f:03:71: 13:f0:eb:06:ad:dc:52:49:d5:16:b8:7b:d2:ce:00:d7: 35:6c:70:85:1f:36:54:60:bd:3a:d0:e5:50:84:88:45: 94:cc:d9:20:a3:b6:4b:e0:d3:53:5a:63:66:c1:2e:78: 59:1b:1e:72:42:d9:2c:15:03:82:52:63:92:58:31:92: 9b:25:fc:ee:66:13:85:cb:ff:42:67:cc:2c:6d:55:9c: 57:10:4d:45:11:ed:7d:f4:d2:a9:c5:8d:2c:51:28:62: fc:48:6c:b4:4f:59:10:e1:9d:5d:e5:02:2c:87:8e:e6: 2c:15:b5:cd:a7:5f:58:34:cb:31:b3:8e:28:92:72:36: 08:63:16:74:5c:61:98:22:1f:42:3f:a5:55:28:e2:af: 0a:e7:fe:cf:cc:22:ce:25:9e:e0:81:c9:18:fa:a3:01: d4:36:0d:96:f1:4c:2b:31:c3:07:12:b9:ec:96:b0:e6: a3:25:59:7e:e5:72:cc:13:e9:cf:19:d6:5a:ca:76:b7: 78:08:c0:79:eb:06:7f:98:3a:a2:93:2d:7d:54:a3:73: 6f:21:d3:91:ac:d4:11:e9:80:8a:72:70:28:b0:d6:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:21:b4:2a:d1:e9:34:33:f5:4f:9f:b4:2e:15:18:3e: 08:a8:37:07:18:34:70:ca:63:b9:a1:28:f5:69:ee:1f: 33:26:14:48:99:56:24:df:50:57:6c:4d:43:ce:8d:ea: 6a:26:53:37:69:b5:74:1c:92:5b:48:ad:b7:e7:16:ea: 7c:a4:28:4e:54:55:80:c1:b6:fb:f4:bb:57:03:ae:24: b1:b3:10:fc:0a:5a:c0:6e:17:65:5f:08:d8:b6:a0:88: 32:32:2a:42:72:78:ec:b0:83:5b:b7:ef:b9:3d:64:f6: b1:75:2e:2f:8b:b8:ed:0a:a5:23:13:e2:99:1b:cb:ae: d9:2d:93:c9:36:4f:ea:2c:2e:6a:6c:f2:30:74:5c:c6: 2c:8c:f4:76:fc:46:8b:63:db:ba:65:96:0b:16:c6:ed: 3a:48:d6:a4:4e:af:b5:06:c2:60:f2:e2:7c:9c:64:a6: 4d:c7:3c:86:dc:30:78:ed:34:db:9a:03:fd:ab:b9:c9: 28:22:3e:e7:fe:38:0d:a8:f9:77:3c:d0:4c:03:32:f6: e7:83:16:fc:ae:25:ed:c5:97:a8:ee:bb:dc:38:40:8d: 0c:bc:e2:22:37:72:4a:70:61:ab:c1:bb:59:87:1c:3f: 13:94:ab:58:79:de:bc:8f:9a:40:31:bb:e6:9e:c3:8b Fingerprint (SHA-256): C8:DB:E5:4F:B1:9C:56:F9:0C:CC:96:92:22:C7:2E:00:81:53:44:96:B3:41:88:6C:31:D4:C5:5C:59:9E:FE:72 Fingerprint (SHA1): C3:B7:8A:BD:7C:17:43:35:C2:F3:2A:7B:FD:06:53:D7:BC:83:14:60 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #4581: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4582: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4583: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132648 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4584: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4585: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4586: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4587: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108132649 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4588: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4589: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4590: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4591: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108132650 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4592: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4593: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #4594: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4595: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 108132651 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4596: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4597: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #4598: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4599: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 108132652 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4600: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4601: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4602: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132648 (0x671f928) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 18:36:26 2016 Not After : Fri Jan 08 18:36:26 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:ed:39:e2:be:2a:35:7c:4b:38:cf:04:a7:f3:bd:e6: 9d:54:57:d5:c6:54:8e:81:83:2e:2a:54:2e:a6:41:5f: cd:aa:9b:2e:71:fe:05:b0:16:66:57:a8:36:28:d0:a7: 95:94:16:e2:cd:01:d4:09:d9:30:14:d8:03:34:5f:9c: 0c:c4:b2:92:9a:cc:57:e5:68:00:cc:65:9c:ba:62:0d: 99:48:14:f8:e5:d5:8e:81:e3:17:13:25:31:4c:ff:17: 55:df:bc:9f:f8:03:74:8b:1a:e5:83:30:80:e4:e4:33: 7f:d0:3f:c8:dc:96:ec:e9:69:fc:a8:ad:24:e1:11:a2: 1e:c0:1c:e7:d0:3f:2e:6f:90:b8:87:53:48:1e:78:67: ce:9b:c9:1b:d4:3c:8c:41:9f:34:b2:a1:f8:2c:f5:92: ec:15:46:71:ad:14:b0:8a:f3:7e:16:f8:eb:ca:74:a6: 6c:0b:bd:5c:0c:40:bd:2f:06:e5:45:41:64:83:a5:22: ff:7b:c6:28:36:56:73:1b:be:f2:d8:ab:03:dc:1c:a3: 36:82:c6:c9:2e:b0:8a:42:7c:c1:46:13:86:e1:90:a2: 78:bc:c4:a2:79:ce:98:79:db:3a:a0:17:3b:f6:f3:00: 8e:cb:5f:47:5b:57:40:18:18:41:26:af:a5:01:a6:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:30:78:d9:54:29:57:fe:a8:a1:bd:ca:90:8a:1e:63: 20:ed:46:5c:c3:9b:c3:16:e1:e8:56:f0:f1:80:0a:fb: 35:c3:52:1b:ab:05:43:be:0a:01:0a:ff:cf:bb:0b:fc: 15:8c:2e:76:5f:da:64:fa:50:a3:d3:4f:41:01:0b:01: da:01:f3:fb:4d:b4:5b:34:30:9a:c0:c9:ae:6f:c2:1c: b1:f2:b2:5e:31:76:60:87:25:45:ff:d6:3c:a2:37:0a: b6:2a:09:8a:80:c1:60:e4:eb:49:d2:cd:ff:45:e1:a2: bc:a0:c0:f5:45:d3:e9:60:06:e7:21:85:e1:75:49:b8: 31:16:4e:0b:32:a4:c6:d7:e3:95:a6:90:4c:22:94:91: 8e:f8:f7:20:57:37:32:24:6c:2f:07:61:69:b4:0c:ed: 39:8d:c3:bb:3e:6d:1f:cd:b6:57:9b:40:fd:02:c5:eb: f9:22:71:15:49:88:f0:2c:80:52:38:6a:31:d6:b2:8c: 4d:2b:78:0e:1b:f4:fd:59:09:09:7d:bf:b7:9b:22:d1: b7:97:26:f9:f0:f0:df:e5:0f:08:3c:c1:11:ae:3c:ed: cd:26:e5:51:7a:5f:95:d5:f9:c6:9d:ec:93:57:11:66: 79:bd:4b:fd:c9:5b:dd:25:5c:aa:08:ac:7b:f2:16:5d Fingerprint (SHA-256): DD:D8:16:1F:9E:8D:7B:33:DC:E6:74:D1:72:EF:30:7C:99:32:7C:12:2E:DA:66:42:88:3A:27:FA:3B:4F:24:51 Fingerprint (SHA1): E2:E1:91:45:DC:D6:34:6A:E9:AC:F1:F4:D0:DE:51:F2:8B:E8:93:E3 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4603: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4604: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132649 (0x671f929) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 18:36:33 2016 Not After : Fri Jan 08 18:36:33 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:8c:94:3a:de:3f:40:91:02:da:95:af:b9:68:70:64: 17:ba:44:98:31:eb:3c:61:ee:02:3e:40:ff:1a:c5:76: 94:8f:3f:11:9f:b8:3e:67:85:c9:5d:5e:de:82:90:81: 64:b8:5f:f5:e5:4e:5b:01:a0:e3:24:17:7c:4c:5b:ee: 36:ea:d6:29:ca:1a:b2:cc:a9:6b:f2:96:29:ab:b2:fb: 3c:0a:c7:21:85:82:a7:9f:c0:62:21:9b:39:09:1b:d8: ec:42:a4:a1:22:8a:a9:c4:17:61:5e:c6:22:ad:67:ba: 63:34:e2:51:13:f1:54:70:b7:37:7b:40:8b:dd:d6:83: 0c:fb:d9:a3:b9:4b:8c:43:1f:b7:53:34:b5:ad:02:19: d4:23:89:42:a3:a7:99:5b:55:54:57:2c:2c:44:0b:3b: 34:45:de:cf:d8:08:5b:3f:be:79:4b:ab:b7:8d:bd:68: 0c:68:09:d8:45:28:43:6f:6a:1e:db:ae:c6:85:c1:e6: 7d:f0:70:cf:1d:b3:8e:d8:77:96:aa:37:65:e4:44:d9: d4:e6:fb:71:98:89:8b:e1:f3:62:27:7d:e0:24:be:89: 62:97:7f:5e:4c:ef:b7:a1:a7:7b:98:ab:42:7e:c4:a9: 1c:e0:c5:7d:e0:da:07:71:26:54:84:8d:01:2b:a8:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e3:71:74:e7:11:98:12:5e:89:96:7e:a9:59:e7:40:ef: 60:af:e4:86:16:28:bc:67:2d:d2:00:c0:ae:94:9b:64: 1a:e4:f8:37:bf:7d:c3:a4:d7:69:0a:c4:3d:12:c6:d3: 71:6b:66:03:cd:c1:fd:21:04:42:09:47:af:dd:ba:ba: 78:78:da:66:82:52:2a:66:4e:2d:63:f4:f3:61:f9:d5: 7f:bf:1f:55:b1:0c:b1:51:72:ca:e2:e9:79:ca:36:76: e8:7b:dc:7d:5b:7e:cc:f6:a5:7a:1e:b9:78:d6:93:7d: 0e:f8:77:48:09:b2:df:66:b6:f1:e7:36:8f:48:33:43: 2d:b4:0f:62:6f:15:23:df:95:8f:60:53:00:8b:2a:9c: 80:6b:54:37:62:6f:dc:da:02:d6:12:27:3d:59:34:a0: 31:5c:d5:c6:56:62:40:0c:2b:21:b4:be:41:ff:ba:78: 06:53:bd:82:31:22:26:1c:79:d3:21:d3:7b:0b:eb:5a: 49:12:95:bd:26:17:85:8f:a8:f9:6c:f9:e2:2c:1b:9a: f0:98:32:5f:bc:bb:70:8e:53:f8:97:dc:e0:e4:07:2b: 10:85:02:97:5d:f9:8d:02:04:e0:0f:09:d9:9b:03:3f: e4:9d:c9:a4:87:7c:b0:ec:d5:9b:1c:09:d9:61:94:2f Fingerprint (SHA-256): 56:2A:E7:35:24:3D:CA:B6:17:9E:0C:4A:1E:63:D2:43:9E:4D:5B:67:37:9F:CF:9D:37:3E:D9:AA:AC:20:18:65 Fingerprint (SHA1): FF:03:02:A3:EA:FC:03:F9:7E:CA:50:48:7C:28:5B:66:C6:5F:D3:88 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4605: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4606: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132650 (0x671f92a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 18:36:49 2016 Not After : Fri Jan 08 18:36:49 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:85:8e:b9:df:cb:aa:0c:a2:82:c1:21:5a:66:1f:74: c9:18:2e:72:cc:e7:53:92:51:e8:b6:2d:aa:eb:5e:50: d9:29:d4:1f:8b:80:af:54:5d:17:6e:7c:56:ee:35:e5: e1:77:bd:f1:b8:5e:51:44:b6:eb:fa:db:72:b0:e9:12: 7e:50:cb:87:ce:fc:89:cd:f2:36:ca:c8:f4:0f:ea:f0: 00:87:fb:3e:13:7a:a7:51:7a:fb:6e:36:76:82:b0:63: 7e:5d:64:ba:c0:b2:83:d1:0a:02:4a:7f:aa:d0:75:60: 79:16:42:f2:c9:bd:2a:d5:1a:f7:6e:39:56:10:2e:74: be:60:f2:d1:1a:10:3f:bb:24:3e:2d:e7:c3:80:20:6d: 1c:91:92:aa:fe:1c:bf:83:f6:ac:d9:85:7d:59:61:cf: 15:78:f9:7d:08:49:21:d7:b5:da:a3:45:60:71:14:91: 59:d6:7d:17:68:44:49:c6:9c:88:8e:62:ba:06:27:2a: df:79:c3:48:34:3b:4c:69:6b:e6:62:9f:52:af:43:db: f7:f7:7c:26:97:f9:fc:ba:44:80:48:fb:ef:cb:40:9a: 02:7b:4f:a6:90:a1:2f:eb:ee:5d:88:97:ad:6e:6a:8b: c9:bf:2c:d2:99:ab:5d:8e:f3:49:a0:40:88:fa:a3:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:26:5a:28:a5:4c:10:d5:f3:b5:93:5b:85:50:67:d3: 12:8a:de:07:e4:7c:4f:41:87:d5:19:3e:4c:c2:79:76: 6a:ac:01:a0:36:96:aa:00:89:3b:3b:85:a7:83:f9:88: 3c:83:05:7e:55:5f:50:1c:8c:47:f6:8f:e6:f6:e6:1d: aa:99:6f:d9:6a:fe:1a:34:cf:05:77:7d:24:dc:50:14: 5e:ca:06:a4:1a:10:c2:a1:70:1b:17:b0:62:d2:58:35: 2d:96:ac:91:38:ec:89:34:ce:47:9f:0a:05:b4:0e:b2: 0b:c8:3f:4b:96:0c:98:41:95:24:ce:93:bb:4a:59:04: cb:ba:46:db:14:c5:7c:42:c0:15:7e:da:13:90:81:16: 7b:d4:cd:4f:55:7a:4f:cb:76:fa:73:5e:64:17:44:d2: a0:63:2d:d7:64:93:09:87:1f:5e:2c:e2:c7:6f:cd:f2: 20:c2:e1:b5:59:cd:85:47:c9:75:8b:c2:78:ce:e5:9f: 65:fb:ed:75:9c:83:f9:6c:b3:9e:0b:39:21:ed:cc:69: bc:84:8e:54:74:fb:bd:13:b4:fd:fd:74:c3:e1:cf:06: ec:d1:b7:09:c5:ea:2d:27:64:c5:b9:25:5c:06:e8:dd: a8:51:fe:63:96:dc:c1:e1:05:e5:38:bc:c3:db:1d:45 Fingerprint (SHA-256): 01:74:8D:BE:65:6A:A3:50:FF:2B:03:22:2A:A6:55:9F:02:33:3A:2B:3C:F9:BF:16:13:91:66:D8:21:BD:6A:26 Fingerprint (SHA1): 1E:1D:0E:63:75:69:B1:2C:57:F1:BD:78:13:C3:09:35:98:D7:C0:8A Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #4607: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4608: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #4609: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #4610: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #4611: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132648 (0x671f928) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 18:36:26 2016 Not After : Fri Jan 08 18:36:26 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:ed:39:e2:be:2a:35:7c:4b:38:cf:04:a7:f3:bd:e6: 9d:54:57:d5:c6:54:8e:81:83:2e:2a:54:2e:a6:41:5f: cd:aa:9b:2e:71:fe:05:b0:16:66:57:a8:36:28:d0:a7: 95:94:16:e2:cd:01:d4:09:d9:30:14:d8:03:34:5f:9c: 0c:c4:b2:92:9a:cc:57:e5:68:00:cc:65:9c:ba:62:0d: 99:48:14:f8:e5:d5:8e:81:e3:17:13:25:31:4c:ff:17: 55:df:bc:9f:f8:03:74:8b:1a:e5:83:30:80:e4:e4:33: 7f:d0:3f:c8:dc:96:ec:e9:69:fc:a8:ad:24:e1:11:a2: 1e:c0:1c:e7:d0:3f:2e:6f:90:b8:87:53:48:1e:78:67: ce:9b:c9:1b:d4:3c:8c:41:9f:34:b2:a1:f8:2c:f5:92: ec:15:46:71:ad:14:b0:8a:f3:7e:16:f8:eb:ca:74:a6: 6c:0b:bd:5c:0c:40:bd:2f:06:e5:45:41:64:83:a5:22: ff:7b:c6:28:36:56:73:1b:be:f2:d8:ab:03:dc:1c:a3: 36:82:c6:c9:2e:b0:8a:42:7c:c1:46:13:86:e1:90:a2: 78:bc:c4:a2:79:ce:98:79:db:3a:a0:17:3b:f6:f3:00: 8e:cb:5f:47:5b:57:40:18:18:41:26:af:a5:01:a6:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:30:78:d9:54:29:57:fe:a8:a1:bd:ca:90:8a:1e:63: 20:ed:46:5c:c3:9b:c3:16:e1:e8:56:f0:f1:80:0a:fb: 35:c3:52:1b:ab:05:43:be:0a:01:0a:ff:cf:bb:0b:fc: 15:8c:2e:76:5f:da:64:fa:50:a3:d3:4f:41:01:0b:01: da:01:f3:fb:4d:b4:5b:34:30:9a:c0:c9:ae:6f:c2:1c: b1:f2:b2:5e:31:76:60:87:25:45:ff:d6:3c:a2:37:0a: b6:2a:09:8a:80:c1:60:e4:eb:49:d2:cd:ff:45:e1:a2: bc:a0:c0:f5:45:d3:e9:60:06:e7:21:85:e1:75:49:b8: 31:16:4e:0b:32:a4:c6:d7:e3:95:a6:90:4c:22:94:91: 8e:f8:f7:20:57:37:32:24:6c:2f:07:61:69:b4:0c:ed: 39:8d:c3:bb:3e:6d:1f:cd:b6:57:9b:40:fd:02:c5:eb: f9:22:71:15:49:88:f0:2c:80:52:38:6a:31:d6:b2:8c: 4d:2b:78:0e:1b:f4:fd:59:09:09:7d:bf:b7:9b:22:d1: b7:97:26:f9:f0:f0:df:e5:0f:08:3c:c1:11:ae:3c:ed: cd:26:e5:51:7a:5f:95:d5:f9:c6:9d:ec:93:57:11:66: 79:bd:4b:fd:c9:5b:dd:25:5c:aa:08:ac:7b:f2:16:5d Fingerprint (SHA-256): DD:D8:16:1F:9E:8D:7B:33:DC:E6:74:D1:72:EF:30:7C:99:32:7C:12:2E:DA:66:42:88:3A:27:FA:3B:4F:24:51 Fingerprint (SHA1): E2:E1:91:45:DC:D6:34:6A:E9:AC:F1:F4:D0:DE:51:F2:8B:E8:93:E3 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4612: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4613: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132649 (0x671f929) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 18:36:33 2016 Not After : Fri Jan 08 18:36:33 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:8c:94:3a:de:3f:40:91:02:da:95:af:b9:68:70:64: 17:ba:44:98:31:eb:3c:61:ee:02:3e:40:ff:1a:c5:76: 94:8f:3f:11:9f:b8:3e:67:85:c9:5d:5e:de:82:90:81: 64:b8:5f:f5:e5:4e:5b:01:a0:e3:24:17:7c:4c:5b:ee: 36:ea:d6:29:ca:1a:b2:cc:a9:6b:f2:96:29:ab:b2:fb: 3c:0a:c7:21:85:82:a7:9f:c0:62:21:9b:39:09:1b:d8: ec:42:a4:a1:22:8a:a9:c4:17:61:5e:c6:22:ad:67:ba: 63:34:e2:51:13:f1:54:70:b7:37:7b:40:8b:dd:d6:83: 0c:fb:d9:a3:b9:4b:8c:43:1f:b7:53:34:b5:ad:02:19: d4:23:89:42:a3:a7:99:5b:55:54:57:2c:2c:44:0b:3b: 34:45:de:cf:d8:08:5b:3f:be:79:4b:ab:b7:8d:bd:68: 0c:68:09:d8:45:28:43:6f:6a:1e:db:ae:c6:85:c1:e6: 7d:f0:70:cf:1d:b3:8e:d8:77:96:aa:37:65:e4:44:d9: d4:e6:fb:71:98:89:8b:e1:f3:62:27:7d:e0:24:be:89: 62:97:7f:5e:4c:ef:b7:a1:a7:7b:98:ab:42:7e:c4:a9: 1c:e0:c5:7d:e0:da:07:71:26:54:84:8d:01:2b:a8:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e3:71:74:e7:11:98:12:5e:89:96:7e:a9:59:e7:40:ef: 60:af:e4:86:16:28:bc:67:2d:d2:00:c0:ae:94:9b:64: 1a:e4:f8:37:bf:7d:c3:a4:d7:69:0a:c4:3d:12:c6:d3: 71:6b:66:03:cd:c1:fd:21:04:42:09:47:af:dd:ba:ba: 78:78:da:66:82:52:2a:66:4e:2d:63:f4:f3:61:f9:d5: 7f:bf:1f:55:b1:0c:b1:51:72:ca:e2:e9:79:ca:36:76: e8:7b:dc:7d:5b:7e:cc:f6:a5:7a:1e:b9:78:d6:93:7d: 0e:f8:77:48:09:b2:df:66:b6:f1:e7:36:8f:48:33:43: 2d:b4:0f:62:6f:15:23:df:95:8f:60:53:00:8b:2a:9c: 80:6b:54:37:62:6f:dc:da:02:d6:12:27:3d:59:34:a0: 31:5c:d5:c6:56:62:40:0c:2b:21:b4:be:41:ff:ba:78: 06:53:bd:82:31:22:26:1c:79:d3:21:d3:7b:0b:eb:5a: 49:12:95:bd:26:17:85:8f:a8:f9:6c:f9:e2:2c:1b:9a: f0:98:32:5f:bc:bb:70:8e:53:f8:97:dc:e0:e4:07:2b: 10:85:02:97:5d:f9:8d:02:04:e0:0f:09:d9:9b:03:3f: e4:9d:c9:a4:87:7c:b0:ec:d5:9b:1c:09:d9:61:94:2f Fingerprint (SHA-256): 56:2A:E7:35:24:3D:CA:B6:17:9E:0C:4A:1E:63:D2:43:9E:4D:5B:67:37:9F:CF:9D:37:3E:D9:AA:AC:20:18:65 Fingerprint (SHA1): FF:03:02:A3:EA:FC:03:F9:7E:CA:50:48:7C:28:5B:66:C6:5F:D3:88 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4614: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4615: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132650 (0x671f92a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 18:36:49 2016 Not After : Fri Jan 08 18:36:49 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:85:8e:b9:df:cb:aa:0c:a2:82:c1:21:5a:66:1f:74: c9:18:2e:72:cc:e7:53:92:51:e8:b6:2d:aa:eb:5e:50: d9:29:d4:1f:8b:80:af:54:5d:17:6e:7c:56:ee:35:e5: e1:77:bd:f1:b8:5e:51:44:b6:eb:fa:db:72:b0:e9:12: 7e:50:cb:87:ce:fc:89:cd:f2:36:ca:c8:f4:0f:ea:f0: 00:87:fb:3e:13:7a:a7:51:7a:fb:6e:36:76:82:b0:63: 7e:5d:64:ba:c0:b2:83:d1:0a:02:4a:7f:aa:d0:75:60: 79:16:42:f2:c9:bd:2a:d5:1a:f7:6e:39:56:10:2e:74: be:60:f2:d1:1a:10:3f:bb:24:3e:2d:e7:c3:80:20:6d: 1c:91:92:aa:fe:1c:bf:83:f6:ac:d9:85:7d:59:61:cf: 15:78:f9:7d:08:49:21:d7:b5:da:a3:45:60:71:14:91: 59:d6:7d:17:68:44:49:c6:9c:88:8e:62:ba:06:27:2a: df:79:c3:48:34:3b:4c:69:6b:e6:62:9f:52:af:43:db: f7:f7:7c:26:97:f9:fc:ba:44:80:48:fb:ef:cb:40:9a: 02:7b:4f:a6:90:a1:2f:eb:ee:5d:88:97:ad:6e:6a:8b: c9:bf:2c:d2:99:ab:5d:8e:f3:49:a0:40:88:fa:a3:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:26:5a:28:a5:4c:10:d5:f3:b5:93:5b:85:50:67:d3: 12:8a:de:07:e4:7c:4f:41:87:d5:19:3e:4c:c2:79:76: 6a:ac:01:a0:36:96:aa:00:89:3b:3b:85:a7:83:f9:88: 3c:83:05:7e:55:5f:50:1c:8c:47:f6:8f:e6:f6:e6:1d: aa:99:6f:d9:6a:fe:1a:34:cf:05:77:7d:24:dc:50:14: 5e:ca:06:a4:1a:10:c2:a1:70:1b:17:b0:62:d2:58:35: 2d:96:ac:91:38:ec:89:34:ce:47:9f:0a:05:b4:0e:b2: 0b:c8:3f:4b:96:0c:98:41:95:24:ce:93:bb:4a:59:04: cb:ba:46:db:14:c5:7c:42:c0:15:7e:da:13:90:81:16: 7b:d4:cd:4f:55:7a:4f:cb:76:fa:73:5e:64:17:44:d2: a0:63:2d:d7:64:93:09:87:1f:5e:2c:e2:c7:6f:cd:f2: 20:c2:e1:b5:59:cd:85:47:c9:75:8b:c2:78:ce:e5:9f: 65:fb:ed:75:9c:83:f9:6c:b3:9e:0b:39:21:ed:cc:69: bc:84:8e:54:74:fb:bd:13:b4:fd:fd:74:c3:e1:cf:06: ec:d1:b7:09:c5:ea:2d:27:64:c5:b9:25:5c:06:e8:dd: a8:51:fe:63:96:dc:c1:e1:05:e5:38:bc:c3:db:1d:45 Fingerprint (SHA-256): 01:74:8D:BE:65:6A:A3:50:FF:2B:03:22:2A:A6:55:9F:02:33:3A:2B:3C:F9:BF:16:13:91:66:D8:21:BD:6A:26 Fingerprint (SHA1): 1E:1D:0E:63:75:69:B1:2C:57:F1:BD:78:13:C3:09:35:98:D7:C0:8A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #4616: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4617: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132648 (0x671f928) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 18:36:26 2016 Not After : Fri Jan 08 18:36:26 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:ed:39:e2:be:2a:35:7c:4b:38:cf:04:a7:f3:bd:e6: 9d:54:57:d5:c6:54:8e:81:83:2e:2a:54:2e:a6:41:5f: cd:aa:9b:2e:71:fe:05:b0:16:66:57:a8:36:28:d0:a7: 95:94:16:e2:cd:01:d4:09:d9:30:14:d8:03:34:5f:9c: 0c:c4:b2:92:9a:cc:57:e5:68:00:cc:65:9c:ba:62:0d: 99:48:14:f8:e5:d5:8e:81:e3:17:13:25:31:4c:ff:17: 55:df:bc:9f:f8:03:74:8b:1a:e5:83:30:80:e4:e4:33: 7f:d0:3f:c8:dc:96:ec:e9:69:fc:a8:ad:24:e1:11:a2: 1e:c0:1c:e7:d0:3f:2e:6f:90:b8:87:53:48:1e:78:67: ce:9b:c9:1b:d4:3c:8c:41:9f:34:b2:a1:f8:2c:f5:92: ec:15:46:71:ad:14:b0:8a:f3:7e:16:f8:eb:ca:74:a6: 6c:0b:bd:5c:0c:40:bd:2f:06:e5:45:41:64:83:a5:22: ff:7b:c6:28:36:56:73:1b:be:f2:d8:ab:03:dc:1c:a3: 36:82:c6:c9:2e:b0:8a:42:7c:c1:46:13:86:e1:90:a2: 78:bc:c4:a2:79:ce:98:79:db:3a:a0:17:3b:f6:f3:00: 8e:cb:5f:47:5b:57:40:18:18:41:26:af:a5:01:a6:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:30:78:d9:54:29:57:fe:a8:a1:bd:ca:90:8a:1e:63: 20:ed:46:5c:c3:9b:c3:16:e1:e8:56:f0:f1:80:0a:fb: 35:c3:52:1b:ab:05:43:be:0a:01:0a:ff:cf:bb:0b:fc: 15:8c:2e:76:5f:da:64:fa:50:a3:d3:4f:41:01:0b:01: da:01:f3:fb:4d:b4:5b:34:30:9a:c0:c9:ae:6f:c2:1c: b1:f2:b2:5e:31:76:60:87:25:45:ff:d6:3c:a2:37:0a: b6:2a:09:8a:80:c1:60:e4:eb:49:d2:cd:ff:45:e1:a2: bc:a0:c0:f5:45:d3:e9:60:06:e7:21:85:e1:75:49:b8: 31:16:4e:0b:32:a4:c6:d7:e3:95:a6:90:4c:22:94:91: 8e:f8:f7:20:57:37:32:24:6c:2f:07:61:69:b4:0c:ed: 39:8d:c3:bb:3e:6d:1f:cd:b6:57:9b:40:fd:02:c5:eb: f9:22:71:15:49:88:f0:2c:80:52:38:6a:31:d6:b2:8c: 4d:2b:78:0e:1b:f4:fd:59:09:09:7d:bf:b7:9b:22:d1: b7:97:26:f9:f0:f0:df:e5:0f:08:3c:c1:11:ae:3c:ed: cd:26:e5:51:7a:5f:95:d5:f9:c6:9d:ec:93:57:11:66: 79:bd:4b:fd:c9:5b:dd:25:5c:aa:08:ac:7b:f2:16:5d Fingerprint (SHA-256): DD:D8:16:1F:9E:8D:7B:33:DC:E6:74:D1:72:EF:30:7C:99:32:7C:12:2E:DA:66:42:88:3A:27:FA:3B:4F:24:51 Fingerprint (SHA1): E2:E1:91:45:DC:D6:34:6A:E9:AC:F1:F4:D0:DE:51:F2:8B:E8:93:E3 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4618: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132648 (0x671f928) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 18:36:26 2016 Not After : Fri Jan 08 18:36:26 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:ed:39:e2:be:2a:35:7c:4b:38:cf:04:a7:f3:bd:e6: 9d:54:57:d5:c6:54:8e:81:83:2e:2a:54:2e:a6:41:5f: cd:aa:9b:2e:71:fe:05:b0:16:66:57:a8:36:28:d0:a7: 95:94:16:e2:cd:01:d4:09:d9:30:14:d8:03:34:5f:9c: 0c:c4:b2:92:9a:cc:57:e5:68:00:cc:65:9c:ba:62:0d: 99:48:14:f8:e5:d5:8e:81:e3:17:13:25:31:4c:ff:17: 55:df:bc:9f:f8:03:74:8b:1a:e5:83:30:80:e4:e4:33: 7f:d0:3f:c8:dc:96:ec:e9:69:fc:a8:ad:24:e1:11:a2: 1e:c0:1c:e7:d0:3f:2e:6f:90:b8:87:53:48:1e:78:67: ce:9b:c9:1b:d4:3c:8c:41:9f:34:b2:a1:f8:2c:f5:92: ec:15:46:71:ad:14:b0:8a:f3:7e:16:f8:eb:ca:74:a6: 6c:0b:bd:5c:0c:40:bd:2f:06:e5:45:41:64:83:a5:22: ff:7b:c6:28:36:56:73:1b:be:f2:d8:ab:03:dc:1c:a3: 36:82:c6:c9:2e:b0:8a:42:7c:c1:46:13:86:e1:90:a2: 78:bc:c4:a2:79:ce:98:79:db:3a:a0:17:3b:f6:f3:00: 8e:cb:5f:47:5b:57:40:18:18:41:26:af:a5:01:a6:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:30:78:d9:54:29:57:fe:a8:a1:bd:ca:90:8a:1e:63: 20:ed:46:5c:c3:9b:c3:16:e1:e8:56:f0:f1:80:0a:fb: 35:c3:52:1b:ab:05:43:be:0a:01:0a:ff:cf:bb:0b:fc: 15:8c:2e:76:5f:da:64:fa:50:a3:d3:4f:41:01:0b:01: da:01:f3:fb:4d:b4:5b:34:30:9a:c0:c9:ae:6f:c2:1c: b1:f2:b2:5e:31:76:60:87:25:45:ff:d6:3c:a2:37:0a: b6:2a:09:8a:80:c1:60:e4:eb:49:d2:cd:ff:45:e1:a2: bc:a0:c0:f5:45:d3:e9:60:06:e7:21:85:e1:75:49:b8: 31:16:4e:0b:32:a4:c6:d7:e3:95:a6:90:4c:22:94:91: 8e:f8:f7:20:57:37:32:24:6c:2f:07:61:69:b4:0c:ed: 39:8d:c3:bb:3e:6d:1f:cd:b6:57:9b:40:fd:02:c5:eb: f9:22:71:15:49:88:f0:2c:80:52:38:6a:31:d6:b2:8c: 4d:2b:78:0e:1b:f4:fd:59:09:09:7d:bf:b7:9b:22:d1: b7:97:26:f9:f0:f0:df:e5:0f:08:3c:c1:11:ae:3c:ed: cd:26:e5:51:7a:5f:95:d5:f9:c6:9d:ec:93:57:11:66: 79:bd:4b:fd:c9:5b:dd:25:5c:aa:08:ac:7b:f2:16:5d Fingerprint (SHA-256): DD:D8:16:1F:9E:8D:7B:33:DC:E6:74:D1:72:EF:30:7C:99:32:7C:12:2E:DA:66:42:88:3A:27:FA:3B:4F:24:51 Fingerprint (SHA1): E2:E1:91:45:DC:D6:34:6A:E9:AC:F1:F4:D0:DE:51:F2:8B:E8:93:E3 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4619: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132649 (0x671f929) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 18:36:33 2016 Not After : Fri Jan 08 18:36:33 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:8c:94:3a:de:3f:40:91:02:da:95:af:b9:68:70:64: 17:ba:44:98:31:eb:3c:61:ee:02:3e:40:ff:1a:c5:76: 94:8f:3f:11:9f:b8:3e:67:85:c9:5d:5e:de:82:90:81: 64:b8:5f:f5:e5:4e:5b:01:a0:e3:24:17:7c:4c:5b:ee: 36:ea:d6:29:ca:1a:b2:cc:a9:6b:f2:96:29:ab:b2:fb: 3c:0a:c7:21:85:82:a7:9f:c0:62:21:9b:39:09:1b:d8: ec:42:a4:a1:22:8a:a9:c4:17:61:5e:c6:22:ad:67:ba: 63:34:e2:51:13:f1:54:70:b7:37:7b:40:8b:dd:d6:83: 0c:fb:d9:a3:b9:4b:8c:43:1f:b7:53:34:b5:ad:02:19: d4:23:89:42:a3:a7:99:5b:55:54:57:2c:2c:44:0b:3b: 34:45:de:cf:d8:08:5b:3f:be:79:4b:ab:b7:8d:bd:68: 0c:68:09:d8:45:28:43:6f:6a:1e:db:ae:c6:85:c1:e6: 7d:f0:70:cf:1d:b3:8e:d8:77:96:aa:37:65:e4:44:d9: d4:e6:fb:71:98:89:8b:e1:f3:62:27:7d:e0:24:be:89: 62:97:7f:5e:4c:ef:b7:a1:a7:7b:98:ab:42:7e:c4:a9: 1c:e0:c5:7d:e0:da:07:71:26:54:84:8d:01:2b:a8:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e3:71:74:e7:11:98:12:5e:89:96:7e:a9:59:e7:40:ef: 60:af:e4:86:16:28:bc:67:2d:d2:00:c0:ae:94:9b:64: 1a:e4:f8:37:bf:7d:c3:a4:d7:69:0a:c4:3d:12:c6:d3: 71:6b:66:03:cd:c1:fd:21:04:42:09:47:af:dd:ba:ba: 78:78:da:66:82:52:2a:66:4e:2d:63:f4:f3:61:f9:d5: 7f:bf:1f:55:b1:0c:b1:51:72:ca:e2:e9:79:ca:36:76: e8:7b:dc:7d:5b:7e:cc:f6:a5:7a:1e:b9:78:d6:93:7d: 0e:f8:77:48:09:b2:df:66:b6:f1:e7:36:8f:48:33:43: 2d:b4:0f:62:6f:15:23:df:95:8f:60:53:00:8b:2a:9c: 80:6b:54:37:62:6f:dc:da:02:d6:12:27:3d:59:34:a0: 31:5c:d5:c6:56:62:40:0c:2b:21:b4:be:41:ff:ba:78: 06:53:bd:82:31:22:26:1c:79:d3:21:d3:7b:0b:eb:5a: 49:12:95:bd:26:17:85:8f:a8:f9:6c:f9:e2:2c:1b:9a: f0:98:32:5f:bc:bb:70:8e:53:f8:97:dc:e0:e4:07:2b: 10:85:02:97:5d:f9:8d:02:04:e0:0f:09:d9:9b:03:3f: e4:9d:c9:a4:87:7c:b0:ec:d5:9b:1c:09:d9:61:94:2f Fingerprint (SHA-256): 56:2A:E7:35:24:3D:CA:B6:17:9E:0C:4A:1E:63:D2:43:9E:4D:5B:67:37:9F:CF:9D:37:3E:D9:AA:AC:20:18:65 Fingerprint (SHA1): FF:03:02:A3:EA:FC:03:F9:7E:CA:50:48:7C:28:5B:66:C6:5F:D3:88 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4620: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132649 (0x671f929) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 18:36:33 2016 Not After : Fri Jan 08 18:36:33 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:8c:94:3a:de:3f:40:91:02:da:95:af:b9:68:70:64: 17:ba:44:98:31:eb:3c:61:ee:02:3e:40:ff:1a:c5:76: 94:8f:3f:11:9f:b8:3e:67:85:c9:5d:5e:de:82:90:81: 64:b8:5f:f5:e5:4e:5b:01:a0:e3:24:17:7c:4c:5b:ee: 36:ea:d6:29:ca:1a:b2:cc:a9:6b:f2:96:29:ab:b2:fb: 3c:0a:c7:21:85:82:a7:9f:c0:62:21:9b:39:09:1b:d8: ec:42:a4:a1:22:8a:a9:c4:17:61:5e:c6:22:ad:67:ba: 63:34:e2:51:13:f1:54:70:b7:37:7b:40:8b:dd:d6:83: 0c:fb:d9:a3:b9:4b:8c:43:1f:b7:53:34:b5:ad:02:19: d4:23:89:42:a3:a7:99:5b:55:54:57:2c:2c:44:0b:3b: 34:45:de:cf:d8:08:5b:3f:be:79:4b:ab:b7:8d:bd:68: 0c:68:09:d8:45:28:43:6f:6a:1e:db:ae:c6:85:c1:e6: 7d:f0:70:cf:1d:b3:8e:d8:77:96:aa:37:65:e4:44:d9: d4:e6:fb:71:98:89:8b:e1:f3:62:27:7d:e0:24:be:89: 62:97:7f:5e:4c:ef:b7:a1:a7:7b:98:ab:42:7e:c4:a9: 1c:e0:c5:7d:e0:da:07:71:26:54:84:8d:01:2b:a8:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e3:71:74:e7:11:98:12:5e:89:96:7e:a9:59:e7:40:ef: 60:af:e4:86:16:28:bc:67:2d:d2:00:c0:ae:94:9b:64: 1a:e4:f8:37:bf:7d:c3:a4:d7:69:0a:c4:3d:12:c6:d3: 71:6b:66:03:cd:c1:fd:21:04:42:09:47:af:dd:ba:ba: 78:78:da:66:82:52:2a:66:4e:2d:63:f4:f3:61:f9:d5: 7f:bf:1f:55:b1:0c:b1:51:72:ca:e2:e9:79:ca:36:76: e8:7b:dc:7d:5b:7e:cc:f6:a5:7a:1e:b9:78:d6:93:7d: 0e:f8:77:48:09:b2:df:66:b6:f1:e7:36:8f:48:33:43: 2d:b4:0f:62:6f:15:23:df:95:8f:60:53:00:8b:2a:9c: 80:6b:54:37:62:6f:dc:da:02:d6:12:27:3d:59:34:a0: 31:5c:d5:c6:56:62:40:0c:2b:21:b4:be:41:ff:ba:78: 06:53:bd:82:31:22:26:1c:79:d3:21:d3:7b:0b:eb:5a: 49:12:95:bd:26:17:85:8f:a8:f9:6c:f9:e2:2c:1b:9a: f0:98:32:5f:bc:bb:70:8e:53:f8:97:dc:e0:e4:07:2b: 10:85:02:97:5d:f9:8d:02:04:e0:0f:09:d9:9b:03:3f: e4:9d:c9:a4:87:7c:b0:ec:d5:9b:1c:09:d9:61:94:2f Fingerprint (SHA-256): 56:2A:E7:35:24:3D:CA:B6:17:9E:0C:4A:1E:63:D2:43:9E:4D:5B:67:37:9F:CF:9D:37:3E:D9:AA:AC:20:18:65 Fingerprint (SHA1): FF:03:02:A3:EA:FC:03:F9:7E:CA:50:48:7C:28:5B:66:C6:5F:D3:88 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4621: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132650 (0x671f92a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 18:36:49 2016 Not After : Fri Jan 08 18:36:49 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:85:8e:b9:df:cb:aa:0c:a2:82:c1:21:5a:66:1f:74: c9:18:2e:72:cc:e7:53:92:51:e8:b6:2d:aa:eb:5e:50: d9:29:d4:1f:8b:80:af:54:5d:17:6e:7c:56:ee:35:e5: e1:77:bd:f1:b8:5e:51:44:b6:eb:fa:db:72:b0:e9:12: 7e:50:cb:87:ce:fc:89:cd:f2:36:ca:c8:f4:0f:ea:f0: 00:87:fb:3e:13:7a:a7:51:7a:fb:6e:36:76:82:b0:63: 7e:5d:64:ba:c0:b2:83:d1:0a:02:4a:7f:aa:d0:75:60: 79:16:42:f2:c9:bd:2a:d5:1a:f7:6e:39:56:10:2e:74: be:60:f2:d1:1a:10:3f:bb:24:3e:2d:e7:c3:80:20:6d: 1c:91:92:aa:fe:1c:bf:83:f6:ac:d9:85:7d:59:61:cf: 15:78:f9:7d:08:49:21:d7:b5:da:a3:45:60:71:14:91: 59:d6:7d:17:68:44:49:c6:9c:88:8e:62:ba:06:27:2a: df:79:c3:48:34:3b:4c:69:6b:e6:62:9f:52:af:43:db: f7:f7:7c:26:97:f9:fc:ba:44:80:48:fb:ef:cb:40:9a: 02:7b:4f:a6:90:a1:2f:eb:ee:5d:88:97:ad:6e:6a:8b: c9:bf:2c:d2:99:ab:5d:8e:f3:49:a0:40:88:fa:a3:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:26:5a:28:a5:4c:10:d5:f3:b5:93:5b:85:50:67:d3: 12:8a:de:07:e4:7c:4f:41:87:d5:19:3e:4c:c2:79:76: 6a:ac:01:a0:36:96:aa:00:89:3b:3b:85:a7:83:f9:88: 3c:83:05:7e:55:5f:50:1c:8c:47:f6:8f:e6:f6:e6:1d: aa:99:6f:d9:6a:fe:1a:34:cf:05:77:7d:24:dc:50:14: 5e:ca:06:a4:1a:10:c2:a1:70:1b:17:b0:62:d2:58:35: 2d:96:ac:91:38:ec:89:34:ce:47:9f:0a:05:b4:0e:b2: 0b:c8:3f:4b:96:0c:98:41:95:24:ce:93:bb:4a:59:04: cb:ba:46:db:14:c5:7c:42:c0:15:7e:da:13:90:81:16: 7b:d4:cd:4f:55:7a:4f:cb:76:fa:73:5e:64:17:44:d2: a0:63:2d:d7:64:93:09:87:1f:5e:2c:e2:c7:6f:cd:f2: 20:c2:e1:b5:59:cd:85:47:c9:75:8b:c2:78:ce:e5:9f: 65:fb:ed:75:9c:83:f9:6c:b3:9e:0b:39:21:ed:cc:69: bc:84:8e:54:74:fb:bd:13:b4:fd:fd:74:c3:e1:cf:06: ec:d1:b7:09:c5:ea:2d:27:64:c5:b9:25:5c:06:e8:dd: a8:51:fe:63:96:dc:c1:e1:05:e5:38:bc:c3:db:1d:45 Fingerprint (SHA-256): 01:74:8D:BE:65:6A:A3:50:FF:2B:03:22:2A:A6:55:9F:02:33:3A:2B:3C:F9:BF:16:13:91:66:D8:21:BD:6A:26 Fingerprint (SHA1): 1E:1D:0E:63:75:69:B1:2C:57:F1:BD:78:13:C3:09:35:98:D7:C0:8A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #4622: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132650 (0x671f92a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 18:36:49 2016 Not After : Fri Jan 08 18:36:49 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:85:8e:b9:df:cb:aa:0c:a2:82:c1:21:5a:66:1f:74: c9:18:2e:72:cc:e7:53:92:51:e8:b6:2d:aa:eb:5e:50: d9:29:d4:1f:8b:80:af:54:5d:17:6e:7c:56:ee:35:e5: e1:77:bd:f1:b8:5e:51:44:b6:eb:fa:db:72:b0:e9:12: 7e:50:cb:87:ce:fc:89:cd:f2:36:ca:c8:f4:0f:ea:f0: 00:87:fb:3e:13:7a:a7:51:7a:fb:6e:36:76:82:b0:63: 7e:5d:64:ba:c0:b2:83:d1:0a:02:4a:7f:aa:d0:75:60: 79:16:42:f2:c9:bd:2a:d5:1a:f7:6e:39:56:10:2e:74: be:60:f2:d1:1a:10:3f:bb:24:3e:2d:e7:c3:80:20:6d: 1c:91:92:aa:fe:1c:bf:83:f6:ac:d9:85:7d:59:61:cf: 15:78:f9:7d:08:49:21:d7:b5:da:a3:45:60:71:14:91: 59:d6:7d:17:68:44:49:c6:9c:88:8e:62:ba:06:27:2a: df:79:c3:48:34:3b:4c:69:6b:e6:62:9f:52:af:43:db: f7:f7:7c:26:97:f9:fc:ba:44:80:48:fb:ef:cb:40:9a: 02:7b:4f:a6:90:a1:2f:eb:ee:5d:88:97:ad:6e:6a:8b: c9:bf:2c:d2:99:ab:5d:8e:f3:49:a0:40:88:fa:a3:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:26:5a:28:a5:4c:10:d5:f3:b5:93:5b:85:50:67:d3: 12:8a:de:07:e4:7c:4f:41:87:d5:19:3e:4c:c2:79:76: 6a:ac:01:a0:36:96:aa:00:89:3b:3b:85:a7:83:f9:88: 3c:83:05:7e:55:5f:50:1c:8c:47:f6:8f:e6:f6:e6:1d: aa:99:6f:d9:6a:fe:1a:34:cf:05:77:7d:24:dc:50:14: 5e:ca:06:a4:1a:10:c2:a1:70:1b:17:b0:62:d2:58:35: 2d:96:ac:91:38:ec:89:34:ce:47:9f:0a:05:b4:0e:b2: 0b:c8:3f:4b:96:0c:98:41:95:24:ce:93:bb:4a:59:04: cb:ba:46:db:14:c5:7c:42:c0:15:7e:da:13:90:81:16: 7b:d4:cd:4f:55:7a:4f:cb:76:fa:73:5e:64:17:44:d2: a0:63:2d:d7:64:93:09:87:1f:5e:2c:e2:c7:6f:cd:f2: 20:c2:e1:b5:59:cd:85:47:c9:75:8b:c2:78:ce:e5:9f: 65:fb:ed:75:9c:83:f9:6c:b3:9e:0b:39:21:ed:cc:69: bc:84:8e:54:74:fb:bd:13:b4:fd:fd:74:c3:e1:cf:06: ec:d1:b7:09:c5:ea:2d:27:64:c5:b9:25:5c:06:e8:dd: a8:51:fe:63:96:dc:c1:e1:05:e5:38:bc:c3:db:1d:45 Fingerprint (SHA-256): 01:74:8D:BE:65:6A:A3:50:FF:2B:03:22:2A:A6:55:9F:02:33:3A:2B:3C:F9:BF:16:13:91:66:D8:21:BD:6A:26 Fingerprint (SHA1): 1E:1D:0E:63:75:69:B1:2C:57:F1:BD:78:13:C3:09:35:98:D7:C0:8A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #4623: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #4624: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132653 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4625: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #4626: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4627: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4628: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108132654 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4629: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4630: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4631: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4632: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108132655 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #4633: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4634: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #4635: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4636: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 108132656 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4637: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4638: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #4639: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4640: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 108132657 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4641: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4642: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #4643: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4644: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 108132658 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4645: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4646: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #4647: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4648: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 108132659 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4649: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4650: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4651: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #4652: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #4653: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #4654: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #4655: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132653 (0x671f92d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 18:37:46 2016 Not After : Fri Jan 08 18:37:46 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:11:58:2f:1b:17:f9:29:ad:1d:57:e6:b5:9f:e3:71: 85:cd:29:3c:53:1b:e0:01:5f:df:21:97:ed:4f:ae:11: 0d:d2:ee:97:17:df:52:69:3f:8d:95:20:79:2d:6e:49: b6:9a:76:d5:12:2e:1d:05:b0:48:67:80:7b:28:29:72: 06:44:0d:b1:55:25:64:b6:6b:bb:1e:56:2e:7e:f9:b8: 65:b4:78:88:c6:50:7b:d5:dc:a5:e0:23:2b:14:6c:79: ff:a6:2d:0d:02:11:1a:9b:99:17:8f:5c:7f:80:45:7d: 7c:07:48:7f:96:6d:30:b9:60:73:38:1d:8d:e2:30:44: 8c:1b:54:d7:78:cf:87:66:5f:50:b9:4c:61:f4:ee:1f: 60:50:df:65:a5:80:71:f9:bc:46:d0:69:0b:80:61:ef: 04:aa:0e:79:37:d6:93:4e:91:0c:41:d9:84:4b:25:f8: f3:e2:e4:93:57:a0:13:29:42:e9:38:e0:16:2b:71:f5: 09:09:6b:66:c4:60:e0:d5:72:36:6c:22:b3:8d:7c:11: e4:38:46:88:aa:ac:e9:6c:c8:19:d3:1c:9c:fd:b4:5a: aa:20:c1:82:2a:d8:a1:a3:13:ca:9c:b9:6a:f5:36:88: e9:72:d8:6d:e4:ea:23:11:da:55:ec:00:94:7f:0d:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:06:a8:34:c6:19:ab:0f:d3:86:4f:cb:6a:27:b5:24: ee:d2:f7:41:6e:0d:3f:0b:06:60:fb:88:b1:54:33:0b: 88:21:b2:5b:59:4e:c3:88:47:de:b8:53:92:20:2e:9d: ef:6b:1b:05:2c:b0:42:b2:e2:f4:5e:d0:ee:ae:34:b6: 0a:72:50:8a:75:f5:cf:95:16:85:71:88:69:b3:74:2b: 62:84:9b:e8:89:a1:28:c7:90:e0:e9:5f:6d:6e:91:80: b6:fd:fc:84:a1:72:63:5c:6b:1d:e8:7d:e1:0e:ad:11: 78:75:9f:96:6c:ba:90:24:3a:cf:4a:72:14:c2:e0:87: 14:01:55:a3:b0:6b:01:09:dd:01:f8:40:46:c1:70:5e: 86:81:f2:09:dc:90:aa:23:35:47:1f:69:e8:4b:98:a1: 98:02:de:bf:49:0f:ff:3a:89:cb:c1:d2:c4:c8:83:03: 48:dd:dc:7a:71:d2:14:94:80:46:10:2c:55:e9:6c:eb: 19:3d:72:d0:fb:12:d6:de:b2:c1:8e:4f:29:f6:e7:4d: f7:7c:bf:e4:2e:f1:8d:51:80:49:a3:ec:28:72:6b:b3: 90:e2:0e:2a:d1:18:ec:a6:b5:7b:f3:0c:9d:13:5f:81: 31:11:26:a6:38:8a:c3:65:99:ba:48:d1:c7:72:fb:00 Fingerprint (SHA-256): E8:87:27:2C:0C:F2:15:ED:E7:D2:28:6A:A0:9C:B7:6E:3C:5E:17:A6:09:A8:11:AF:46:06:70:00:2A:16:D0:AB Fingerprint (SHA1): B9:67:DF:FE:13:07:41:C3:85:1C:72:3A:7E:0E:33:2F:E3:C1:D2:57 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4656: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4657: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4658: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4659: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132653 (0x671f92d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 18:37:46 2016 Not After : Fri Jan 08 18:37:46 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:11:58:2f:1b:17:f9:29:ad:1d:57:e6:b5:9f:e3:71: 85:cd:29:3c:53:1b:e0:01:5f:df:21:97:ed:4f:ae:11: 0d:d2:ee:97:17:df:52:69:3f:8d:95:20:79:2d:6e:49: b6:9a:76:d5:12:2e:1d:05:b0:48:67:80:7b:28:29:72: 06:44:0d:b1:55:25:64:b6:6b:bb:1e:56:2e:7e:f9:b8: 65:b4:78:88:c6:50:7b:d5:dc:a5:e0:23:2b:14:6c:79: ff:a6:2d:0d:02:11:1a:9b:99:17:8f:5c:7f:80:45:7d: 7c:07:48:7f:96:6d:30:b9:60:73:38:1d:8d:e2:30:44: 8c:1b:54:d7:78:cf:87:66:5f:50:b9:4c:61:f4:ee:1f: 60:50:df:65:a5:80:71:f9:bc:46:d0:69:0b:80:61:ef: 04:aa:0e:79:37:d6:93:4e:91:0c:41:d9:84:4b:25:f8: f3:e2:e4:93:57:a0:13:29:42:e9:38:e0:16:2b:71:f5: 09:09:6b:66:c4:60:e0:d5:72:36:6c:22:b3:8d:7c:11: e4:38:46:88:aa:ac:e9:6c:c8:19:d3:1c:9c:fd:b4:5a: aa:20:c1:82:2a:d8:a1:a3:13:ca:9c:b9:6a:f5:36:88: e9:72:d8:6d:e4:ea:23:11:da:55:ec:00:94:7f:0d:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:06:a8:34:c6:19:ab:0f:d3:86:4f:cb:6a:27:b5:24: ee:d2:f7:41:6e:0d:3f:0b:06:60:fb:88:b1:54:33:0b: 88:21:b2:5b:59:4e:c3:88:47:de:b8:53:92:20:2e:9d: ef:6b:1b:05:2c:b0:42:b2:e2:f4:5e:d0:ee:ae:34:b6: 0a:72:50:8a:75:f5:cf:95:16:85:71:88:69:b3:74:2b: 62:84:9b:e8:89:a1:28:c7:90:e0:e9:5f:6d:6e:91:80: b6:fd:fc:84:a1:72:63:5c:6b:1d:e8:7d:e1:0e:ad:11: 78:75:9f:96:6c:ba:90:24:3a:cf:4a:72:14:c2:e0:87: 14:01:55:a3:b0:6b:01:09:dd:01:f8:40:46:c1:70:5e: 86:81:f2:09:dc:90:aa:23:35:47:1f:69:e8:4b:98:a1: 98:02:de:bf:49:0f:ff:3a:89:cb:c1:d2:c4:c8:83:03: 48:dd:dc:7a:71:d2:14:94:80:46:10:2c:55:e9:6c:eb: 19:3d:72:d0:fb:12:d6:de:b2:c1:8e:4f:29:f6:e7:4d: f7:7c:bf:e4:2e:f1:8d:51:80:49:a3:ec:28:72:6b:b3: 90:e2:0e:2a:d1:18:ec:a6:b5:7b:f3:0c:9d:13:5f:81: 31:11:26:a6:38:8a:c3:65:99:ba:48:d1:c7:72:fb:00 Fingerprint (SHA-256): E8:87:27:2C:0C:F2:15:ED:E7:D2:28:6A:A0:9C:B7:6E:3C:5E:17:A6:09:A8:11:AF:46:06:70:00:2A:16:D0:AB Fingerprint (SHA1): B9:67:DF:FE:13:07:41:C3:85:1C:72:3A:7E:0E:33:2F:E3:C1:D2:57 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4660: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4661: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #4662: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132660 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4663: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #4664: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4665: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4666: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108132661 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #4667: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4668: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #4669: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4670: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 108132662 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4671: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4672: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #4673: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4674: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 108132663 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4675: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4676: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #4677: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4678: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 108132664 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4679: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4680: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #4681: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4682: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 108132665 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4683: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4684: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #4685: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4686: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 108132666 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4687: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4688: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #4689: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4690: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 108132667 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4691: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4692: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #4693: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4694: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 108132668 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #4695: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4696: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #4697: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4698: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 108132669 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4699: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4700: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #4701: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4702: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 108132670 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4703: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4704: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #4705: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4706: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 108132671 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4707: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4708: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #4709: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4710: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 108132672 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4711: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4712: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #4713: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4714: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 108132673 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4715: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4716: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #4717: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4718: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 108132674 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4719: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4720: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #4721: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4722: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 108132675 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4723: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4724: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #4725: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4726: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 108132676 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4727: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4728: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #4729: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4730: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 108132677 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #4731: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4732: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #4733: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4734: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 108132678 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4735: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4736: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #4737: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4738: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 108132679 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4739: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4740: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #4741: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4742: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 108132680 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4743: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4744: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #4745: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4746: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 108132681 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4747: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4748: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #4749: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4750: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 108132682 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4751: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4752: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #4753: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4754: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 108132683 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4755: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4756: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #4757: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4758: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 108132684 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4759: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4760: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #4761: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4762: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 108132685 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4763: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4764: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #4765: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4766: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 108132686 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4767: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4768: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #4769: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4770: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 108132687 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4771: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4772: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #4773: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4774: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 108132688 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4775: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4776: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #4777: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4778: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 108132689 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4779: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4780: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4781: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132660 (0x671f934) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 18:38:54 2016 Not After : Fri Jan 08 18:38:54 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:99:b0:b4:f4:aa:f1:b9:1f:32:68:56:d7:28:af:e9: 34:09:6b:0a:c2:bb:ab:86:b4:44:d8:cb:c5:47:3a:83: 78:e4:51:6a:60:3c:1d:81:45:2a:9f:4b:b9:16:fb:63: 7a:fc:a4:97:88:35:d3:d3:94:81:e7:17:92:04:80:05: 60:97:91:11:d4:28:ad:87:d7:39:38:b5:33:bb:cc:09: 53:80:cd:46:09:86:a2:4c:c1:29:77:cc:c5:80:ef:1f: 06:11:0b:8f:e2:11:c4:63:75:53:b7:cf:12:3e:e0:9d: a5:10:92:5c:44:c2:ca:f6:d4:69:bf:58:7d:da:a7:08: d8:0c:b7:c8:94:0c:32:7a:66:21:af:e2:75:10:67:fb: 4d:af:83:c1:b0:c5:5a:fa:2f:3e:76:0e:97:ac:ad:c3: 3c:2e:5f:ee:4b:be:de:f0:87:16:3e:3d:45:e5:09:a1: 7e:ff:e9:23:01:83:1b:c3:cd:93:48:d1:e3:b8:3a:fa: d4:87:9a:b3:6e:c7:55:ce:6a:c2:c2:fb:a3:2b:3b:fb: d2:d9:af:f5:fa:b8:2c:a4:c9:51:66:f1:c1:b7:b7:a1: 24:60:24:09:33:fb:ec:f0:25:2f:a3:95:b9:a5:ee:5f: 36:a6:fb:f5:36:26:9a:79:1e:ae:38:27:6e:02:ca:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:aa:61:18:e5:b7:d7:c6:2e:5a:c9:72:77:89:fb:9b: 44:59:56:b3:85:67:a2:3f:4e:44:91:32:b6:c7:c5:9b: 3b:6e:c0:88:8b:fc:4d:de:7e:86:03:71:58:35:6e:c6: cc:e2:74:d2:01:c3:64:3b:1f:aa:1e:d1:c1:e8:50:f8: 43:72:22:41:ff:fb:e9:70:d9:ba:1e:49:54:b2:e2:67: 3b:d0:73:16:e5:4c:b3:f7:2c:ef:63:0e:2f:e4:40:34: 00:2e:02:b5:35:b2:0f:47:8a:b0:ed:de:e4:30:c9:ee: e7:c7:4d:d3:a3:c3:c2:e8:67:b3:b0:38:fe:23:f2:4f: b0:9e:62:ed:73:3c:f2:fb:eb:4d:70:ca:51:d4:db:74: 2c:76:ac:40:4c:ef:f1:53:6f:36:17:d6:50:e5:c8:6f: 3a:0e:b6:0d:b9:9e:d3:b0:77:64:56:20:01:35:e4:0f: 30:f1:bb:e3:5f:66:a7:8d:7c:42:fc:f1:54:c4:2b:3c: 66:11:49:e3:fa:c0:b8:09:df:3a:bb:09:52:c0:5f:5d: 5a:13:3c:ff:1f:9b:e6:77:2f:43:2f:12:47:b4:2d:d4: 88:d4:73:61:e4:79:b1:2b:f6:d2:0d:dd:9a:f2:07:42: f4:23:b1:7f:6c:19:b8:77:00:d4:7f:fd:9c:da:44:22 Fingerprint (SHA-256): 53:E7:2A:6B:93:F6:29:C8:D4:A5:29:93:52:4A:71:FF:29:98:2B:DD:9D:97:A1:76:C8:26:98:DF:6C:DF:29:88 Fingerprint (SHA1): 9C:B9:E2:DD:9D:6B:17:D8:9F:FC:9A:BC:EE:15:30:3D:6D:F1:15:B9 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4782: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4783: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132660 (0x671f934) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 18:38:54 2016 Not After : Fri Jan 08 18:38:54 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:99:b0:b4:f4:aa:f1:b9:1f:32:68:56:d7:28:af:e9: 34:09:6b:0a:c2:bb:ab:86:b4:44:d8:cb:c5:47:3a:83: 78:e4:51:6a:60:3c:1d:81:45:2a:9f:4b:b9:16:fb:63: 7a:fc:a4:97:88:35:d3:d3:94:81:e7:17:92:04:80:05: 60:97:91:11:d4:28:ad:87:d7:39:38:b5:33:bb:cc:09: 53:80:cd:46:09:86:a2:4c:c1:29:77:cc:c5:80:ef:1f: 06:11:0b:8f:e2:11:c4:63:75:53:b7:cf:12:3e:e0:9d: a5:10:92:5c:44:c2:ca:f6:d4:69:bf:58:7d:da:a7:08: d8:0c:b7:c8:94:0c:32:7a:66:21:af:e2:75:10:67:fb: 4d:af:83:c1:b0:c5:5a:fa:2f:3e:76:0e:97:ac:ad:c3: 3c:2e:5f:ee:4b:be:de:f0:87:16:3e:3d:45:e5:09:a1: 7e:ff:e9:23:01:83:1b:c3:cd:93:48:d1:e3:b8:3a:fa: d4:87:9a:b3:6e:c7:55:ce:6a:c2:c2:fb:a3:2b:3b:fb: d2:d9:af:f5:fa:b8:2c:a4:c9:51:66:f1:c1:b7:b7:a1: 24:60:24:09:33:fb:ec:f0:25:2f:a3:95:b9:a5:ee:5f: 36:a6:fb:f5:36:26:9a:79:1e:ae:38:27:6e:02:ca:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:aa:61:18:e5:b7:d7:c6:2e:5a:c9:72:77:89:fb:9b: 44:59:56:b3:85:67:a2:3f:4e:44:91:32:b6:c7:c5:9b: 3b:6e:c0:88:8b:fc:4d:de:7e:86:03:71:58:35:6e:c6: cc:e2:74:d2:01:c3:64:3b:1f:aa:1e:d1:c1:e8:50:f8: 43:72:22:41:ff:fb:e9:70:d9:ba:1e:49:54:b2:e2:67: 3b:d0:73:16:e5:4c:b3:f7:2c:ef:63:0e:2f:e4:40:34: 00:2e:02:b5:35:b2:0f:47:8a:b0:ed:de:e4:30:c9:ee: e7:c7:4d:d3:a3:c3:c2:e8:67:b3:b0:38:fe:23:f2:4f: b0:9e:62:ed:73:3c:f2:fb:eb:4d:70:ca:51:d4:db:74: 2c:76:ac:40:4c:ef:f1:53:6f:36:17:d6:50:e5:c8:6f: 3a:0e:b6:0d:b9:9e:d3:b0:77:64:56:20:01:35:e4:0f: 30:f1:bb:e3:5f:66:a7:8d:7c:42:fc:f1:54:c4:2b:3c: 66:11:49:e3:fa:c0:b8:09:df:3a:bb:09:52:c0:5f:5d: 5a:13:3c:ff:1f:9b:e6:77:2f:43:2f:12:47:b4:2d:d4: 88:d4:73:61:e4:79:b1:2b:f6:d2:0d:dd:9a:f2:07:42: f4:23:b1:7f:6c:19:b8:77:00:d4:7f:fd:9c:da:44:22 Fingerprint (SHA-256): 53:E7:2A:6B:93:F6:29:C8:D4:A5:29:93:52:4A:71:FF:29:98:2B:DD:9D:97:A1:76:C8:26:98:DF:6C:DF:29:88 Fingerprint (SHA1): 9C:B9:E2:DD:9D:6B:17:D8:9F:FC:9A:BC:EE:15:30:3D:6D:F1:15:B9 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4784: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4785: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4786: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4787: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132660 (0x671f934) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 18:38:54 2016 Not After : Fri Jan 08 18:38:54 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:99:b0:b4:f4:aa:f1:b9:1f:32:68:56:d7:28:af:e9: 34:09:6b:0a:c2:bb:ab:86:b4:44:d8:cb:c5:47:3a:83: 78:e4:51:6a:60:3c:1d:81:45:2a:9f:4b:b9:16:fb:63: 7a:fc:a4:97:88:35:d3:d3:94:81:e7:17:92:04:80:05: 60:97:91:11:d4:28:ad:87:d7:39:38:b5:33:bb:cc:09: 53:80:cd:46:09:86:a2:4c:c1:29:77:cc:c5:80:ef:1f: 06:11:0b:8f:e2:11:c4:63:75:53:b7:cf:12:3e:e0:9d: a5:10:92:5c:44:c2:ca:f6:d4:69:bf:58:7d:da:a7:08: d8:0c:b7:c8:94:0c:32:7a:66:21:af:e2:75:10:67:fb: 4d:af:83:c1:b0:c5:5a:fa:2f:3e:76:0e:97:ac:ad:c3: 3c:2e:5f:ee:4b:be:de:f0:87:16:3e:3d:45:e5:09:a1: 7e:ff:e9:23:01:83:1b:c3:cd:93:48:d1:e3:b8:3a:fa: d4:87:9a:b3:6e:c7:55:ce:6a:c2:c2:fb:a3:2b:3b:fb: d2:d9:af:f5:fa:b8:2c:a4:c9:51:66:f1:c1:b7:b7:a1: 24:60:24:09:33:fb:ec:f0:25:2f:a3:95:b9:a5:ee:5f: 36:a6:fb:f5:36:26:9a:79:1e:ae:38:27:6e:02:ca:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:aa:61:18:e5:b7:d7:c6:2e:5a:c9:72:77:89:fb:9b: 44:59:56:b3:85:67:a2:3f:4e:44:91:32:b6:c7:c5:9b: 3b:6e:c0:88:8b:fc:4d:de:7e:86:03:71:58:35:6e:c6: cc:e2:74:d2:01:c3:64:3b:1f:aa:1e:d1:c1:e8:50:f8: 43:72:22:41:ff:fb:e9:70:d9:ba:1e:49:54:b2:e2:67: 3b:d0:73:16:e5:4c:b3:f7:2c:ef:63:0e:2f:e4:40:34: 00:2e:02:b5:35:b2:0f:47:8a:b0:ed:de:e4:30:c9:ee: e7:c7:4d:d3:a3:c3:c2:e8:67:b3:b0:38:fe:23:f2:4f: b0:9e:62:ed:73:3c:f2:fb:eb:4d:70:ca:51:d4:db:74: 2c:76:ac:40:4c:ef:f1:53:6f:36:17:d6:50:e5:c8:6f: 3a:0e:b6:0d:b9:9e:d3:b0:77:64:56:20:01:35:e4:0f: 30:f1:bb:e3:5f:66:a7:8d:7c:42:fc:f1:54:c4:2b:3c: 66:11:49:e3:fa:c0:b8:09:df:3a:bb:09:52:c0:5f:5d: 5a:13:3c:ff:1f:9b:e6:77:2f:43:2f:12:47:b4:2d:d4: 88:d4:73:61:e4:79:b1:2b:f6:d2:0d:dd:9a:f2:07:42: f4:23:b1:7f:6c:19:b8:77:00:d4:7f:fd:9c:da:44:22 Fingerprint (SHA-256): 53:E7:2A:6B:93:F6:29:C8:D4:A5:29:93:52:4A:71:FF:29:98:2B:DD:9D:97:A1:76:C8:26:98:DF:6C:DF:29:88 Fingerprint (SHA1): 9C:B9:E2:DD:9D:6B:17:D8:9F:FC:9A:BC:EE:15:30:3D:6D:F1:15:B9 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4788: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4789: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4790: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4791: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132660 (0x671f934) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 18:38:54 2016 Not After : Fri Jan 08 18:38:54 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:99:b0:b4:f4:aa:f1:b9:1f:32:68:56:d7:28:af:e9: 34:09:6b:0a:c2:bb:ab:86:b4:44:d8:cb:c5:47:3a:83: 78:e4:51:6a:60:3c:1d:81:45:2a:9f:4b:b9:16:fb:63: 7a:fc:a4:97:88:35:d3:d3:94:81:e7:17:92:04:80:05: 60:97:91:11:d4:28:ad:87:d7:39:38:b5:33:bb:cc:09: 53:80:cd:46:09:86:a2:4c:c1:29:77:cc:c5:80:ef:1f: 06:11:0b:8f:e2:11:c4:63:75:53:b7:cf:12:3e:e0:9d: a5:10:92:5c:44:c2:ca:f6:d4:69:bf:58:7d:da:a7:08: d8:0c:b7:c8:94:0c:32:7a:66:21:af:e2:75:10:67:fb: 4d:af:83:c1:b0:c5:5a:fa:2f:3e:76:0e:97:ac:ad:c3: 3c:2e:5f:ee:4b:be:de:f0:87:16:3e:3d:45:e5:09:a1: 7e:ff:e9:23:01:83:1b:c3:cd:93:48:d1:e3:b8:3a:fa: d4:87:9a:b3:6e:c7:55:ce:6a:c2:c2:fb:a3:2b:3b:fb: d2:d9:af:f5:fa:b8:2c:a4:c9:51:66:f1:c1:b7:b7:a1: 24:60:24:09:33:fb:ec:f0:25:2f:a3:95:b9:a5:ee:5f: 36:a6:fb:f5:36:26:9a:79:1e:ae:38:27:6e:02:ca:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:aa:61:18:e5:b7:d7:c6:2e:5a:c9:72:77:89:fb:9b: 44:59:56:b3:85:67:a2:3f:4e:44:91:32:b6:c7:c5:9b: 3b:6e:c0:88:8b:fc:4d:de:7e:86:03:71:58:35:6e:c6: cc:e2:74:d2:01:c3:64:3b:1f:aa:1e:d1:c1:e8:50:f8: 43:72:22:41:ff:fb:e9:70:d9:ba:1e:49:54:b2:e2:67: 3b:d0:73:16:e5:4c:b3:f7:2c:ef:63:0e:2f:e4:40:34: 00:2e:02:b5:35:b2:0f:47:8a:b0:ed:de:e4:30:c9:ee: e7:c7:4d:d3:a3:c3:c2:e8:67:b3:b0:38:fe:23:f2:4f: b0:9e:62:ed:73:3c:f2:fb:eb:4d:70:ca:51:d4:db:74: 2c:76:ac:40:4c:ef:f1:53:6f:36:17:d6:50:e5:c8:6f: 3a:0e:b6:0d:b9:9e:d3:b0:77:64:56:20:01:35:e4:0f: 30:f1:bb:e3:5f:66:a7:8d:7c:42:fc:f1:54:c4:2b:3c: 66:11:49:e3:fa:c0:b8:09:df:3a:bb:09:52:c0:5f:5d: 5a:13:3c:ff:1f:9b:e6:77:2f:43:2f:12:47:b4:2d:d4: 88:d4:73:61:e4:79:b1:2b:f6:d2:0d:dd:9a:f2:07:42: f4:23:b1:7f:6c:19:b8:77:00:d4:7f:fd:9c:da:44:22 Fingerprint (SHA-256): 53:E7:2A:6B:93:F6:29:C8:D4:A5:29:93:52:4A:71:FF:29:98:2B:DD:9D:97:A1:76:C8:26:98:DF:6C:DF:29:88 Fingerprint (SHA1): 9C:B9:E2:DD:9D:6B:17:D8:9F:FC:9A:BC:EE:15:30:3D:6D:F1:15:B9 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4792: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132660 (0x671f934) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 18:38:54 2016 Not After : Fri Jan 08 18:38:54 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:99:b0:b4:f4:aa:f1:b9:1f:32:68:56:d7:28:af:e9: 34:09:6b:0a:c2:bb:ab:86:b4:44:d8:cb:c5:47:3a:83: 78:e4:51:6a:60:3c:1d:81:45:2a:9f:4b:b9:16:fb:63: 7a:fc:a4:97:88:35:d3:d3:94:81:e7:17:92:04:80:05: 60:97:91:11:d4:28:ad:87:d7:39:38:b5:33:bb:cc:09: 53:80:cd:46:09:86:a2:4c:c1:29:77:cc:c5:80:ef:1f: 06:11:0b:8f:e2:11:c4:63:75:53:b7:cf:12:3e:e0:9d: a5:10:92:5c:44:c2:ca:f6:d4:69:bf:58:7d:da:a7:08: d8:0c:b7:c8:94:0c:32:7a:66:21:af:e2:75:10:67:fb: 4d:af:83:c1:b0:c5:5a:fa:2f:3e:76:0e:97:ac:ad:c3: 3c:2e:5f:ee:4b:be:de:f0:87:16:3e:3d:45:e5:09:a1: 7e:ff:e9:23:01:83:1b:c3:cd:93:48:d1:e3:b8:3a:fa: d4:87:9a:b3:6e:c7:55:ce:6a:c2:c2:fb:a3:2b:3b:fb: d2:d9:af:f5:fa:b8:2c:a4:c9:51:66:f1:c1:b7:b7:a1: 24:60:24:09:33:fb:ec:f0:25:2f:a3:95:b9:a5:ee:5f: 36:a6:fb:f5:36:26:9a:79:1e:ae:38:27:6e:02:ca:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:aa:61:18:e5:b7:d7:c6:2e:5a:c9:72:77:89:fb:9b: 44:59:56:b3:85:67:a2:3f:4e:44:91:32:b6:c7:c5:9b: 3b:6e:c0:88:8b:fc:4d:de:7e:86:03:71:58:35:6e:c6: cc:e2:74:d2:01:c3:64:3b:1f:aa:1e:d1:c1:e8:50:f8: 43:72:22:41:ff:fb:e9:70:d9:ba:1e:49:54:b2:e2:67: 3b:d0:73:16:e5:4c:b3:f7:2c:ef:63:0e:2f:e4:40:34: 00:2e:02:b5:35:b2:0f:47:8a:b0:ed:de:e4:30:c9:ee: e7:c7:4d:d3:a3:c3:c2:e8:67:b3:b0:38:fe:23:f2:4f: b0:9e:62:ed:73:3c:f2:fb:eb:4d:70:ca:51:d4:db:74: 2c:76:ac:40:4c:ef:f1:53:6f:36:17:d6:50:e5:c8:6f: 3a:0e:b6:0d:b9:9e:d3:b0:77:64:56:20:01:35:e4:0f: 30:f1:bb:e3:5f:66:a7:8d:7c:42:fc:f1:54:c4:2b:3c: 66:11:49:e3:fa:c0:b8:09:df:3a:bb:09:52:c0:5f:5d: 5a:13:3c:ff:1f:9b:e6:77:2f:43:2f:12:47:b4:2d:d4: 88:d4:73:61:e4:79:b1:2b:f6:d2:0d:dd:9a:f2:07:42: f4:23:b1:7f:6c:19:b8:77:00:d4:7f:fd:9c:da:44:22 Fingerprint (SHA-256): 53:E7:2A:6B:93:F6:29:C8:D4:A5:29:93:52:4A:71:FF:29:98:2B:DD:9D:97:A1:76:C8:26:98:DF:6C:DF:29:88 Fingerprint (SHA1): 9C:B9:E2:DD:9D:6B:17:D8:9F:FC:9A:BC:EE:15:30:3D:6D:F1:15:B9 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4793: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4794: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132660 (0x671f934) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 18:38:54 2016 Not After : Fri Jan 08 18:38:54 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:99:b0:b4:f4:aa:f1:b9:1f:32:68:56:d7:28:af:e9: 34:09:6b:0a:c2:bb:ab:86:b4:44:d8:cb:c5:47:3a:83: 78:e4:51:6a:60:3c:1d:81:45:2a:9f:4b:b9:16:fb:63: 7a:fc:a4:97:88:35:d3:d3:94:81:e7:17:92:04:80:05: 60:97:91:11:d4:28:ad:87:d7:39:38:b5:33:bb:cc:09: 53:80:cd:46:09:86:a2:4c:c1:29:77:cc:c5:80:ef:1f: 06:11:0b:8f:e2:11:c4:63:75:53:b7:cf:12:3e:e0:9d: a5:10:92:5c:44:c2:ca:f6:d4:69:bf:58:7d:da:a7:08: d8:0c:b7:c8:94:0c:32:7a:66:21:af:e2:75:10:67:fb: 4d:af:83:c1:b0:c5:5a:fa:2f:3e:76:0e:97:ac:ad:c3: 3c:2e:5f:ee:4b:be:de:f0:87:16:3e:3d:45:e5:09:a1: 7e:ff:e9:23:01:83:1b:c3:cd:93:48:d1:e3:b8:3a:fa: d4:87:9a:b3:6e:c7:55:ce:6a:c2:c2:fb:a3:2b:3b:fb: d2:d9:af:f5:fa:b8:2c:a4:c9:51:66:f1:c1:b7:b7:a1: 24:60:24:09:33:fb:ec:f0:25:2f:a3:95:b9:a5:ee:5f: 36:a6:fb:f5:36:26:9a:79:1e:ae:38:27:6e:02:ca:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:aa:61:18:e5:b7:d7:c6:2e:5a:c9:72:77:89:fb:9b: 44:59:56:b3:85:67:a2:3f:4e:44:91:32:b6:c7:c5:9b: 3b:6e:c0:88:8b:fc:4d:de:7e:86:03:71:58:35:6e:c6: cc:e2:74:d2:01:c3:64:3b:1f:aa:1e:d1:c1:e8:50:f8: 43:72:22:41:ff:fb:e9:70:d9:ba:1e:49:54:b2:e2:67: 3b:d0:73:16:e5:4c:b3:f7:2c:ef:63:0e:2f:e4:40:34: 00:2e:02:b5:35:b2:0f:47:8a:b0:ed:de:e4:30:c9:ee: e7:c7:4d:d3:a3:c3:c2:e8:67:b3:b0:38:fe:23:f2:4f: b0:9e:62:ed:73:3c:f2:fb:eb:4d:70:ca:51:d4:db:74: 2c:76:ac:40:4c:ef:f1:53:6f:36:17:d6:50:e5:c8:6f: 3a:0e:b6:0d:b9:9e:d3:b0:77:64:56:20:01:35:e4:0f: 30:f1:bb:e3:5f:66:a7:8d:7c:42:fc:f1:54:c4:2b:3c: 66:11:49:e3:fa:c0:b8:09:df:3a:bb:09:52:c0:5f:5d: 5a:13:3c:ff:1f:9b:e6:77:2f:43:2f:12:47:b4:2d:d4: 88:d4:73:61:e4:79:b1:2b:f6:d2:0d:dd:9a:f2:07:42: f4:23:b1:7f:6c:19:b8:77:00:d4:7f:fd:9c:da:44:22 Fingerprint (SHA-256): 53:E7:2A:6B:93:F6:29:C8:D4:A5:29:93:52:4A:71:FF:29:98:2B:DD:9D:97:A1:76:C8:26:98:DF:6C:DF:29:88 Fingerprint (SHA1): 9C:B9:E2:DD:9D:6B:17:D8:9F:FC:9A:BC:EE:15:30:3D:6D:F1:15:B9 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4795: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4796: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4797: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4798: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132660 (0x671f934) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 18:38:54 2016 Not After : Fri Jan 08 18:38:54 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:99:b0:b4:f4:aa:f1:b9:1f:32:68:56:d7:28:af:e9: 34:09:6b:0a:c2:bb:ab:86:b4:44:d8:cb:c5:47:3a:83: 78:e4:51:6a:60:3c:1d:81:45:2a:9f:4b:b9:16:fb:63: 7a:fc:a4:97:88:35:d3:d3:94:81:e7:17:92:04:80:05: 60:97:91:11:d4:28:ad:87:d7:39:38:b5:33:bb:cc:09: 53:80:cd:46:09:86:a2:4c:c1:29:77:cc:c5:80:ef:1f: 06:11:0b:8f:e2:11:c4:63:75:53:b7:cf:12:3e:e0:9d: a5:10:92:5c:44:c2:ca:f6:d4:69:bf:58:7d:da:a7:08: d8:0c:b7:c8:94:0c:32:7a:66:21:af:e2:75:10:67:fb: 4d:af:83:c1:b0:c5:5a:fa:2f:3e:76:0e:97:ac:ad:c3: 3c:2e:5f:ee:4b:be:de:f0:87:16:3e:3d:45:e5:09:a1: 7e:ff:e9:23:01:83:1b:c3:cd:93:48:d1:e3:b8:3a:fa: d4:87:9a:b3:6e:c7:55:ce:6a:c2:c2:fb:a3:2b:3b:fb: d2:d9:af:f5:fa:b8:2c:a4:c9:51:66:f1:c1:b7:b7:a1: 24:60:24:09:33:fb:ec:f0:25:2f:a3:95:b9:a5:ee:5f: 36:a6:fb:f5:36:26:9a:79:1e:ae:38:27:6e:02:ca:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:aa:61:18:e5:b7:d7:c6:2e:5a:c9:72:77:89:fb:9b: 44:59:56:b3:85:67:a2:3f:4e:44:91:32:b6:c7:c5:9b: 3b:6e:c0:88:8b:fc:4d:de:7e:86:03:71:58:35:6e:c6: cc:e2:74:d2:01:c3:64:3b:1f:aa:1e:d1:c1:e8:50:f8: 43:72:22:41:ff:fb:e9:70:d9:ba:1e:49:54:b2:e2:67: 3b:d0:73:16:e5:4c:b3:f7:2c:ef:63:0e:2f:e4:40:34: 00:2e:02:b5:35:b2:0f:47:8a:b0:ed:de:e4:30:c9:ee: e7:c7:4d:d3:a3:c3:c2:e8:67:b3:b0:38:fe:23:f2:4f: b0:9e:62:ed:73:3c:f2:fb:eb:4d:70:ca:51:d4:db:74: 2c:76:ac:40:4c:ef:f1:53:6f:36:17:d6:50:e5:c8:6f: 3a:0e:b6:0d:b9:9e:d3:b0:77:64:56:20:01:35:e4:0f: 30:f1:bb:e3:5f:66:a7:8d:7c:42:fc:f1:54:c4:2b:3c: 66:11:49:e3:fa:c0:b8:09:df:3a:bb:09:52:c0:5f:5d: 5a:13:3c:ff:1f:9b:e6:77:2f:43:2f:12:47:b4:2d:d4: 88:d4:73:61:e4:79:b1:2b:f6:d2:0d:dd:9a:f2:07:42: f4:23:b1:7f:6c:19:b8:77:00:d4:7f:fd:9c:da:44:22 Fingerprint (SHA-256): 53:E7:2A:6B:93:F6:29:C8:D4:A5:29:93:52:4A:71:FF:29:98:2B:DD:9D:97:A1:76:C8:26:98:DF:6C:DF:29:88 Fingerprint (SHA1): 9C:B9:E2:DD:9D:6B:17:D8:9F:FC:9A:BC:EE:15:30:3D:6D:F1:15:B9 Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4799: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132660 (0x671f934) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 18:38:54 2016 Not After : Fri Jan 08 18:38:54 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:99:b0:b4:f4:aa:f1:b9:1f:32:68:56:d7:28:af:e9: 34:09:6b:0a:c2:bb:ab:86:b4:44:d8:cb:c5:47:3a:83: 78:e4:51:6a:60:3c:1d:81:45:2a:9f:4b:b9:16:fb:63: 7a:fc:a4:97:88:35:d3:d3:94:81:e7:17:92:04:80:05: 60:97:91:11:d4:28:ad:87:d7:39:38:b5:33:bb:cc:09: 53:80:cd:46:09:86:a2:4c:c1:29:77:cc:c5:80:ef:1f: 06:11:0b:8f:e2:11:c4:63:75:53:b7:cf:12:3e:e0:9d: a5:10:92:5c:44:c2:ca:f6:d4:69:bf:58:7d:da:a7:08: d8:0c:b7:c8:94:0c:32:7a:66:21:af:e2:75:10:67:fb: 4d:af:83:c1:b0:c5:5a:fa:2f:3e:76:0e:97:ac:ad:c3: 3c:2e:5f:ee:4b:be:de:f0:87:16:3e:3d:45:e5:09:a1: 7e:ff:e9:23:01:83:1b:c3:cd:93:48:d1:e3:b8:3a:fa: d4:87:9a:b3:6e:c7:55:ce:6a:c2:c2:fb:a3:2b:3b:fb: d2:d9:af:f5:fa:b8:2c:a4:c9:51:66:f1:c1:b7:b7:a1: 24:60:24:09:33:fb:ec:f0:25:2f:a3:95:b9:a5:ee:5f: 36:a6:fb:f5:36:26:9a:79:1e:ae:38:27:6e:02:ca:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:aa:61:18:e5:b7:d7:c6:2e:5a:c9:72:77:89:fb:9b: 44:59:56:b3:85:67:a2:3f:4e:44:91:32:b6:c7:c5:9b: 3b:6e:c0:88:8b:fc:4d:de:7e:86:03:71:58:35:6e:c6: cc:e2:74:d2:01:c3:64:3b:1f:aa:1e:d1:c1:e8:50:f8: 43:72:22:41:ff:fb:e9:70:d9:ba:1e:49:54:b2:e2:67: 3b:d0:73:16:e5:4c:b3:f7:2c:ef:63:0e:2f:e4:40:34: 00:2e:02:b5:35:b2:0f:47:8a:b0:ed:de:e4:30:c9:ee: e7:c7:4d:d3:a3:c3:c2:e8:67:b3:b0:38:fe:23:f2:4f: b0:9e:62:ed:73:3c:f2:fb:eb:4d:70:ca:51:d4:db:74: 2c:76:ac:40:4c:ef:f1:53:6f:36:17:d6:50:e5:c8:6f: 3a:0e:b6:0d:b9:9e:d3:b0:77:64:56:20:01:35:e4:0f: 30:f1:bb:e3:5f:66:a7:8d:7c:42:fc:f1:54:c4:2b:3c: 66:11:49:e3:fa:c0:b8:09:df:3a:bb:09:52:c0:5f:5d: 5a:13:3c:ff:1f:9b:e6:77:2f:43:2f:12:47:b4:2d:d4: 88:d4:73:61:e4:79:b1:2b:f6:d2:0d:dd:9a:f2:07:42: f4:23:b1:7f:6c:19:b8:77:00:d4:7f:fd:9c:da:44:22 Fingerprint (SHA-256): 53:E7:2A:6B:93:F6:29:C8:D4:A5:29:93:52:4A:71:FF:29:98:2B:DD:9D:97:A1:76:C8:26:98:DF:6C:DF:29:88 Fingerprint (SHA1): 9C:B9:E2:DD:9D:6B:17:D8:9F:FC:9A:BC:EE:15:30:3D:6D:F1:15:B9 Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #4800: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132660 (0x671f934) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 18:38:54 2016 Not After : Fri Jan 08 18:38:54 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:99:b0:b4:f4:aa:f1:b9:1f:32:68:56:d7:28:af:e9: 34:09:6b:0a:c2:bb:ab:86:b4:44:d8:cb:c5:47:3a:83: 78:e4:51:6a:60:3c:1d:81:45:2a:9f:4b:b9:16:fb:63: 7a:fc:a4:97:88:35:d3:d3:94:81:e7:17:92:04:80:05: 60:97:91:11:d4:28:ad:87:d7:39:38:b5:33:bb:cc:09: 53:80:cd:46:09:86:a2:4c:c1:29:77:cc:c5:80:ef:1f: 06:11:0b:8f:e2:11:c4:63:75:53:b7:cf:12:3e:e0:9d: a5:10:92:5c:44:c2:ca:f6:d4:69:bf:58:7d:da:a7:08: d8:0c:b7:c8:94:0c:32:7a:66:21:af:e2:75:10:67:fb: 4d:af:83:c1:b0:c5:5a:fa:2f:3e:76:0e:97:ac:ad:c3: 3c:2e:5f:ee:4b:be:de:f0:87:16:3e:3d:45:e5:09:a1: 7e:ff:e9:23:01:83:1b:c3:cd:93:48:d1:e3:b8:3a:fa: d4:87:9a:b3:6e:c7:55:ce:6a:c2:c2:fb:a3:2b:3b:fb: d2:d9:af:f5:fa:b8:2c:a4:c9:51:66:f1:c1:b7:b7:a1: 24:60:24:09:33:fb:ec:f0:25:2f:a3:95:b9:a5:ee:5f: 36:a6:fb:f5:36:26:9a:79:1e:ae:38:27:6e:02:ca:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:aa:61:18:e5:b7:d7:c6:2e:5a:c9:72:77:89:fb:9b: 44:59:56:b3:85:67:a2:3f:4e:44:91:32:b6:c7:c5:9b: 3b:6e:c0:88:8b:fc:4d:de:7e:86:03:71:58:35:6e:c6: cc:e2:74:d2:01:c3:64:3b:1f:aa:1e:d1:c1:e8:50:f8: 43:72:22:41:ff:fb:e9:70:d9:ba:1e:49:54:b2:e2:67: 3b:d0:73:16:e5:4c:b3:f7:2c:ef:63:0e:2f:e4:40:34: 00:2e:02:b5:35:b2:0f:47:8a:b0:ed:de:e4:30:c9:ee: e7:c7:4d:d3:a3:c3:c2:e8:67:b3:b0:38:fe:23:f2:4f: b0:9e:62:ed:73:3c:f2:fb:eb:4d:70:ca:51:d4:db:74: 2c:76:ac:40:4c:ef:f1:53:6f:36:17:d6:50:e5:c8:6f: 3a:0e:b6:0d:b9:9e:d3:b0:77:64:56:20:01:35:e4:0f: 30:f1:bb:e3:5f:66:a7:8d:7c:42:fc:f1:54:c4:2b:3c: 66:11:49:e3:fa:c0:b8:09:df:3a:bb:09:52:c0:5f:5d: 5a:13:3c:ff:1f:9b:e6:77:2f:43:2f:12:47:b4:2d:d4: 88:d4:73:61:e4:79:b1:2b:f6:d2:0d:dd:9a:f2:07:42: f4:23:b1:7f:6c:19:b8:77:00:d4:7f:fd:9c:da:44:22 Fingerprint (SHA-256): 53:E7:2A:6B:93:F6:29:C8:D4:A5:29:93:52:4A:71:FF:29:98:2B:DD:9D:97:A1:76:C8:26:98:DF:6C:DF:29:88 Fingerprint (SHA1): 9C:B9:E2:DD:9D:6B:17:D8:9F:FC:9A:BC:EE:15:30:3D:6D:F1:15:B9 Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #4801: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132660 (0x671f934) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 18:38:54 2016 Not After : Fri Jan 08 18:38:54 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:99:b0:b4:f4:aa:f1:b9:1f:32:68:56:d7:28:af:e9: 34:09:6b:0a:c2:bb:ab:86:b4:44:d8:cb:c5:47:3a:83: 78:e4:51:6a:60:3c:1d:81:45:2a:9f:4b:b9:16:fb:63: 7a:fc:a4:97:88:35:d3:d3:94:81:e7:17:92:04:80:05: 60:97:91:11:d4:28:ad:87:d7:39:38:b5:33:bb:cc:09: 53:80:cd:46:09:86:a2:4c:c1:29:77:cc:c5:80:ef:1f: 06:11:0b:8f:e2:11:c4:63:75:53:b7:cf:12:3e:e0:9d: a5:10:92:5c:44:c2:ca:f6:d4:69:bf:58:7d:da:a7:08: d8:0c:b7:c8:94:0c:32:7a:66:21:af:e2:75:10:67:fb: 4d:af:83:c1:b0:c5:5a:fa:2f:3e:76:0e:97:ac:ad:c3: 3c:2e:5f:ee:4b:be:de:f0:87:16:3e:3d:45:e5:09:a1: 7e:ff:e9:23:01:83:1b:c3:cd:93:48:d1:e3:b8:3a:fa: d4:87:9a:b3:6e:c7:55:ce:6a:c2:c2:fb:a3:2b:3b:fb: d2:d9:af:f5:fa:b8:2c:a4:c9:51:66:f1:c1:b7:b7:a1: 24:60:24:09:33:fb:ec:f0:25:2f:a3:95:b9:a5:ee:5f: 36:a6:fb:f5:36:26:9a:79:1e:ae:38:27:6e:02:ca:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:aa:61:18:e5:b7:d7:c6:2e:5a:c9:72:77:89:fb:9b: 44:59:56:b3:85:67:a2:3f:4e:44:91:32:b6:c7:c5:9b: 3b:6e:c0:88:8b:fc:4d:de:7e:86:03:71:58:35:6e:c6: cc:e2:74:d2:01:c3:64:3b:1f:aa:1e:d1:c1:e8:50:f8: 43:72:22:41:ff:fb:e9:70:d9:ba:1e:49:54:b2:e2:67: 3b:d0:73:16:e5:4c:b3:f7:2c:ef:63:0e:2f:e4:40:34: 00:2e:02:b5:35:b2:0f:47:8a:b0:ed:de:e4:30:c9:ee: e7:c7:4d:d3:a3:c3:c2:e8:67:b3:b0:38:fe:23:f2:4f: b0:9e:62:ed:73:3c:f2:fb:eb:4d:70:ca:51:d4:db:74: 2c:76:ac:40:4c:ef:f1:53:6f:36:17:d6:50:e5:c8:6f: 3a:0e:b6:0d:b9:9e:d3:b0:77:64:56:20:01:35:e4:0f: 30:f1:bb:e3:5f:66:a7:8d:7c:42:fc:f1:54:c4:2b:3c: 66:11:49:e3:fa:c0:b8:09:df:3a:bb:09:52:c0:5f:5d: 5a:13:3c:ff:1f:9b:e6:77:2f:43:2f:12:47:b4:2d:d4: 88:d4:73:61:e4:79:b1:2b:f6:d2:0d:dd:9a:f2:07:42: f4:23:b1:7f:6c:19:b8:77:00:d4:7f:fd:9c:da:44:22 Fingerprint (SHA-256): 53:E7:2A:6B:93:F6:29:C8:D4:A5:29:93:52:4A:71:FF:29:98:2B:DD:9D:97:A1:76:C8:26:98:DF:6C:DF:29:88 Fingerprint (SHA1): 9C:B9:E2:DD:9D:6B:17:D8:9F:FC:9A:BC:EE:15:30:3D:6D:F1:15:B9 Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #4802: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132660 (0x671f934) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 18:38:54 2016 Not After : Fri Jan 08 18:38:54 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:99:b0:b4:f4:aa:f1:b9:1f:32:68:56:d7:28:af:e9: 34:09:6b:0a:c2:bb:ab:86:b4:44:d8:cb:c5:47:3a:83: 78:e4:51:6a:60:3c:1d:81:45:2a:9f:4b:b9:16:fb:63: 7a:fc:a4:97:88:35:d3:d3:94:81:e7:17:92:04:80:05: 60:97:91:11:d4:28:ad:87:d7:39:38:b5:33:bb:cc:09: 53:80:cd:46:09:86:a2:4c:c1:29:77:cc:c5:80:ef:1f: 06:11:0b:8f:e2:11:c4:63:75:53:b7:cf:12:3e:e0:9d: a5:10:92:5c:44:c2:ca:f6:d4:69:bf:58:7d:da:a7:08: d8:0c:b7:c8:94:0c:32:7a:66:21:af:e2:75:10:67:fb: 4d:af:83:c1:b0:c5:5a:fa:2f:3e:76:0e:97:ac:ad:c3: 3c:2e:5f:ee:4b:be:de:f0:87:16:3e:3d:45:e5:09:a1: 7e:ff:e9:23:01:83:1b:c3:cd:93:48:d1:e3:b8:3a:fa: d4:87:9a:b3:6e:c7:55:ce:6a:c2:c2:fb:a3:2b:3b:fb: d2:d9:af:f5:fa:b8:2c:a4:c9:51:66:f1:c1:b7:b7:a1: 24:60:24:09:33:fb:ec:f0:25:2f:a3:95:b9:a5:ee:5f: 36:a6:fb:f5:36:26:9a:79:1e:ae:38:27:6e:02:ca:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:aa:61:18:e5:b7:d7:c6:2e:5a:c9:72:77:89:fb:9b: 44:59:56:b3:85:67:a2:3f:4e:44:91:32:b6:c7:c5:9b: 3b:6e:c0:88:8b:fc:4d:de:7e:86:03:71:58:35:6e:c6: cc:e2:74:d2:01:c3:64:3b:1f:aa:1e:d1:c1:e8:50:f8: 43:72:22:41:ff:fb:e9:70:d9:ba:1e:49:54:b2:e2:67: 3b:d0:73:16:e5:4c:b3:f7:2c:ef:63:0e:2f:e4:40:34: 00:2e:02:b5:35:b2:0f:47:8a:b0:ed:de:e4:30:c9:ee: e7:c7:4d:d3:a3:c3:c2:e8:67:b3:b0:38:fe:23:f2:4f: b0:9e:62:ed:73:3c:f2:fb:eb:4d:70:ca:51:d4:db:74: 2c:76:ac:40:4c:ef:f1:53:6f:36:17:d6:50:e5:c8:6f: 3a:0e:b6:0d:b9:9e:d3:b0:77:64:56:20:01:35:e4:0f: 30:f1:bb:e3:5f:66:a7:8d:7c:42:fc:f1:54:c4:2b:3c: 66:11:49:e3:fa:c0:b8:09:df:3a:bb:09:52:c0:5f:5d: 5a:13:3c:ff:1f:9b:e6:77:2f:43:2f:12:47:b4:2d:d4: 88:d4:73:61:e4:79:b1:2b:f6:d2:0d:dd:9a:f2:07:42: f4:23:b1:7f:6c:19:b8:77:00:d4:7f:fd:9c:da:44:22 Fingerprint (SHA-256): 53:E7:2A:6B:93:F6:29:C8:D4:A5:29:93:52:4A:71:FF:29:98:2B:DD:9D:97:A1:76:C8:26:98:DF:6C:DF:29:88 Fingerprint (SHA1): 9C:B9:E2:DD:9D:6B:17:D8:9F:FC:9A:BC:EE:15:30:3D:6D:F1:15:B9 Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #4803: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132660 (0x671f934) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 18:38:54 2016 Not After : Fri Jan 08 18:38:54 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:99:b0:b4:f4:aa:f1:b9:1f:32:68:56:d7:28:af:e9: 34:09:6b:0a:c2:bb:ab:86:b4:44:d8:cb:c5:47:3a:83: 78:e4:51:6a:60:3c:1d:81:45:2a:9f:4b:b9:16:fb:63: 7a:fc:a4:97:88:35:d3:d3:94:81:e7:17:92:04:80:05: 60:97:91:11:d4:28:ad:87:d7:39:38:b5:33:bb:cc:09: 53:80:cd:46:09:86:a2:4c:c1:29:77:cc:c5:80:ef:1f: 06:11:0b:8f:e2:11:c4:63:75:53:b7:cf:12:3e:e0:9d: a5:10:92:5c:44:c2:ca:f6:d4:69:bf:58:7d:da:a7:08: d8:0c:b7:c8:94:0c:32:7a:66:21:af:e2:75:10:67:fb: 4d:af:83:c1:b0:c5:5a:fa:2f:3e:76:0e:97:ac:ad:c3: 3c:2e:5f:ee:4b:be:de:f0:87:16:3e:3d:45:e5:09:a1: 7e:ff:e9:23:01:83:1b:c3:cd:93:48:d1:e3:b8:3a:fa: d4:87:9a:b3:6e:c7:55:ce:6a:c2:c2:fb:a3:2b:3b:fb: d2:d9:af:f5:fa:b8:2c:a4:c9:51:66:f1:c1:b7:b7:a1: 24:60:24:09:33:fb:ec:f0:25:2f:a3:95:b9:a5:ee:5f: 36:a6:fb:f5:36:26:9a:79:1e:ae:38:27:6e:02:ca:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:aa:61:18:e5:b7:d7:c6:2e:5a:c9:72:77:89:fb:9b: 44:59:56:b3:85:67:a2:3f:4e:44:91:32:b6:c7:c5:9b: 3b:6e:c0:88:8b:fc:4d:de:7e:86:03:71:58:35:6e:c6: cc:e2:74:d2:01:c3:64:3b:1f:aa:1e:d1:c1:e8:50:f8: 43:72:22:41:ff:fb:e9:70:d9:ba:1e:49:54:b2:e2:67: 3b:d0:73:16:e5:4c:b3:f7:2c:ef:63:0e:2f:e4:40:34: 00:2e:02:b5:35:b2:0f:47:8a:b0:ed:de:e4:30:c9:ee: e7:c7:4d:d3:a3:c3:c2:e8:67:b3:b0:38:fe:23:f2:4f: b0:9e:62:ed:73:3c:f2:fb:eb:4d:70:ca:51:d4:db:74: 2c:76:ac:40:4c:ef:f1:53:6f:36:17:d6:50:e5:c8:6f: 3a:0e:b6:0d:b9:9e:d3:b0:77:64:56:20:01:35:e4:0f: 30:f1:bb:e3:5f:66:a7:8d:7c:42:fc:f1:54:c4:2b:3c: 66:11:49:e3:fa:c0:b8:09:df:3a:bb:09:52:c0:5f:5d: 5a:13:3c:ff:1f:9b:e6:77:2f:43:2f:12:47:b4:2d:d4: 88:d4:73:61:e4:79:b1:2b:f6:d2:0d:dd:9a:f2:07:42: f4:23:b1:7f:6c:19:b8:77:00:d4:7f:fd:9c:da:44:22 Fingerprint (SHA-256): 53:E7:2A:6B:93:F6:29:C8:D4:A5:29:93:52:4A:71:FF:29:98:2B:DD:9D:97:A1:76:C8:26:98:DF:6C:DF:29:88 Fingerprint (SHA1): 9C:B9:E2:DD:9D:6B:17:D8:9F:FC:9A:BC:EE:15:30:3D:6D:F1:15:B9 Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #4804: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4805: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4806: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132690 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4807: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4808: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #4809: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4810: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 108132691 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4811: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4812: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #4813: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4814: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 108132692 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4815: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4816: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #4817: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4818: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 108132693 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4819: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4820: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #4821: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4822: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 108132694 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4823: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4824: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #4825: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4826: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 108132695 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4827: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4828: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #4829: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4830: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 108132696 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4831: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4832: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4833: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132690 (0x671f952) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 18:45:33 2016 Not After : Fri Jan 08 18:45:33 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:71:67:1d:2c:7e:aa:cf:d7:86:44:54:e5:7d:ca:b8: 4d:f5:ba:a0:52:37:dd:d8:d2:88:cf:8d:01:ce:aa:aa: 39:b3:93:56:f1:bc:0c:82:50:e8:2a:3c:b1:06:c9:bc: da:da:6a:dc:e4:44:4d:8f:c7:03:b3:bc:52:40:77:27: 58:85:20:0d:5f:10:25:52:c9:43:52:61:37:27:59:7d: 12:0f:2b:da:a4:80:eb:1c:a1:2d:7b:ce:a8:0b:ff:49: db:0f:25:fb:26:c6:db:7e:87:4e:64:8c:1a:30:44:7a: 6c:2a:6f:b6:29:f8:c8:c4:ad:98:bc:58:86:1e:b3:44: 5b:f6:b9:53:23:04:f0:e8:43:7b:ae:9c:e6:c4:96:b9: 30:92:fb:5a:4a:01:20:7b:91:55:3b:47:8b:cd:bb:96: 48:4a:48:af:1c:74:ff:9a:89:dd:30:00:79:ff:7b:2d: a7:fe:92:bb:ee:58:e3:0f:17:96:11:90:1e:73:41:8b: 2e:60:a2:75:9d:51:2f:68:18:25:42:48:01:9f:90:e1: 64:b7:81:a5:9c:a2:46:ea:ce:71:e1:4d:ec:39:b3:57: 6d:5e:cb:c0:07:af:b8:01:28:e3:6e:6d:98:a7:22:bb: 34:6c:24:d6:05:4f:ac:e2:99:3d:54:7d:bc:71:aa:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 63:1a:ec:1b:69:a4:e6:46:65:00:8e:b4:79:10:9b:35: 3c:e9:fe:24:89:4a:9a:7e:23:17:68:62:eb:97:47:32: 1a:1b:47:42:80:b8:02:af:29:17:0f:7a:73:5b:d0:f8: 55:5d:12:90:0d:fb:12:a1:8d:8f:b6:42:b2:87:f0:13: 4d:2e:b8:a9:b1:95:00:02:bc:55:d6:78:b2:04:88:63: 46:a4:7f:d9:d7:ad:43:18:a7:88:86:75:bb:8e:d6:0f: 1f:8e:e2:17:a3:18:86:4c:3d:fa:54:71:3b:48:54:e3: 26:6d:bf:54:e6:8c:9d:db:9f:18:da:b8:1f:c1:ab:21: f7:f3:05:e2:e7:98:1d:c7:83:cc:89:70:c5:3a:e5:9c: 4d:66:1b:79:19:27:34:91:7b:f0:4a:63:34:64:02:f2: 36:e2:42:34:89:b1:04:c9:75:07:98:f1:94:57:32:d9: 3a:df:3e:5f:cf:1a:d2:b8:41:ae:1b:b2:25:5c:f4:37: 1b:26:6e:e4:f2:50:15:27:92:01:5e:e7:03:b9:49:91: 55:de:e6:50:c5:a9:d8:0f:9d:8b:de:c4:87:94:f9:02: b5:af:e2:c2:23:53:90:71:b0:d4:ba:3c:e2:aa:c0:d9: 75:3d:d9:09:fd:ec:6b:9f:23:06:04:f4:9e:36:ae:d9 Fingerprint (SHA-256): BE:95:91:53:0F:B3:E3:75:83:D6:CF:27:73:C7:AC:79:18:5E:F8:76:E5:32:9D:6C:17:42:72:9E:74:D1:8B:8B Fingerprint (SHA1): AE:42:38:7C:6B:3F:48:CE:97:06:68:E7:56:2B:B7:86:25:3C:E1:6B Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #4834: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4835: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4836: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #4837: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132690 (0x671f952) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 18:45:33 2016 Not After : Fri Jan 08 18:45:33 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:71:67:1d:2c:7e:aa:cf:d7:86:44:54:e5:7d:ca:b8: 4d:f5:ba:a0:52:37:dd:d8:d2:88:cf:8d:01:ce:aa:aa: 39:b3:93:56:f1:bc:0c:82:50:e8:2a:3c:b1:06:c9:bc: da:da:6a:dc:e4:44:4d:8f:c7:03:b3:bc:52:40:77:27: 58:85:20:0d:5f:10:25:52:c9:43:52:61:37:27:59:7d: 12:0f:2b:da:a4:80:eb:1c:a1:2d:7b:ce:a8:0b:ff:49: db:0f:25:fb:26:c6:db:7e:87:4e:64:8c:1a:30:44:7a: 6c:2a:6f:b6:29:f8:c8:c4:ad:98:bc:58:86:1e:b3:44: 5b:f6:b9:53:23:04:f0:e8:43:7b:ae:9c:e6:c4:96:b9: 30:92:fb:5a:4a:01:20:7b:91:55:3b:47:8b:cd:bb:96: 48:4a:48:af:1c:74:ff:9a:89:dd:30:00:79:ff:7b:2d: a7:fe:92:bb:ee:58:e3:0f:17:96:11:90:1e:73:41:8b: 2e:60:a2:75:9d:51:2f:68:18:25:42:48:01:9f:90:e1: 64:b7:81:a5:9c:a2:46:ea:ce:71:e1:4d:ec:39:b3:57: 6d:5e:cb:c0:07:af:b8:01:28:e3:6e:6d:98:a7:22:bb: 34:6c:24:d6:05:4f:ac:e2:99:3d:54:7d:bc:71:aa:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 63:1a:ec:1b:69:a4:e6:46:65:00:8e:b4:79:10:9b:35: 3c:e9:fe:24:89:4a:9a:7e:23:17:68:62:eb:97:47:32: 1a:1b:47:42:80:b8:02:af:29:17:0f:7a:73:5b:d0:f8: 55:5d:12:90:0d:fb:12:a1:8d:8f:b6:42:b2:87:f0:13: 4d:2e:b8:a9:b1:95:00:02:bc:55:d6:78:b2:04:88:63: 46:a4:7f:d9:d7:ad:43:18:a7:88:86:75:bb:8e:d6:0f: 1f:8e:e2:17:a3:18:86:4c:3d:fa:54:71:3b:48:54:e3: 26:6d:bf:54:e6:8c:9d:db:9f:18:da:b8:1f:c1:ab:21: f7:f3:05:e2:e7:98:1d:c7:83:cc:89:70:c5:3a:e5:9c: 4d:66:1b:79:19:27:34:91:7b:f0:4a:63:34:64:02:f2: 36:e2:42:34:89:b1:04:c9:75:07:98:f1:94:57:32:d9: 3a:df:3e:5f:cf:1a:d2:b8:41:ae:1b:b2:25:5c:f4:37: 1b:26:6e:e4:f2:50:15:27:92:01:5e:e7:03:b9:49:91: 55:de:e6:50:c5:a9:d8:0f:9d:8b:de:c4:87:94:f9:02: b5:af:e2:c2:23:53:90:71:b0:d4:ba:3c:e2:aa:c0:d9: 75:3d:d9:09:fd:ec:6b:9f:23:06:04:f4:9e:36:ae:d9 Fingerprint (SHA-256): BE:95:91:53:0F:B3:E3:75:83:D6:CF:27:73:C7:AC:79:18:5E:F8:76:E5:32:9D:6C:17:42:72:9E:74:D1:8B:8B Fingerprint (SHA1): AE:42:38:7C:6B:3F:48:CE:97:06:68:E7:56:2B:B7:86:25:3C:E1:6B Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #4838: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4839: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4840: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4841: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132697 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4842: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4843: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4844: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4845: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108132698 --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #4846: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4847: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4848: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4849: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108132699 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4850: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4851: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #4852: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4853: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108132700 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4854: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4855: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4856: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #4857: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #4858: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #4859: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132697 (0x671f959) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 18:47:17 2016 Not After : Fri Jan 08 18:47:17 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:78:ec:bb:cb:c2:a6:e9:8b:7a:e1:97:68:42:d7:7c: 0c:3e:6f:75:c7:b8:ca:20:ef:99:e8:58:6d:5b:75:e6: d0:27:0f:f2:68:72:c7:d4:ec:50:8f:cb:98:7e:1d:f5: 47:d2:e6:84:8d:d2:5e:c6:0b:c9:26:00:4d:07:4b:2f: 80:7d:52:44:cc:b5:5b:50:58:25:d9:a7:f0:c2:82:b2: ae:fe:72:a6:10:fe:a9:cb:af:0f:5e:53:9c:ee:89:b1: fc:c1:28:5e:42:99:09:ab:29:1b:be:39:73:8e:97:f4: 56:45:da:cd:a5:ce:59:4b:45:f5:f4:b3:0d:de:b5:29: 18:f0:92:86:4b:e9:35:ad:62:4d:4e:c1:88:77:6c:e0: a5:2c:bc:d3:58:ea:c7:e4:3b:38:32:80:f2:f5:c7:79: d1:30:2f:3d:66:b2:b9:b1:e3:d4:e3:d9:96:cd:02:71: 90:df:db:13:b0:45:1c:26:08:a7:e1:0e:19:dd:72:59: db:8c:66:1c:e5:27:0e:fe:f7:e8:86:ae:a0:74:26:f4: a4:29:83:15:35:21:1b:9c:99:17:4c:38:b8:dd:5d:cf: bf:ea:32:1e:2a:73:db:9c:1a:48:49:bf:7c:54:00:bc: 65:c8:e9:62:a6:f1:98:85:58:8e:a5:f7:2b:ce:1e:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:be:a2:49:8a:65:b8:a4:dc:35:b7:ba:0e:53:32:58: 9a:31:95:d7:f2:06:6b:4b:87:2d:58:78:af:20:73:12: f8:62:5b:88:83:77:a5:be:1f:2c:85:93:3e:7a:9f:08: 1b:ea:9b:f8:24:e9:2c:7d:55:52:83:75:95:ad:f8:24: 61:fb:64:5c:6d:c6:0a:6c:dd:ea:f1:aa:3a:db:ea:68: ea:9c:07:df:a1:55:6d:8e:ef:15:15:8d:a3:c5:62:0a: dd:45:9d:76:fa:23:d6:34:9a:de:5d:de:32:7f:3f:07: ae:0b:6b:7d:52:0f:35:2d:39:47:be:c4:2f:be:8c:54: 7c:6d:a8:4e:52:f6:76:61:bf:21:e8:8e:42:73:76:18: 23:22:e2:d4:c2:4f:80:b1:dc:e2:29:30:49:e3:cc:43: 92:d1:fc:98:b6:59:17:36:58:41:b9:32:53:70:fd:23: 47:6a:ff:05:f2:60:bb:25:ec:1e:c9:f6:88:a4:1d:98: 44:ff:af:22:7a:b7:f9:01:25:4a:dc:a3:43:85:23:06: a5:7c:a6:aa:07:8b:33:53:71:ff:78:45:95:59:15:45: 98:fe:16:9b:13:69:72:48:61:d1:53:40:91:09:40:e6: 13:7b:7b:0d:70:1c:dc:f1:d6:38:fa:07:3e:0e:6c:94 Fingerprint (SHA-256): 0B:D0:BC:9A:33:DD:EB:09:95:33:AB:4A:B8:DF:A5:0F:FB:69:97:0B:3C:FC:CB:2B:28:88:83:BB:D2:EE:5A:08 Fingerprint (SHA1): CD:7D:51:A0:9B:0F:11:C6:9A:05:EC:DC:20:F0:75:85:93:5A:7E:5C Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4860: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4861: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4862: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132698 (0x671f95a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 18:47:34 2016 Not After : Fri Jan 08 18:47:34 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:f3:c0:ff:e8:fc:f6:1d:a4:9c:52:44:fe:bb:5e:b5: 77:0b:69:8e:ce:74:25:74:f5:85:96:29:38:77:2e:f0: 98:cf:63:69:93:2d:3f:92:3f:00:6b:98:d9:c9:6e:aa: d0:8c:d8:94:18:e2:57:ba:d2:fc:55:6d:da:4a:05:fe: 8c:cf:5f:70:2f:5e:52:46:fc:18:72:a5:47:7b:e4:33: d2:f9:fc:20:da:7c:33:2b:c4:a7:64:2f:35:8f:2c:01: c9:67:f8:25:5a:58:bb:61:77:8d:c8:42:ff:71:83:6e: c8:e9:23:8d:4d:a7:09:a9:dc:a0:bf:10:52:22:3f:d5: db:ad:75:d3:b4:30:b7:70:44:c2:ea:5a:34:ec:3b:d8: 12:e1:c9:51:1e:e3:4d:95:48:fa:45:1d:ad:cf:95:10: 7b:66:3b:ae:54:14:ef:ca:90:26:43:20:9d:e1:df:f8: 8c:f6:31:7c:82:13:48:a4:e2:7e:78:1b:52:0f:cf:58: 9a:f8:cd:82:22:17:e2:dd:2f:c7:78:e9:41:30:0b:b3: 4c:f5:24:48:63:bd:ec:84:30:2b:db:d1:d1:3c:bc:d7: 28:58:2b:e0:cb:f2:1a:54:63:af:d4:ef:db:2c:9b:b0: d7:a1:8f:ee:8a:06:d2:25:92:ce:36:99:e1:79:55:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:18:29:c4:25:8b:5b:cc:45:e3:ad:93:3e:e0:4b:cb: a7:dd:f9:41:b5:ca:2b:df:58:a8:e2:10:f8:63:2f:9b: 0d:71:c4:7b:36:87:24:77:44:e4:df:8c:9a:5e:35:25: 99:c0:dd:06:6a:95:97:db:d3:cf:05:0a:3d:35:4c:b7: c4:c5:ba:76:48:0a:f5:ec:ca:8d:d6:ee:e5:ed:43:d4: 19:0c:bb:af:b6:a5:89:d6:b5:ac:dd:32:ec:06:c7:38: be:67:a6:a0:f2:65:8c:c7:43:31:c0:d2:95:f8:d5:97: 3c:1c:ab:8f:92:6f:31:22:31:44:ee:32:3c:10:c0:a5: bc:57:b9:83:e4:02:d0:be:7e:84:a5:41:e3:f2:14:1e: 7a:c7:5f:68:bf:dd:08:82:dd:43:7f:9e:b9:24:34:57: 1e:67:68:cd:a4:08:b3:45:0a:11:fc:3e:51:df:42:43: f8:0f:ee:7d:87:ca:82:83:39:c3:4e:7f:2a:20:f7:8a: fc:7e:40:2c:82:dd:cd:fc:a1:91:ba:ee:c7:e9:3f:00: e4:24:eb:c0:5f:23:7b:48:70:d9:5f:f6:05:f3:b5:54: a0:5e:a1:92:75:8e:a5:27:62:91:f7:f1:a3:10:bc:c9: 00:cf:df:58:c0:5f:ba:ac:b5:d2:18:4f:ce:7b:e2:d6 Fingerprint (SHA-256): 97:17:05:0B:A6:59:CF:B1:62:CA:67:94:D0:C2:5E:52:D0:B3:3A:BA:99:98:D9:F4:30:39:48:48:4E:ED:63:8E Fingerprint (SHA1): 64:3C:6E:FA:EB:EF:99:F3:E4:21:C0:BD:8C:7E:56:46:70:1D:C7:53 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4863: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4864: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132699 (0x671f95b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 18:47:43 2016 Not After : Fri Jan 08 18:47:43 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:ea:57:95:a9:4c:ec:90:de:a8:55:5d:c5:58:b5:19: 98:4c:06:e3:62:ab:bc:c9:23:0c:5d:ae:68:6f:5c:30: d8:11:3a:a1:c3:ff:91:e7:34:55:e8:b4:5e:d8:75:58: 18:f2:13:ee:fe:5f:2f:76:aa:8a:7b:49:b2:90:0c:69: 48:7c:b3:b0:bb:7d:7b:65:a0:12:79:81:1c:1f:57:9d: c8:28:2d:33:8f:32:7f:b0:d5:62:4e:aa:c4:69:6a:b4: f3:65:4c:7f:64:53:7f:2b:75:ad:39:d2:c6:25:84:97: e7:b5:92:b9:44:aa:50:1d:5d:e0:15:7a:f7:36:1d:f5: 08:30:92:98:03:00:b1:56:bc:b8:39:41:6f:c0:6d:a7: 74:c0:84:7b:4a:15:f5:c5:5f:fe:75:49:67:7e:48:5c: cc:74:27:3e:53:1c:94:19:63:17:ec:6f:84:32:c5:2c: 19:9f:da:b2:0a:07:79:56:38:26:43:f4:49:b3:76:ce: 8c:9d:e4:ef:0d:97:12:75:cc:4f:cb:a0:7f:93:5e:ac: 5c:48:61:5a:ca:cd:e3:9d:5d:7c:ec:f5:6d:66:38:e9: 18:67:53:d4:bf:b5:56:ad:e9:d9:d7:da:df:ff:82:d7: 7b:fe:f1:10:77:c4:62:3b:89:45:33:48:f8:cc:5b:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b7:0b:41:72:a2:38:a5:29:9b:d5:7c:f4:33:be:99:e5: 54:f4:d7:de:90:eb:d3:1d:50:d8:98:cb:32:02:38:55: 29:c7:09:3a:ba:e5:89:02:5a:80:27:c2:74:42:02:a6: c9:27:44:8c:36:04:b7:b3:38:f1:96:2f:a6:b8:f6:b8: 22:54:34:d8:6c:b0:2e:ff:5b:69:4c:ef:d4:d2:18:d4: d8:85:1b:89:cb:13:a3:3b:92:a4:d7:b1:57:d8:a0:dd: c7:d6:a3:7c:6d:35:10:d6:e8:a0:a1:c3:3a:58:3b:09: 67:3b:86:00:7e:63:d4:b8:4e:44:fd:4e:a3:ac:47:2c: 21:40:a3:49:50:ca:47:68:36:3b:bb:6f:df:1f:76:0d: a3:03:48:83:f7:32:66:b9:07:88:6a:d8:be:9a:36:f3: 2e:a6:63:01:9f:a0:ba:ca:1d:d3:13:a1:44:ec:d7:01: 77:4f:aa:3d:09:55:e4:00:c8:6e:ba:d8:ee:5f:8a:fb: f9:a8:a2:38:19:24:51:81:f3:9f:f4:4c:87:27:1f:6e: 4d:f7:c7:35:55:a5:d1:fd:79:31:0b:e5:b9:fc:aa:58: 5b:8f:a3:d2:89:53:7c:45:ee:55:1b:05:9f:6e:f4:20: 0f:c2:78:e3:83:f2:e2:9f:73:22:36:89:0a:c4:13:bf Fingerprint (SHA-256): D6:E5:41:8E:2D:A8:57:D8:F0:B8:B4:F6:04:52:3B:7E:E2:9D:04:3F:24:6B:28:58:87:28:62:D1:2C:FE:C4:F9 Fingerprint (SHA1): E9:CA:FF:83:54:86:51:84:E6:38:A9:F1:CC:39:22:ED:F7:DB:7D:4E Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #4865: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4866: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132701 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4867: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4868: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4869: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4870: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108132702 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4871: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4872: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4873: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4874: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108132703 --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #4875: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4876: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #4877: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4878: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 108132704 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4879: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4880: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #4881: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4882: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 108132705 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4883: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4884: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4885: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #4886: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #4887: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #4888: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #4889: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132701 (0x671f95d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 18:48:15 2016 Not After : Fri Jan 08 18:48:15 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:80:b2:83:d0:00:dd:ba:80:51:75:89:8e:6b:ee:3d: e0:81:fc:21:02:32:1b:3e:28:b9:8b:76:bf:f4:41:62: d9:2a:fd:22:37:8a:17:b4:fd:3a:a2:b9:ab:15:83:24: d3:36:15:0a:6e:90:68:96:81:a2:90:04:57:b3:6f:e6: 87:38:c8:f7:a3:dd:f0:7c:45:1e:2f:4a:9e:86:4d:a8: ac:f9:c1:2b:69:d9:71:43:a3:97:30:16:bd:af:1a:88: 5a:4d:51:3a:4f:30:bb:bc:e2:3e:09:27:05:51:f2:e0: ad:7e:ae:47:f4:55:3f:e7:54:b6:81:8e:cb:f0:2a:88: 3a:95:5a:5a:2b:c5:87:77:df:ec:63:a4:84:16:1c:ac: f7:1a:8a:f6:be:ae:dc:ac:20:59:e2:0d:3a:3f:37:2f: 1d:e6:e9:f0:95:34:cf:9c:ec:36:8b:e8:b5:c6:66:8d: b3:6d:63:7f:54:e4:1a:f5:e8:c2:17:d0:ba:3f:8f:9f: bb:dd:3b:85:29:a6:9e:f8:41:fa:5a:04:bf:a1:51:4f: 93:7e:b3:02:a0:b0:78:74:b8:fc:2b:f7:53:4d:57:81: 97:1d:73:0b:cf:b4:80:80:bc:c5:0b:97:67:d5:4e:f7: e0:24:c1:93:94:22:fd:e7:60:c3:78:eb:d2:b3:5c:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:a0:81:9b:05:81:1b:45:68:91:dd:74:a4:92:ba:9c: 35:98:3a:fa:69:7e:58:03:d1:63:a7:bb:27:ef:dd:18: e7:99:28:6b:13:d0:a6:7d:bd:60:b1:7b:5d:bd:6c:ef: 13:94:a9:f4:db:ba:0a:eb:2c:71:51:78:7c:9d:9c:c5: d8:4e:b7:33:93:5b:c6:eb:d9:59:5c:16:06:13:6c:49: 66:4f:f4:7f:c6:3b:e0:10:a5:93:e2:17:3a:73:4b:99: 2f:dc:e8:90:56:2b:6f:3e:a9:7d:e9:5b:55:3f:5d:f2: ea:02:c6:ac:38:a8:fc:51:56:f6:3c:7e:ff:70:48:e2: 41:62:42:26:9d:cf:5c:76:94:ce:69:6d:ee:39:08:c3: de:94:19:20:cb:b1:f7:90:13:4d:a7:6e:77:a6:da:d3: c5:f0:7c:2c:0f:3d:20:63:6e:c0:6b:1b:a1:12:3f:92: 03:d9:1e:bb:56:4e:e8:6a:d4:12:b0:65:34:73:ad:4d: 97:47:49:3d:cf:f6:2c:fc:cb:c2:c9:ca:bd:51:66:06: 74:6f:f1:a0:b1:a2:c2:7a:8b:61:3a:68:23:63:e1:ad: 9e:91:51:14:27:a9:5c:3d:e4:f5:be:2e:8d:96:4b:33: 60:96:27:10:f3:24:40:6f:e3:b3:6f:7d:18:83:dc:cd Fingerprint (SHA-256): 84:AC:F1:7C:3B:3C:4F:06:F9:6F:C6:B3:2E:95:68:3B:B0:71:52:A1:28:40:3A:11:42:4C:27:94:21:B8:BB:B1 Fingerprint (SHA1): B0:BB:C2:EC:9A:9D:CF:DA:AB:D8:3A:DE:F6:0B:E2:76:EE:9C:57:DC Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4890: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4891: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132702 (0x671f95e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 18:48:23 2016 Not After : Fri Jan 08 18:48:23 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:7c:75:8e:af:e7:ba:8d:ff:0c:0b:36:db:1e:f1:e0: a2:0b:b2:44:e3:53:43:86:e9:81:8f:bc:1a:02:e0:ec: bb:f3:47:7f:c3:ce:fb:84:6f:fd:95:28:30:c2:65:0f: 84:6a:da:54:9f:52:18:36:a0:e2:29:48:fd:77:2c:de: 22:2c:1b:76:f8:4e:ae:c3:b6:f4:93:e5:04:b3:9e:0a: 04:2b:1e:4b:34:a9:93:8d:f9:38:10:95:aa:ab:b7:4e: b7:fb:4c:4e:fa:9c:1f:0d:5a:89:72:25:63:ad:87:d7: a3:b6:f0:36:1e:3c:aa:f1:c0:f0:53:1e:c5:21:8e:d9: d1:fd:ab:a1:ae:a4:ff:7c:4c:25:53:ca:f3:5d:77:06: ef:c5:0f:b5:7b:8a:f1:35:09:90:79:25:37:6a:04:ce: 0a:71:e6:54:03:2e:d3:92:20:75:bd:c9:f4:50:e9:b5: a9:c2:27:d8:b7:9c:b0:dc:e5:8e:20:77:e5:7b:e2:e9: 5f:2a:c9:f3:d0:02:ce:49:58:b9:a5:be:28:6b:7c:92: 25:cb:83:61:64:9e:69:14:bb:e1:a9:be:ea:7a:fc:b9: ba:79:ec:2d:cf:0d:e0:eb:ae:17:26:63:97:64:73:96: 1b:d8:2f:90:29:d9:ae:57:12:df:8e:74:d3:99:4a:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3c:94:40:55:74:69:9c:4f:d3:5c:37:c7:25:3b:1c:6b: 29:71:7e:a8:0c:8e:70:7b:4d:8a:95:43:65:83:f1:80: 36:9f:7a:28:62:a6:c4:ef:35:68:c9:5e:de:26:ef:64: fb:c2:8d:cf:f2:d6:ad:13:73:cd:b0:e6:79:61:27:e8: 53:b6:e6:e0:2e:c4:7b:bf:bb:6b:ba:88:09:35:4a:f7: a3:88:cb:74:43:1e:30:5f:8f:83:86:e1:d2:35:ff:69: a7:78:79:68:51:93:fb:18:af:3e:96:fe:db:d1:55:36: ea:d7:f2:cc:72:c8:0e:13:ce:d5:c3:ad:82:ab:a6:b8: cc:d7:54:02:39:b4:e5:06:89:d3:12:f3:b8:93:b6:f5: c0:c0:d4:3a:a4:47:72:45:52:12:ba:b3:6e:86:41:f5: 8a:7d:90:4d:4c:1e:78:0c:cb:38:fb:59:d4:a9:53:0f: 0d:eb:ab:1a:70:f0:9c:d4:13:8d:7d:bb:83:e1:6c:24: bf:89:c3:59:3e:e0:09:f6:76:1d:30:3f:35:df:d1:96: 8e:90:f1:f2:c8:a3:13:9a:7f:23:b0:f6:28:f8:59:be: 33:3a:82:ef:9b:3e:9e:15:ae:a9:d9:2b:8d:e3:3b:2f: 33:22:a0:45:67:1f:ee:86:11:68:b2:ea:9e:a0:97:e4 Fingerprint (SHA-256): 27:DE:7A:3E:85:25:50:E4:35:11:42:22:61:6B:39:6A:95:24:F9:F7:92:BA:02:17:6B:8B:99:ED:A0:CB:D2:F4 Fingerprint (SHA1): F4:A4:82:BA:86:F0:B7:45:E2:5B:36:62:DD:53:00:A2:9D:9E:27:B4 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4892: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4893: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4894: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132703 (0x671f95f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 18:48:36 2016 Not After : Fri Jan 08 18:48:36 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:df:bf:43:13:99:8e:92:51:0c:08:9f:af:9e:27:2f: 81:2d:b8:c5:78:59:a0:8b:1e:23:28:a7:e0:0f:78:81: 3a:dd:df:d4:b7:6f:61:fb:f7:25:af:d1:90:b0:98:42: ec:b6:4d:7d:f7:a0:13:2d:73:1e:85:7b:96:c8:75:a3: ef:b5:7d:62:92:27:d5:a1:05:33:ae:08:d8:26:fb:76: c3:a2:c9:bc:be:ee:5e:15:20:7c:13:c3:79:fd:e7:ce: ff:b3:a7:6f:06:71:1f:0e:2f:0c:18:49:b2:f7:6f:af: b0:a0:09:8e:e4:29:9c:ad:44:33:a3:51:0c:e8:3e:8b: f1:d0:af:d7:5c:46:9c:12:63:46:32:f8:b5:77:e9:9e: 8a:a1:c9:66:c1:29:39:9c:3d:92:95:c2:24:51:11:73: 88:2b:1d:9f:58:04:61:a2:c5:1e:1f:d6:32:2b:44:d6: 12:c8:c9:f1:e0:4d:f0:1e:4a:40:0a:74:37:ac:b3:89: 9f:c0:72:e3:5e:3a:b3:ce:61:a9:ea:14:43:f7:19:0f: ef:45:35:1c:3f:8c:11:c5:5e:3b:5f:b3:ac:68:b6:de: d6:76:a2:89:bb:8a:6a:db:58:4e:07:42:d5:30:7f:aa: 7e:1a:4e:ed:cf:a7:e9:0b:4a:42:7d:77:07:60:d7:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:bb:26:09:20:c9:40:b2:17:f1:61:a5:00:32:1f:11: 5e:fe:79:ad:28:49:01:3c:b8:02:55:5c:81:01:0c:3f: 99:66:d6:58:2a:fd:15:9b:af:56:f6:19:2b:82:f4:be: 67:9b:a3:a6:2f:55:ac:06:eb:9e:da:2b:f1:48:3f:ef: ae:a4:38:3b:cf:a5:09:72:d8:78:6c:13:75:33:40:e4: 06:52:a8:d0:09:39:78:34:1e:d6:47:3c:c2:7a:f5:d8: 04:7a:79:ad:9c:6d:57:83:14:52:fa:08:ca:7b:62:ca: 3c:3c:e3:75:b6:14:64:2b:45:ab:4d:b5:07:0e:26:34: b8:43:bf:20:b6:c8:25:9e:d6:ad:b3:2a:55:fc:90:17: a4:2a:cd:7e:b1:6d:ec:40:e1:29:fd:e0:db:40:7a:2e: cc:d3:af:89:aa:8f:63:c6:67:27:a9:36:a3:1e:b8:95: 3d:ad:0b:83:7f:c9:10:6b:52:ac:a8:17:1a:da:44:fe: 5f:f2:e1:0c:15:15:8d:c3:b6:e8:31:9d:35:ac:bb:6a: 0b:f8:38:b8:a3:90:af:8d:c0:b1:19:21:58:21:f3:5a: df:31:8d:81:79:f9:88:9f:9d:4c:7a:ad:d8:18:ad:db: fc:f0:d5:65:1b:6f:51:3e:89:1e:e8:42:f0:05:26:01 Fingerprint (SHA-256): 11:25:64:85:55:8B:CE:3A:57:5B:4F:1B:B6:C2:71:4D:0E:6D:3D:31:F3:44:5F:38:3F:56:6D:21:D4:36:37:44 Fingerprint (SHA1): 64:C2:D0:D7:AC:00:EF:72:B6:83:6D:66:D2:F0:0A:74:45:33:42:33 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #4895: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4896: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132706 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4897: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4898: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4899: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4900: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108132707 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4901: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4902: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4903: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4904: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108132708 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA1Root-108132615.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4905: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4906: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #4907: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4908: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108132709 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4909: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4910: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #4911: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132706 (0x671f962) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 18:49:29 2016 Not After : Fri Jan 08 18:49:29 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:5d:35:80:b0:d7:d1:35:30:f3:a3:f7:2e:5b:00:b2: 16:30:7b:80:a5:7b:c7:76:11:ce:19:d5:8a:88:92:79: b0:d7:8e:cf:7d:4e:bb:0d:58:fe:d8:7e:3b:3e:f8:14: 16:4d:c0:ab:f6:25:2d:ef:96:55:ac:db:5b:d7:6e:c9: 2f:00:c6:53:14:b9:bb:f0:90:7c:85:b5:fb:c2:21:d0: 36:e6:8b:53:df:2a:ad:48:d0:e3:a8:76:b1:49:1b:00: c7:1b:d2:a8:d9:a9:81:ef:4c:82:af:56:1d:bb:db:d4: 8b:fc:41:f3:85:4c:9e:9b:c1:e9:13:29:e6:7b:f1:7d: e1:e2:7a:c6:fe:1b:72:bf:dc:b3:cd:c2:6e:d8:61:95: 4e:95:d1:53:73:48:10:52:af:49:25:e6:97:a2:1f:32: ae:42:fa:10:00:32:28:70:71:dd:b9:1b:09:55:84:55: 44:bc:36:d0:f8:b2:ca:da:ac:40:70:9f:fa:90:3f:06: ff:0f:b5:b9:82:2d:55:d3:83:e8:ca:b4:4f:75:9c:24: 4a:07:93:f6:6a:76:50:1d:b3:9e:22:2e:1f:a0:fa:f8: c6:33:53:c4:bd:a6:b3:b6:63:5b:3a:6a:61:57:17:9a: a9:14:b9:ae:1c:56:da:fc:41:9e:c2:f1:b4:37:b8:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 17:67:51:52:1e:d5:98:1b:9f:7c:11:cf:65:34:e3:da: a1:1d:f3:4f:11:6f:7d:00:ea:c3:f7:83:dd:33:f3:59: 50:27:e2:97:c3:93:da:13:b7:79:55:13:21:9c:09:a6: 16:3e:c8:61:34:b8:17:7b:dd:25:3e:83:92:af:2c:83: 8d:c7:5c:78:16:c1:80:26:1f:d8:bd:9c:79:92:76:9c: b9:1f:53:19:94:4d:86:6e:a9:42:b0:71:8c:24:00:09: 49:2d:ba:7d:da:4e:35:00:ce:75:05:a9:bf:5e:20:c9: 4e:99:ce:b1:69:9b:86:06:54:48:94:a6:aa:f4:30:53: b2:47:27:c5:f4:88:a0:96:82:67:90:03:4b:a8:8e:56: f5:53:2e:02:b2:87:c1:81:0d:c5:b7:3b:39:5a:29:b2: 3c:b8:f7:01:26:1d:e8:ed:b3:b3:d2:3d:a8:3c:bc:16: b4:e7:6e:a0:76:74:ea:1d:73:8a:83:e1:d0:dc:dd:78: a1:24:51:d3:0a:b2:7d:fd:0b:4b:17:ff:88:d2:ed:87: e1:28:98:8c:31:66:6d:5f:20:8a:f2:69:94:22:33:37: 45:de:3a:31:8e:d3:ab:9b:3d:eb:4b:f2:db:26:b0:d6: 08:3f:40:e2:da:5e:73:f7:ec:2f:e7:bd:2c:80:a8:fa Fingerprint (SHA-256): 57:FA:A4:2A:03:22:27:97:95:C3:EB:43:25:CE:89:9B:30:3E:D0:7A:03:24:DB:29:91:0D:39:CD:FB:30:ED:6E Fingerprint (SHA1): CB:88:7D:C9:14:7D:C0:96:6F:9A:DC:F3:09:F5:CF:77:DE:D2:E7:01 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4912: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #4913: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132710 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4914: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #4915: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #4916: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132711 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4917: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #4918: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #4919: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4920: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108132712 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4921: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4922: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108132713 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4923: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4924: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #4925: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4926: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4927: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108132714 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-Bridge-108132616.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4928: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4929: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #4930: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4931: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108132715 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4932: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4933: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #4934: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #4935: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132711 (0x671f967) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 18:50:23 2016 Not After : Fri Jan 08 18:50:23 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:05:de:0a:c8:bb:f5:e0:9a:66:61:40:3c:3b:ce:25: d1:15:9c:12:b5:ff:83:ca:ff:2e:a9:68:a6:53:0b:1f: 60:fb:ac:13:a1:18:90:9b:7b:22:8a:52:f7:ef:4a:89: 3c:f3:85:83:b0:f5:4b:12:fa:d4:f0:4a:26:9e:3b:1f: 60:11:33:a8:c0:c1:b8:e8:b7:a0:93:a9:6f:d8:9b:89: 13:a4:97:0c:9e:5a:42:35:ac:fa:92:4d:72:47:49:c8: 3f:c9:b7:af:43:a0:e4:97:c2:a4:8e:85:b1:ca:d5:aa: 08:9f:df:ee:70:2a:d1:ce:69:a5:a9:a9:f4:c3:d3:7f: 70:9c:8c:83:9e:b6:6f:7c:f7:5a:10:05:93:75:cb:04: 6f:15:dd:09:8d:f4:d7:24:3f:ff:c4:b3:fc:71:ba:ec: 89:cc:81:58:84:17:ef:c6:94:99:88:6d:52:d9:27:5c: 15:74:83:83:c3:ca:95:d9:cf:16:f2:c0:2b:24:40:d9: de:a3:cc:91:8b:64:4f:29:38:de:ad:ab:36:77:8f:2d: 6c:b4:d4:e5:ca:e7:f3:1f:6b:18:24:d2:03:1a:57:79: 8f:c9:03:dd:14:97:36:48:e3:20:79:b8:d6:1b:89:cd: 1c:b8:1b:6e:bc:cb:3c:af:af:e5:72:cb:7e:83:e0:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c4:9b:35:f8:f2:5e:09:17:70:bc:37:7f:a3:29:be:9d: b5:b3:f2:1e:38:67:37:8e:03:46:16:ef:9e:a7:58:3e: 08:d8:c4:5f:ad:ae:b1:ed:a2:9f:8f:f6:d9:2e:83:57: 88:71:22:62:e2:73:91:c5:18:6a:17:35:2e:a3:a6:a5: 71:09:b1:d1:43:47:6c:c7:c7:25:89:fd:ca:7f:2b:df: 41:43:e3:2c:e0:3f:30:be:d8:f8:b0:44:d4:1a:74:5f: 54:39:5c:59:ae:c2:30:5a:9d:37:e7:34:90:76:fc:6c: 87:d9:b2:66:20:62:4f:19:45:5e:ca:4c:9d:7d:f3:e8: af:f1:51:c8:38:ed:6f:77:94:43:96:f4:0f:1c:a5:0a: 52:34:b6:7e:ef:55:b1:ac:e9:81:69:20:3e:98:f1:89: 33:cd:59:6e:f8:0c:4e:43:47:dd:ee:86:d7:95:bc:69: c3:7f:fc:b0:a8:1f:d0:29:45:32:b8:65:4c:e5:44:9d: 67:39:c2:2a:4e:ed:20:97:89:2f:3f:65:69:8b:6f:7f: d1:b7:ec:2b:28:f5:22:17:ab:a0:73:cd:8e:01:c2:ea: 04:f7:d6:d6:f8:09:b6:d4:5b:01:5a:92:b3:67:25:f1: 05:29:bc:5c:3b:b9:11:7a:6f:3d:38:d6:61:01:a9:84 Fingerprint (SHA-256): 95:27:C4:47:49:57:FF:8E:C3:C1:9F:CC:C9:8B:50:6F:41:E3:D9:6C:8F:AA:71:C7:DB:70:4B:C2:F6:1D:CE:A0 Fingerprint (SHA1): CF:E7:D2:A5:C0:6B:13:7E:EA:6D:FA:54:A0:2D:1B:83:BF:CD:77:FA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4936: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132711 (0x671f967) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 18:50:23 2016 Not After : Fri Jan 08 18:50:23 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:05:de:0a:c8:bb:f5:e0:9a:66:61:40:3c:3b:ce:25: d1:15:9c:12:b5:ff:83:ca:ff:2e:a9:68:a6:53:0b:1f: 60:fb:ac:13:a1:18:90:9b:7b:22:8a:52:f7:ef:4a:89: 3c:f3:85:83:b0:f5:4b:12:fa:d4:f0:4a:26:9e:3b:1f: 60:11:33:a8:c0:c1:b8:e8:b7:a0:93:a9:6f:d8:9b:89: 13:a4:97:0c:9e:5a:42:35:ac:fa:92:4d:72:47:49:c8: 3f:c9:b7:af:43:a0:e4:97:c2:a4:8e:85:b1:ca:d5:aa: 08:9f:df:ee:70:2a:d1:ce:69:a5:a9:a9:f4:c3:d3:7f: 70:9c:8c:83:9e:b6:6f:7c:f7:5a:10:05:93:75:cb:04: 6f:15:dd:09:8d:f4:d7:24:3f:ff:c4:b3:fc:71:ba:ec: 89:cc:81:58:84:17:ef:c6:94:99:88:6d:52:d9:27:5c: 15:74:83:83:c3:ca:95:d9:cf:16:f2:c0:2b:24:40:d9: de:a3:cc:91:8b:64:4f:29:38:de:ad:ab:36:77:8f:2d: 6c:b4:d4:e5:ca:e7:f3:1f:6b:18:24:d2:03:1a:57:79: 8f:c9:03:dd:14:97:36:48:e3:20:79:b8:d6:1b:89:cd: 1c:b8:1b:6e:bc:cb:3c:af:af:e5:72:cb:7e:83:e0:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c4:9b:35:f8:f2:5e:09:17:70:bc:37:7f:a3:29:be:9d: b5:b3:f2:1e:38:67:37:8e:03:46:16:ef:9e:a7:58:3e: 08:d8:c4:5f:ad:ae:b1:ed:a2:9f:8f:f6:d9:2e:83:57: 88:71:22:62:e2:73:91:c5:18:6a:17:35:2e:a3:a6:a5: 71:09:b1:d1:43:47:6c:c7:c7:25:89:fd:ca:7f:2b:df: 41:43:e3:2c:e0:3f:30:be:d8:f8:b0:44:d4:1a:74:5f: 54:39:5c:59:ae:c2:30:5a:9d:37:e7:34:90:76:fc:6c: 87:d9:b2:66:20:62:4f:19:45:5e:ca:4c:9d:7d:f3:e8: af:f1:51:c8:38:ed:6f:77:94:43:96:f4:0f:1c:a5:0a: 52:34:b6:7e:ef:55:b1:ac:e9:81:69:20:3e:98:f1:89: 33:cd:59:6e:f8:0c:4e:43:47:dd:ee:86:d7:95:bc:69: c3:7f:fc:b0:a8:1f:d0:29:45:32:b8:65:4c:e5:44:9d: 67:39:c2:2a:4e:ed:20:97:89:2f:3f:65:69:8b:6f:7f: d1:b7:ec:2b:28:f5:22:17:ab:a0:73:cd:8e:01:c2:ea: 04:f7:d6:d6:f8:09:b6:d4:5b:01:5a:92:b3:67:25:f1: 05:29:bc:5c:3b:b9:11:7a:6f:3d:38:d6:61:01:a9:84 Fingerprint (SHA-256): 95:27:C4:47:49:57:FF:8E:C3:C1:9F:CC:C9:8B:50:6F:41:E3:D9:6C:8F:AA:71:C7:DB:70:4B:C2:F6:1D:CE:A0 Fingerprint (SHA1): CF:E7:D2:A5:C0:6B:13:7E:EA:6D:FA:54:A0:2D:1B:83:BF:CD:77:FA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4937: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #4938: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132716 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4939: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #4940: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #4941: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132717 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4942: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #4943: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #4944: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4945: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108132718 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4946: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4947: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108132719 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4948: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4949: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #4950: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4951: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4952: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108132720 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-Bridge-108132617.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4953: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4954: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #4955: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4956: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108132721 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4957: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4958: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4959: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4960: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 108132722 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-BridgeNavy-108132618.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4961: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4962: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #4963: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4964: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108132723 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4965: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4966: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #4967: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #4968: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132717 (0x671f96d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 18:51:17 2016 Not After : Fri Jan 08 18:51:17 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:2b:67:fe:92:ae:03:50:4b:dd:69:ae:d7:52:b9:51: 9a:97:da:e8:7c:5d:70:42:55:14:4e:4e:0b:e2:72:25: 3b:6f:65:ef:01:fd:02:19:07:3a:e4:21:2a:f6:d2:67: 8b:f3:28:40:76:f1:3f:14:b2:32:85:02:d4:fd:6c:ec: 95:52:89:3a:4c:fa:8b:45:d2:af:64:ab:4b:8c:28:ef: 94:81:82:a1:5b:61:17:54:80:3d:4e:7e:f8:bd:2e:d0: 61:d0:a6:98:15:4a:2d:18:0b:27:8d:f3:0e:9a:08:88: f3:6f:45:f0:37:0a:9a:fe:5b:06:bc:26:0a:27:39:88: 01:d1:a5:f6:fc:9d:35:16:a3:1d:6a:5d:50:67:10:1b: 34:85:e4:f8:20:33:ec:b3:2f:ec:bb:4e:e7:ad:a5:b9: da:52:93:07:07:b5:16:e3:da:5b:3c:1c:cc:a6:c6:bb: b8:3e:29:58:09:66:30:f3:6c:bd:50:c1:62:f6:a3:f7: 08:06:e0:b3:17:26:e2:12:3e:94:be:0e:6f:08:74:a2: 89:28:61:74:bd:68:bc:44:e7:b8:76:32:ae:fb:2e:be: 25:7e:d3:64:6b:a8:b8:05:1a:a7:f6:8b:72:ea:1c:97: 9f:51:b7:88:f3:ff:d5:3e:b6:b1:27:6c:d0:d9:f8:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 44:06:d7:d9:0a:96:e9:34:94:19:ae:6a:fc:d5:86:9d: aa:87:4e:f3:b5:be:51:69:de:88:52:72:26:44:36:c4: 56:bf:5e:1f:73:f9:6e:a8:f4:a1:0c:fc:4a:0c:df:0b: 5c:83:65:09:8a:cc:d2:8d:d2:b7:bd:61:8c:79:a8:16: ef:84:90:b3:a9:dd:17:46:13:2f:ec:bd:17:43:e4:34: f9:97:97:49:8c:ff:13:5c:30:d8:8c:73:22:c7:c9:36: 5c:82:4d:5f:f7:10:ad:c3:04:17:f4:22:d9:fc:08:4e: b9:f3:1a:cb:a3:89:7b:6c:21:15:29:37:8f:3b:78:49: fd:38:f6:67:86:69:d5:34:f7:d1:ca:e3:de:1e:d6:43: f3:85:34:ce:cb:4f:98:b9:ad:78:ea:bf:10:0a:38:57: 2a:39:88:65:e7:e0:3d:8a:7d:f6:63:51:2d:e6:5a:4f: 41:1b:e4:ed:20:11:88:35:54:e5:51:e4:8a:9f:a3:8c: a5:d7:66:7b:9f:89:a8:95:de:28:80:01:52:3e:e9:22: 01:f8:98:21:00:a9:51:89:0c:e5:fd:8d:6e:f6:c8:c6: 07:87:11:f7:78:04:32:5d:64:22:30:ec:d0:7c:28:10: 80:10:49:37:b1:7c:56:b3:8a:2b:58:7b:a5:fa:6c:7c Fingerprint (SHA-256): C6:CD:01:D8:7F:7F:43:A3:55:97:E2:7E:CB:64:F2:FD:45:0C:20:56:87:A0:E6:D3:A5:AE:09:77:D1:45:93:78 Fingerprint (SHA1): 49:E2:1B:AF:71:21:47:1F:E6:13:99:A0:14:66:91:AC:D8:ED:84:9B Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4969: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132717 (0x671f96d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 18:51:17 2016 Not After : Fri Jan 08 18:51:17 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:2b:67:fe:92:ae:03:50:4b:dd:69:ae:d7:52:b9:51: 9a:97:da:e8:7c:5d:70:42:55:14:4e:4e:0b:e2:72:25: 3b:6f:65:ef:01:fd:02:19:07:3a:e4:21:2a:f6:d2:67: 8b:f3:28:40:76:f1:3f:14:b2:32:85:02:d4:fd:6c:ec: 95:52:89:3a:4c:fa:8b:45:d2:af:64:ab:4b:8c:28:ef: 94:81:82:a1:5b:61:17:54:80:3d:4e:7e:f8:bd:2e:d0: 61:d0:a6:98:15:4a:2d:18:0b:27:8d:f3:0e:9a:08:88: f3:6f:45:f0:37:0a:9a:fe:5b:06:bc:26:0a:27:39:88: 01:d1:a5:f6:fc:9d:35:16:a3:1d:6a:5d:50:67:10:1b: 34:85:e4:f8:20:33:ec:b3:2f:ec:bb:4e:e7:ad:a5:b9: da:52:93:07:07:b5:16:e3:da:5b:3c:1c:cc:a6:c6:bb: b8:3e:29:58:09:66:30:f3:6c:bd:50:c1:62:f6:a3:f7: 08:06:e0:b3:17:26:e2:12:3e:94:be:0e:6f:08:74:a2: 89:28:61:74:bd:68:bc:44:e7:b8:76:32:ae:fb:2e:be: 25:7e:d3:64:6b:a8:b8:05:1a:a7:f6:8b:72:ea:1c:97: 9f:51:b7:88:f3:ff:d5:3e:b6:b1:27:6c:d0:d9:f8:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 44:06:d7:d9:0a:96:e9:34:94:19:ae:6a:fc:d5:86:9d: aa:87:4e:f3:b5:be:51:69:de:88:52:72:26:44:36:c4: 56:bf:5e:1f:73:f9:6e:a8:f4:a1:0c:fc:4a:0c:df:0b: 5c:83:65:09:8a:cc:d2:8d:d2:b7:bd:61:8c:79:a8:16: ef:84:90:b3:a9:dd:17:46:13:2f:ec:bd:17:43:e4:34: f9:97:97:49:8c:ff:13:5c:30:d8:8c:73:22:c7:c9:36: 5c:82:4d:5f:f7:10:ad:c3:04:17:f4:22:d9:fc:08:4e: b9:f3:1a:cb:a3:89:7b:6c:21:15:29:37:8f:3b:78:49: fd:38:f6:67:86:69:d5:34:f7:d1:ca:e3:de:1e:d6:43: f3:85:34:ce:cb:4f:98:b9:ad:78:ea:bf:10:0a:38:57: 2a:39:88:65:e7:e0:3d:8a:7d:f6:63:51:2d:e6:5a:4f: 41:1b:e4:ed:20:11:88:35:54:e5:51:e4:8a:9f:a3:8c: a5:d7:66:7b:9f:89:a8:95:de:28:80:01:52:3e:e9:22: 01:f8:98:21:00:a9:51:89:0c:e5:fd:8d:6e:f6:c8:c6: 07:87:11:f7:78:04:32:5d:64:22:30:ec:d0:7c:28:10: 80:10:49:37:b1:7c:56:b3:8a:2b:58:7b:a5:fa:6c:7c Fingerprint (SHA-256): C6:CD:01:D8:7F:7F:43:A3:55:97:E2:7E:CB:64:F2:FD:45:0C:20:56:87:A0:E6:D3:A5:AE:09:77:D1:45:93:78 Fingerprint (SHA1): 49:E2:1B:AF:71:21:47:1F:E6:13:99:A0:14:66:91:AC:D8:ED:84:9B Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4970: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #4971: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132716 (0x671f96c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 18:51:11 2016 Not After : Fri Jan 08 18:51:11 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:f2:f9:8a:5b:13:e3:7d:37:7c:85:c6:85:53:53:a9: 7a:94:81:06:92:2f:24:7a:79:75:c1:5d:98:e5:fd:cb: 9c:b3:7e:1a:bf:06:4d:b1:e6:1d:21:1c:b1:07:d2:c1: 83:7e:25:d4:9e:b7:e4:d5:9a:5d:bf:fd:e6:b5:98:1d: 9e:1f:b9:f4:02:ee:34:b1:2f:dd:66:38:87:3e:f2:ee: d6:f8:1e:9d:12:97:e5:6d:ac:e9:a0:34:23:fb:20:18: 8f:9f:45:78:b0:d4:4c:6b:4f:f4:2b:55:50:9f:32:01: 41:6f:d7:f6:a6:f6:63:7a:ed:21:6d:db:75:15:3e:da: ac:49:c0:a4:1e:a6:09:2a:78:f8:c3:b8:b7:33:7b:6a: 8b:95:ef:f5:0a:73:4f:5e:d7:85:e3:02:25:43:29:76: d6:81:96:b9:ff:90:e4:39:4f:37:53:87:16:82:af:fd: e4:9e:24:db:3f:7d:2a:61:1b:16:74:7a:fd:6f:8b:49: 7c:74:40:cf:25:36:e8:f1:0e:aa:ab:ba:ad:f5:e1:f7: ff:5f:fc:71:b4:d3:38:60:78:c3:71:92:cb:24:d1:dd: 24:1a:d6:32:5a:73:b3:11:ba:c2:99:90:a3:3c:90:f8: 89:fa:fb:cf:df:37:19:9f:01:f9:4a:3c:4a:1c:f1:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3c:8d:00:04:4e:4b:1a:70:24:93:53:95:2c:3f:b4:3d: 99:8b:49:32:f6:a3:37:18:d0:9a:74:a4:ad:51:4c:1c: d7:f9:65:5a:fe:e7:62:da:ab:5a:bc:ad:9d:85:57:66: 4b:3b:d3:71:f8:da:dc:65:08:b8:9e:3d:1c:d1:e7:35: 0d:97:24:9b:4b:15:33:a0:10:f5:a2:6b:d1:64:37:32: e0:b6:cb:54:dd:04:a3:c3:59:63:2f:85:96:88:40:f2: 32:54:c0:d4:3f:a2:ad:e0:2a:0b:31:0b:89:f4:c9:4e: c4:80:42:ec:b8:1d:1f:39:03:3a:4b:3c:48:64:25:a8: b2:9c:dd:cf:3a:1b:57:be:49:42:14:71:9e:3e:6e:ae: d3:b9:de:73:61:0f:0b:48:b0:74:95:99:53:35:50:06: d0:0d:3e:66:95:a4:94:a6:6f:6f:84:6a:a0:83:74:8e: 53:0b:0e:48:28:7d:fa:7b:b3:9e:bd:5b:77:35:01:53: 87:36:e4:ff:01:4b:27:15:7f:6d:a7:61:55:9a:0a:e6: 78:c1:6c:f9:00:0b:7a:b8:8a:37:5d:a7:2c:59:cf:41: bc:07:97:da:eb:91:d5:73:de:4b:7c:c0:7d:d9:46:4b: fb:ec:4e:2d:fb:49:15:2b:27:c9:3e:10:95:21:da:05 Fingerprint (SHA-256): CE:BF:03:38:CC:03:9B:84:C9:D4:BE:E7:6C:F7:4A:A3:A7:B0:69:CB:75:01:7B:5A:0D:25:4F:EB:CD:A2:CC:E2 Fingerprint (SHA1): 12:D6:32:73:94:A0:A9:C4:76:B9:6A:06:E4:61:F9:68:D6:3C:94:48 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4972: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132717 (0x671f96d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 18:51:17 2016 Not After : Fri Jan 08 18:51:17 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:2b:67:fe:92:ae:03:50:4b:dd:69:ae:d7:52:b9:51: 9a:97:da:e8:7c:5d:70:42:55:14:4e:4e:0b:e2:72:25: 3b:6f:65:ef:01:fd:02:19:07:3a:e4:21:2a:f6:d2:67: 8b:f3:28:40:76:f1:3f:14:b2:32:85:02:d4:fd:6c:ec: 95:52:89:3a:4c:fa:8b:45:d2:af:64:ab:4b:8c:28:ef: 94:81:82:a1:5b:61:17:54:80:3d:4e:7e:f8:bd:2e:d0: 61:d0:a6:98:15:4a:2d:18:0b:27:8d:f3:0e:9a:08:88: f3:6f:45:f0:37:0a:9a:fe:5b:06:bc:26:0a:27:39:88: 01:d1:a5:f6:fc:9d:35:16:a3:1d:6a:5d:50:67:10:1b: 34:85:e4:f8:20:33:ec:b3:2f:ec:bb:4e:e7:ad:a5:b9: da:52:93:07:07:b5:16:e3:da:5b:3c:1c:cc:a6:c6:bb: b8:3e:29:58:09:66:30:f3:6c:bd:50:c1:62:f6:a3:f7: 08:06:e0:b3:17:26:e2:12:3e:94:be:0e:6f:08:74:a2: 89:28:61:74:bd:68:bc:44:e7:b8:76:32:ae:fb:2e:be: 25:7e:d3:64:6b:a8:b8:05:1a:a7:f6:8b:72:ea:1c:97: 9f:51:b7:88:f3:ff:d5:3e:b6:b1:27:6c:d0:d9:f8:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 44:06:d7:d9:0a:96:e9:34:94:19:ae:6a:fc:d5:86:9d: aa:87:4e:f3:b5:be:51:69:de:88:52:72:26:44:36:c4: 56:bf:5e:1f:73:f9:6e:a8:f4:a1:0c:fc:4a:0c:df:0b: 5c:83:65:09:8a:cc:d2:8d:d2:b7:bd:61:8c:79:a8:16: ef:84:90:b3:a9:dd:17:46:13:2f:ec:bd:17:43:e4:34: f9:97:97:49:8c:ff:13:5c:30:d8:8c:73:22:c7:c9:36: 5c:82:4d:5f:f7:10:ad:c3:04:17:f4:22:d9:fc:08:4e: b9:f3:1a:cb:a3:89:7b:6c:21:15:29:37:8f:3b:78:49: fd:38:f6:67:86:69:d5:34:f7:d1:ca:e3:de:1e:d6:43: f3:85:34:ce:cb:4f:98:b9:ad:78:ea:bf:10:0a:38:57: 2a:39:88:65:e7:e0:3d:8a:7d:f6:63:51:2d:e6:5a:4f: 41:1b:e4:ed:20:11:88:35:54:e5:51:e4:8a:9f:a3:8c: a5:d7:66:7b:9f:89:a8:95:de:28:80:01:52:3e:e9:22: 01:f8:98:21:00:a9:51:89:0c:e5:fd:8d:6e:f6:c8:c6: 07:87:11:f7:78:04:32:5d:64:22:30:ec:d0:7c:28:10: 80:10:49:37:b1:7c:56:b3:8a:2b:58:7b:a5:fa:6c:7c Fingerprint (SHA-256): C6:CD:01:D8:7F:7F:43:A3:55:97:E2:7E:CB:64:F2:FD:45:0C:20:56:87:A0:E6:D3:A5:AE:09:77:D1:45:93:78 Fingerprint (SHA1): 49:E2:1B:AF:71:21:47:1F:E6:13:99:A0:14:66:91:AC:D8:ED:84:9B Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4973: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132717 (0x671f96d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 18:51:17 2016 Not After : Fri Jan 08 18:51:17 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:2b:67:fe:92:ae:03:50:4b:dd:69:ae:d7:52:b9:51: 9a:97:da:e8:7c:5d:70:42:55:14:4e:4e:0b:e2:72:25: 3b:6f:65:ef:01:fd:02:19:07:3a:e4:21:2a:f6:d2:67: 8b:f3:28:40:76:f1:3f:14:b2:32:85:02:d4:fd:6c:ec: 95:52:89:3a:4c:fa:8b:45:d2:af:64:ab:4b:8c:28:ef: 94:81:82:a1:5b:61:17:54:80:3d:4e:7e:f8:bd:2e:d0: 61:d0:a6:98:15:4a:2d:18:0b:27:8d:f3:0e:9a:08:88: f3:6f:45:f0:37:0a:9a:fe:5b:06:bc:26:0a:27:39:88: 01:d1:a5:f6:fc:9d:35:16:a3:1d:6a:5d:50:67:10:1b: 34:85:e4:f8:20:33:ec:b3:2f:ec:bb:4e:e7:ad:a5:b9: da:52:93:07:07:b5:16:e3:da:5b:3c:1c:cc:a6:c6:bb: b8:3e:29:58:09:66:30:f3:6c:bd:50:c1:62:f6:a3:f7: 08:06:e0:b3:17:26:e2:12:3e:94:be:0e:6f:08:74:a2: 89:28:61:74:bd:68:bc:44:e7:b8:76:32:ae:fb:2e:be: 25:7e:d3:64:6b:a8:b8:05:1a:a7:f6:8b:72:ea:1c:97: 9f:51:b7:88:f3:ff:d5:3e:b6:b1:27:6c:d0:d9:f8:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 44:06:d7:d9:0a:96:e9:34:94:19:ae:6a:fc:d5:86:9d: aa:87:4e:f3:b5:be:51:69:de:88:52:72:26:44:36:c4: 56:bf:5e:1f:73:f9:6e:a8:f4:a1:0c:fc:4a:0c:df:0b: 5c:83:65:09:8a:cc:d2:8d:d2:b7:bd:61:8c:79:a8:16: ef:84:90:b3:a9:dd:17:46:13:2f:ec:bd:17:43:e4:34: f9:97:97:49:8c:ff:13:5c:30:d8:8c:73:22:c7:c9:36: 5c:82:4d:5f:f7:10:ad:c3:04:17:f4:22:d9:fc:08:4e: b9:f3:1a:cb:a3:89:7b:6c:21:15:29:37:8f:3b:78:49: fd:38:f6:67:86:69:d5:34:f7:d1:ca:e3:de:1e:d6:43: f3:85:34:ce:cb:4f:98:b9:ad:78:ea:bf:10:0a:38:57: 2a:39:88:65:e7:e0:3d:8a:7d:f6:63:51:2d:e6:5a:4f: 41:1b:e4:ed:20:11:88:35:54:e5:51:e4:8a:9f:a3:8c: a5:d7:66:7b:9f:89:a8:95:de:28:80:01:52:3e:e9:22: 01:f8:98:21:00:a9:51:89:0c:e5:fd:8d:6e:f6:c8:c6: 07:87:11:f7:78:04:32:5d:64:22:30:ec:d0:7c:28:10: 80:10:49:37:b1:7c:56:b3:8a:2b:58:7b:a5:fa:6c:7c Fingerprint (SHA-256): C6:CD:01:D8:7F:7F:43:A3:55:97:E2:7E:CB:64:F2:FD:45:0C:20:56:87:A0:E6:D3:A5:AE:09:77:D1:45:93:78 Fingerprint (SHA1): 49:E2:1B:AF:71:21:47:1F:E6:13:99:A0:14:66:91:AC:D8:ED:84:9B Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4974: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #4975: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132724 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4976: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #4977: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #4978: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132725 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4979: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #4980: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #4981: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4982: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 108132726 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4983: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4984: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #4985: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4986: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 108132727 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4987: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4988: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #4989: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4990: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 108132728 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #4991: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4992: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 108132729 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #4993: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4994: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #4995: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4996: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4997: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108132730 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4998: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4999: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5000: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5001: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 108132731 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5002: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5003: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5004: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5005: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108132732 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5006: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5007: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5008: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5009: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108132733 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5010: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5011: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5012: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132724 (0x671f974) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 18:53:05 2016 Not After : Fri Jan 08 18:53:05 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:c0:87:94:fc:6a:ff:fc:58:93:5c:c5:68:c5:79:52: 30:15:4e:f1:84:ea:cd:2f:a6:32:66:bb:71:8e:c8:32: 33:71:e1:10:1c:1c:22:b2:d3:38:ca:f9:37:a9:07:31: ab:e5:1b:b7:1a:9f:a9:b4:66:d3:de:ad:f8:43:9b:7a: ba:55:33:c5:23:ac:35:bd:37:72:0c:79:00:f5:d3:46: 08:b7:11:6f:af:be:19:33:ab:14:c0:29:15:08:4e:12: 84:ea:7e:ec:97:de:ea:04:ee:90:8b:92:2e:51:b7:53: da:58:78:14:fe:71:10:29:31:b0:05:30:be:db:cf:d5: 05:89:6a:2b:43:0c:a7:fb:1c:11:2e:7d:f4:05:0a:5a: 7b:fd:43:47:87:16:08:5b:94:e2:0f:aa:3f:8c:52:8e: 65:5d:c1:46:01:74:94:07:aa:39:aa:27:9c:a9:de:94: ff:d4:b8:62:22:1d:5c:d1:14:39:1b:a8:9b:ee:61:d7: 6c:39:02:21:89:aa:46:17:3a:0f:8a:b9:1d:dd:dd:6c: 64:c3:b0:15:85:36:d1:61:36:32:ad:9f:f6:77:de:e8: cb:a1:f0:87:04:4e:b8:13:93:eb:68:e3:f1:75:49:97: bb:c0:fd:83:a4:76:22:a3:c1:07:b1:1d:72:79:b3:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:74:c1:64:40:b7:d1:ad:19:2c:43:d8:91:38:f0:e1: 32:c4:22:a4:a7:d0:6f:e3:7c:d9:27:58:ec:b1:53:32: 7b:ba:8b:28:9f:95:c5:d9:c7:9a:f2:f1:2b:91:9e:3c: 0b:11:fc:24:02:c8:ad:6c:d0:cc:4e:7e:4f:2e:3f:40: e4:d1:7d:58:73:f8:7c:ae:b8:d2:96:d8:8f:a2:85:7b: f2:99:21:af:fe:f3:11:c6:c2:4f:a9:20:3f:2e:fd:de: ec:e0:2e:47:a5:98:ea:4e:6b:98:2d:54:89:27:a6:fe: c4:16:60:74:0c:15:4b:65:94:28:2e:c4:7b:8d:e3:6e: 6a:b0:ad:67:fa:a2:8f:9a:23:0f:37:b7:0b:9d:ba:86: 46:88:2b:5e:46:a6:a7:94:21:90:76:8f:27:8b:93:c6: 48:15:77:28:2d:c9:ed:f7:8a:01:4b:ad:bf:3f:b2:3d: 20:c2:d9:a9:c3:4c:0c:f0:1e:af:d5:81:ba:3e:ab:af: b1:44:87:bc:23:45:e6:e7:e4:b0:6c:ac:17:28:fc:ad: 43:69:0a:23:36:01:d3:55:be:25:48:57:cc:94:71:67: 88:c4:3b:fc:0b:67:a2:23:3b:66:d3:fb:5d:73:c0:4c: 66:3d:c3:6d:44:ca:62:50:bd:e2:87:6d:c3:de:2b:85 Fingerprint (SHA-256): E6:A8:42:47:5C:5B:66:1E:14:57:D2:03:30:71:D9:3F:A5:1E:E3:38:7F:51:83:6B:AE:E2:E7:14:DC:95:AA:C7 Fingerprint (SHA1): 9D:EC:BE:18:6C:5E:AE:94:82:DC:EB:A7:02:67:23:DE:7F:DB:20:05 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #5013: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5014: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5015: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5016: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5017: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5018: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5019: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5020: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5021: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132725 (0x671f975) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 18:53:11 2016 Not After : Fri Jan 08 18:53:11 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:0e:9d:f4:d9:19:96:75:33:4d:b6:d8:45:88:25:13: 3f:b6:ae:ed:47:ea:08:8a:74:0c:05:52:88:87:fd:ed: 09:4f:7d:1f:78:b8:07:1c:b6:13:e9:4a:5b:ad:16:a0: ed:07:d4:eb:10:82:34:79:f0:44:d4:9e:92:4d:6d:12: 8a:c3:ed:ed:7d:8a:19:d0:9f:0f:9a:03:db:cd:fa:39: 09:f0:73:57:6f:a0:2e:4f:e8:af:ba:35:c0:e2:55:ef: 9e:1d:08:19:7a:08:7b:66:f1:ef:bb:61:38:28:c1:2e: 21:0d:0d:6f:70:b1:21:06:54:92:9a:88:60:c2:fe:7b: d8:19:9e:b6:57:66:d1:e0:30:54:85:a3:49:d3:25:ce: bf:e2:1d:11:d7:ab:e5:78:65:39:c1:b0:14:a0:c6:2b: 62:9e:65:a8:c9:df:a2:32:2a:42:55:40:2f:e3:cf:09: 1a:68:c3:ab:6a:de:b3:e9:36:8c:78:bf:34:5b:d0:08: 71:06:4a:da:19:11:05:4b:b2:16:80:ee:92:50:13:ea: c2:74:9e:6d:dc:b4:f0:99:b2:46:31:55:a8:10:98:44: 18:b4:b4:d5:93:67:38:d2:9d:b6:6d:4b:40:17:73:91: 0d:c3:3b:b5:68:eb:f0:f0:59:79:9c:03:ce:58:e9:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:42:1d:9a:3b:9f:8e:0c:ea:c9:52:2a:73:9b:67:fb: 63:d7:21:d8:53:7b:85:9b:38:9a:19:a3:ce:c6:14:e5: 4b:25:e7:34:be:84:ec:10:38:47:23:b9:b9:da:12:e6: a8:5a:eb:89:38:95:09:2d:22:72:3b:a6:27:37:3e:76: 6e:8e:ba:a9:a9:28:87:d1:27:d3:59:0d:ad:68:45:67: 51:5d:04:13:3d:a9:43:8d:6b:43:53:72:9b:61:c0:80: 6a:57:0b:21:a3:c5:4b:4f:b7:19:8e:d5:4b:66:98:7a: 75:bc:54:82:de:70:db:e7:bc:5d:a9:f2:45:50:4c:3d: fa:ff:38:73:ea:95:f2:0b:b4:b2:7d:1c:4b:58:91:b4: 1a:ff:c8:0b:35:b5:4e:42:60:b6:40:9b:76:18:b5:da: 32:c3:28:0b:89:27:7a:d3:f6:8f:e6:14:b7:60:5d:4a: a8:b7:88:c5:79:e7:85:43:0b:ec:88:71:7f:dd:24:1e: 2a:23:b1:e6:99:67:43:86:8c:45:41:e0:d6:2f:88:6a: af:26:65:14:67:d6:4e:05:17:cf:5f:4c:7f:1f:fa:7c: 96:44:7c:be:f6:17:54:a9:b2:ea:43:ca:3d:89:30:6c: 00:23:93:71:be:d1:67:2c:70:9d:40:27:68:b6:f4:d9 Fingerprint (SHA-256): F9:E7:CF:0D:B9:D5:82:64:4A:6F:DC:0E:DA:48:5E:63:11:33:F9:CD:27:82:BE:A2:82:DB:EF:E3:EF:DB:DA:E2 Fingerprint (SHA1): 39:5E:0F:5B:0B:BD:0E:E3:70:96:75:7D:21:31:44:17:A6:F2:9F:FC Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #5022: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5023: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5024: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5025: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5026: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5027: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5028: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #5029: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #5030: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #5031: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #5032: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #5033: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #5034: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #5035: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #5036: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #5037: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.114412.1.1 /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=paypal.com,OU=PayPal Production,O="PayPal, Inc.",L =San Jose,ST=California,C=US" Certificate 2 Subject: "CN=DigiCert SHA2 High Assurance Server CA,OU=www.digi cert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #5038: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #5039: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5040: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132734 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5041: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5042: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5043: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5044: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108132735 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5045: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5046: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5047: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5048: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108132736 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5049: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5050: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5051: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5052: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 108132737 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5053: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5054: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5055: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5056: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108132738 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5057: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5058: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #5059: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5060: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 108132739 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5061: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5062: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #5063: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5064: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 108132740 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5065: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5066: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #5067: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5068: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 108132741 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5069: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5070: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #5071: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5072: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 108132742 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5073: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5074: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5075: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132734 (0x671f97e) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 18:54:50 2016 Not After : Fri Jan 08 18:54:50 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 6f:21:45:25:86:59:b7:86:e8:ad:f4:f1:ad:cd:1e:f9: 51:05:f3:18:bb:61:7e:8d:a4:6b:97:4b:c1:f5:93:b5: a8:27:7e:7d:2f:16:15:79:d8:de:cb:99:1a:a8:14:9d: 16:be:a1:95:ff:c9:6f:97:c0:4a:9f:fc:a0:33:50:af: f0:2a:8d:0d:a4:97:3d:31:71:76:bd:d0:a5:a4:fc:65: 60:3f:98:70:c7:70:d6:c3:e5:bc:b4:ba:a7:4e:43:04: f4:15:6d:9c:2b:37:82:8b:47:e6:3b:bf:da:e0:08:0a: 6b:fb:3c:39:75:e0:67:13:51:fb:70:c9:09:39:98:84: 67:46:76:1c:52:ba:fc:eb:50:88:d4:81:9a:47:d9:08: d8:c6:11:c7:03:db:7d:9a:19:cd:7e:ff:ce:ae:28:52: 29:9a:7d:a8:15:76:fb:bb:40:eb:48:3a:b3:fd:00:91: 07:1c:ab:cb:f6:36:f3:3a:2a:3c:c2:aa:fa:fc:4e:e0: b4:4e:1c:aa:6e:92:68:d3:b5:c4:be:5a:7e:35:73:0c: fa:04:bf:68:7b:b0:77:ce:61:d7:a5:a3:23:06:81:50: 20:16:f6:6f:db:53:53:80:0a:ec:8b:79:d8:42:6a:ff: 19:37:25:c7:8f:71:23:40:32:da:f9:0d:c6:cd:54:71 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:49:f5:51:97:1a:64:75:b5:f2:bf:50:66: ed:69:3a:05:9d:27:9a:13:52:85:6d:8f:b3:d3:55:7a: 02:1d:00:b4:67:6a:78:cc:a3:a6:64:a1:25:9d:31:1a: c9:b2:f6:66:26:43:ee:12:34:a9:b8:c5:67:8e:56 Fingerprint (SHA-256): FE:F2:81:49:3D:E5:DC:10:D4:58:7B:9B:FF:CC:12:09:3C:CD:19:F8:A8:DD:22:C2:E1:A0:9A:1A:C6:9B:94:32 Fingerprint (SHA1): 01:96:6A:C7:AB:66:9D:C2:6B:0B:44:DF:62:6C:87:76:73:DE:3D:6B Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5076: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132734 (0x671f97e) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 18:54:50 2016 Not After : Fri Jan 08 18:54:50 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 6f:21:45:25:86:59:b7:86:e8:ad:f4:f1:ad:cd:1e:f9: 51:05:f3:18:bb:61:7e:8d:a4:6b:97:4b:c1:f5:93:b5: a8:27:7e:7d:2f:16:15:79:d8:de:cb:99:1a:a8:14:9d: 16:be:a1:95:ff:c9:6f:97:c0:4a:9f:fc:a0:33:50:af: f0:2a:8d:0d:a4:97:3d:31:71:76:bd:d0:a5:a4:fc:65: 60:3f:98:70:c7:70:d6:c3:e5:bc:b4:ba:a7:4e:43:04: f4:15:6d:9c:2b:37:82:8b:47:e6:3b:bf:da:e0:08:0a: 6b:fb:3c:39:75:e0:67:13:51:fb:70:c9:09:39:98:84: 67:46:76:1c:52:ba:fc:eb:50:88:d4:81:9a:47:d9:08: d8:c6:11:c7:03:db:7d:9a:19:cd:7e:ff:ce:ae:28:52: 29:9a:7d:a8:15:76:fb:bb:40:eb:48:3a:b3:fd:00:91: 07:1c:ab:cb:f6:36:f3:3a:2a:3c:c2:aa:fa:fc:4e:e0: b4:4e:1c:aa:6e:92:68:d3:b5:c4:be:5a:7e:35:73:0c: fa:04:bf:68:7b:b0:77:ce:61:d7:a5:a3:23:06:81:50: 20:16:f6:6f:db:53:53:80:0a:ec:8b:79:d8:42:6a:ff: 19:37:25:c7:8f:71:23:40:32:da:f9:0d:c6:cd:54:71 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:49:f5:51:97:1a:64:75:b5:f2:bf:50:66: ed:69:3a:05:9d:27:9a:13:52:85:6d:8f:b3:d3:55:7a: 02:1d:00:b4:67:6a:78:cc:a3:a6:64:a1:25:9d:31:1a: c9:b2:f6:66:26:43:ee:12:34:a9:b8:c5:67:8e:56 Fingerprint (SHA-256): FE:F2:81:49:3D:E5:DC:10:D4:58:7B:9B:FF:CC:12:09:3C:CD:19:F8:A8:DD:22:C2:E1:A0:9A:1A:C6:9B:94:32 Fingerprint (SHA1): 01:96:6A:C7:AB:66:9D:C2:6B:0B:44:DF:62:6C:87:76:73:DE:3D:6B Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5077: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132734 (0x671f97e) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 18:54:50 2016 Not After : Fri Jan 08 18:54:50 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 6f:21:45:25:86:59:b7:86:e8:ad:f4:f1:ad:cd:1e:f9: 51:05:f3:18:bb:61:7e:8d:a4:6b:97:4b:c1:f5:93:b5: a8:27:7e:7d:2f:16:15:79:d8:de:cb:99:1a:a8:14:9d: 16:be:a1:95:ff:c9:6f:97:c0:4a:9f:fc:a0:33:50:af: f0:2a:8d:0d:a4:97:3d:31:71:76:bd:d0:a5:a4:fc:65: 60:3f:98:70:c7:70:d6:c3:e5:bc:b4:ba:a7:4e:43:04: f4:15:6d:9c:2b:37:82:8b:47:e6:3b:bf:da:e0:08:0a: 6b:fb:3c:39:75:e0:67:13:51:fb:70:c9:09:39:98:84: 67:46:76:1c:52:ba:fc:eb:50:88:d4:81:9a:47:d9:08: d8:c6:11:c7:03:db:7d:9a:19:cd:7e:ff:ce:ae:28:52: 29:9a:7d:a8:15:76:fb:bb:40:eb:48:3a:b3:fd:00:91: 07:1c:ab:cb:f6:36:f3:3a:2a:3c:c2:aa:fa:fc:4e:e0: b4:4e:1c:aa:6e:92:68:d3:b5:c4:be:5a:7e:35:73:0c: fa:04:bf:68:7b:b0:77:ce:61:d7:a5:a3:23:06:81:50: 20:16:f6:6f:db:53:53:80:0a:ec:8b:79:d8:42:6a:ff: 19:37:25:c7:8f:71:23:40:32:da:f9:0d:c6:cd:54:71 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:49:f5:51:97:1a:64:75:b5:f2:bf:50:66: ed:69:3a:05:9d:27:9a:13:52:85:6d:8f:b3:d3:55:7a: 02:1d:00:b4:67:6a:78:cc:a3:a6:64:a1:25:9d:31:1a: c9:b2:f6:66:26:43:ee:12:34:a9:b8:c5:67:8e:56 Fingerprint (SHA-256): FE:F2:81:49:3D:E5:DC:10:D4:58:7B:9B:FF:CC:12:09:3C:CD:19:F8:A8:DD:22:C2:E1:A0:9A:1A:C6:9B:94:32 Fingerprint (SHA1): 01:96:6A:C7:AB:66:9D:C2:6B:0B:44:DF:62:6C:87:76:73:DE:3D:6B Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #5078: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132734 (0x671f97e) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 18:54:50 2016 Not After : Fri Jan 08 18:54:50 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 6f:21:45:25:86:59:b7:86:e8:ad:f4:f1:ad:cd:1e:f9: 51:05:f3:18:bb:61:7e:8d:a4:6b:97:4b:c1:f5:93:b5: a8:27:7e:7d:2f:16:15:79:d8:de:cb:99:1a:a8:14:9d: 16:be:a1:95:ff:c9:6f:97:c0:4a:9f:fc:a0:33:50:af: f0:2a:8d:0d:a4:97:3d:31:71:76:bd:d0:a5:a4:fc:65: 60:3f:98:70:c7:70:d6:c3:e5:bc:b4:ba:a7:4e:43:04: f4:15:6d:9c:2b:37:82:8b:47:e6:3b:bf:da:e0:08:0a: 6b:fb:3c:39:75:e0:67:13:51:fb:70:c9:09:39:98:84: 67:46:76:1c:52:ba:fc:eb:50:88:d4:81:9a:47:d9:08: d8:c6:11:c7:03:db:7d:9a:19:cd:7e:ff:ce:ae:28:52: 29:9a:7d:a8:15:76:fb:bb:40:eb:48:3a:b3:fd:00:91: 07:1c:ab:cb:f6:36:f3:3a:2a:3c:c2:aa:fa:fc:4e:e0: b4:4e:1c:aa:6e:92:68:d3:b5:c4:be:5a:7e:35:73:0c: fa:04:bf:68:7b:b0:77:ce:61:d7:a5:a3:23:06:81:50: 20:16:f6:6f:db:53:53:80:0a:ec:8b:79:d8:42:6a:ff: 19:37:25:c7:8f:71:23:40:32:da:f9:0d:c6:cd:54:71 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:49:f5:51:97:1a:64:75:b5:f2:bf:50:66: ed:69:3a:05:9d:27:9a:13:52:85:6d:8f:b3:d3:55:7a: 02:1d:00:b4:67:6a:78:cc:a3:a6:64:a1:25:9d:31:1a: c9:b2:f6:66:26:43:ee:12:34:a9:b8:c5:67:8e:56 Fingerprint (SHA-256): FE:F2:81:49:3D:E5:DC:10:D4:58:7B:9B:FF:CC:12:09:3C:CD:19:F8:A8:DD:22:C2:E1:A0:9A:1A:C6:9B:94:32 Fingerprint (SHA1): 01:96:6A:C7:AB:66:9D:C2:6B:0B:44:DF:62:6C:87:76:73:DE:3D:6B Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #5079: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5080: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 10 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5081: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5082: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #5083: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5084: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5085: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5086: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5087: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5088: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5089: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5090: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #5091: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5092: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5093: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5094: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #5095: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5096: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5097: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5098: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5099: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5100: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5101: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5102: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #5103: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5104: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5105: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5106: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160108185636Z nextupdate=20170108185636Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Jan 08 18:56:36 2016 Next Update: Sun Jan 08 18:56:36 2017 CRL Extensions: chains.sh: #5107: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108185637Z nextupdate=20170108185637Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 18:56:37 2016 Next Update: Sun Jan 08 18:56:37 2017 CRL Extensions: chains.sh: #5108: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108185638Z nextupdate=20170108185638Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 18:56:38 2016 Next Update: Sun Jan 08 18:56:38 2017 CRL Extensions: chains.sh: #5109: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160108185638Z nextupdate=20170108185638Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Jan 08 18:56:38 2016 Next Update: Sun Jan 08 18:56:38 2017 CRL Extensions: chains.sh: #5110: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108185639Z addcert 14 20160108185639Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 18:56:39 2016 Next Update: Sun Jan 08 18:56:38 2017 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Fri Jan 08 18:56:39 2016 CRL Extensions: chains.sh: #5111: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108185640Z addcert 15 20160108185640Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 18:56:40 2016 Next Update: Sun Jan 08 18:56:37 2017 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Fri Jan 08 18:56:40 2016 CRL Extensions: chains.sh: #5112: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5113: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5114: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #5115: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #5116: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #5117: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #5118: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #5119: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #5120: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #5121: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 18:55:40 2016 Not After : Fri Jan 08 18:55:40 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:92:4c:62:54:9f:da:3a:71:0a:f3:ae:39:0d:de:5b: d5:b0:9f:e1:ec:a1:67:e7:61:cd:b3:47:0e:18:a6:b6: 0a:9d:db:73:68:9f:89:43:4e:7f:7c:e3:79:46:52:1f: 80:9a:5f:95:bb:99:5a:43:e9:a5:5b:9f:02:1c:8b:d7: 75:07:03:c5:39:cb:2d:67:a8:a3:0a:01:a0:d8:38:30: 98:58:72:9f:8f:de:4e:bf:b9:db:28:d1:0e:bb:3f:35: 0c:22:e0:cf:cb:c2:6c:b1:7e:4c:28:c8:3e:a1:df:cc: 9b:6d:ab:ef:02:96:72:7e:fc:ae:27:3b:20:13:5f:92: 21:6b:83:2b:85:7d:85:ba:c2:a0:b3:9a:ca:12:e8:4e: 1e:8b:b0:5c:41:f5:84:be:b7:02:74:4f:00:b5:83:f5: 79:5d:41:cf:85:15:ee:2f:c2:96:ac:fd:99:17:d5:a3: 2b:a0:37:b5:03:e5:d7:ed:0e:a5:e4:dc:b8:9c:c7:e5: db:b3:45:e1:b5:cd:da:75:9c:47:ce:b1:cf:7c:df:bb: 01:2f:56:79:c5:6b:b9:43:74:4c:40:e9:43:49:53:55: 31:fa:0e:0e:8b:90:34:31:df:04:d9:17:d2:3a:75:44: db:86:e3:1b:38:f7:31:ab:89:58:8a:e5:b0:88:3b:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ab:e1:3a:71:48:bc:17:cf:ee:03:b4:4d:07:42:67:7c: 89:40:8e:39:96:dc:db:55:6c:74:57:ee:f3:1c:3f:2f: 85:2c:cc:5d:c7:1a:60:e7:dc:c8:a5:ea:b7:d0:9b:36: 82:b8:9e:ac:e6:78:18:f2:5f:3d:e4:69:92:4f:a1:6f: 01:6f:f9:0c:90:52:d2:e0:27:77:ec:64:c3:a0:e7:cf: d2:55:ad:d2:e3:61:25:32:44:14:0b:73:d4:15:66:f6: 93:92:a7:d6:73:b8:1e:3f:e1:31:07:06:71:1e:23:f2: 04:aa:57:61:13:84:e5:fa:4b:9f:97:51:05:43:30:de: 94:b1:91:17:04:fc:07:a1:95:30:7d:e6:b8:6d:50:f6: aa:d3:d8:7e:5f:1e:91:b7:e4:39:a6:a2:85:3b:62:92: 8f:99:e3:42:81:22:eb:79:7a:6f:6c:93:f0:a2:67:27: 39:cc:e8:1b:f9:d9:2d:3e:1b:5f:8a:bd:b4:e6:90:73: e6:fb:6e:b3:e6:20:aa:7d:8a:7a:14:f3:05:bb:67:32: 8b:2c:f1:a8:8f:4d:8c:81:e0:c9:b1:73:7b:8a:d1:89: f5:38:ad:ec:fe:d5:ab:51:d0:8a:0e:72:2a:4a:f0:1d: ac:68:45:4f:53:e8:83:68:bc:9a:13:e5:b6:25:d1:d9 Fingerprint (SHA-256): 7C:CB:46:99:84:82:EB:72:8A:93:83:DA:58:90:FA:52:33:DD:19:96:3D:37:D2:5F:99:85:E9:48:9C:F7:52:AA Fingerprint (SHA1): DB:31:FD:02:CA:30:6B:C5:DE:24:7C:BF:09:3B:D0:C2:4D:5E:5B:12 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #5122: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #5123: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 18:55:40 2016 Not After : Fri Jan 08 18:55:40 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:92:4c:62:54:9f:da:3a:71:0a:f3:ae:39:0d:de:5b: d5:b0:9f:e1:ec:a1:67:e7:61:cd:b3:47:0e:18:a6:b6: 0a:9d:db:73:68:9f:89:43:4e:7f:7c:e3:79:46:52:1f: 80:9a:5f:95:bb:99:5a:43:e9:a5:5b:9f:02:1c:8b:d7: 75:07:03:c5:39:cb:2d:67:a8:a3:0a:01:a0:d8:38:30: 98:58:72:9f:8f:de:4e:bf:b9:db:28:d1:0e:bb:3f:35: 0c:22:e0:cf:cb:c2:6c:b1:7e:4c:28:c8:3e:a1:df:cc: 9b:6d:ab:ef:02:96:72:7e:fc:ae:27:3b:20:13:5f:92: 21:6b:83:2b:85:7d:85:ba:c2:a0:b3:9a:ca:12:e8:4e: 1e:8b:b0:5c:41:f5:84:be:b7:02:74:4f:00:b5:83:f5: 79:5d:41:cf:85:15:ee:2f:c2:96:ac:fd:99:17:d5:a3: 2b:a0:37:b5:03:e5:d7:ed:0e:a5:e4:dc:b8:9c:c7:e5: db:b3:45:e1:b5:cd:da:75:9c:47:ce:b1:cf:7c:df:bb: 01:2f:56:79:c5:6b:b9:43:74:4c:40:e9:43:49:53:55: 31:fa:0e:0e:8b:90:34:31:df:04:d9:17:d2:3a:75:44: db:86:e3:1b:38:f7:31:ab:89:58:8a:e5:b0:88:3b:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ab:e1:3a:71:48:bc:17:cf:ee:03:b4:4d:07:42:67:7c: 89:40:8e:39:96:dc:db:55:6c:74:57:ee:f3:1c:3f:2f: 85:2c:cc:5d:c7:1a:60:e7:dc:c8:a5:ea:b7:d0:9b:36: 82:b8:9e:ac:e6:78:18:f2:5f:3d:e4:69:92:4f:a1:6f: 01:6f:f9:0c:90:52:d2:e0:27:77:ec:64:c3:a0:e7:cf: d2:55:ad:d2:e3:61:25:32:44:14:0b:73:d4:15:66:f6: 93:92:a7:d6:73:b8:1e:3f:e1:31:07:06:71:1e:23:f2: 04:aa:57:61:13:84:e5:fa:4b:9f:97:51:05:43:30:de: 94:b1:91:17:04:fc:07:a1:95:30:7d:e6:b8:6d:50:f6: aa:d3:d8:7e:5f:1e:91:b7:e4:39:a6:a2:85:3b:62:92: 8f:99:e3:42:81:22:eb:79:7a:6f:6c:93:f0:a2:67:27: 39:cc:e8:1b:f9:d9:2d:3e:1b:5f:8a:bd:b4:e6:90:73: e6:fb:6e:b3:e6:20:aa:7d:8a:7a:14:f3:05:bb:67:32: 8b:2c:f1:a8:8f:4d:8c:81:e0:c9:b1:73:7b:8a:d1:89: f5:38:ad:ec:fe:d5:ab:51:d0:8a:0e:72:2a:4a:f0:1d: ac:68:45:4f:53:e8:83:68:bc:9a:13:e5:b6:25:d1:d9 Fingerprint (SHA-256): 7C:CB:46:99:84:82:EB:72:8A:93:83:DA:58:90:FA:52:33:DD:19:96:3D:37:D2:5F:99:85:E9:48:9C:F7:52:AA Fingerprint (SHA1): DB:31:FD:02:CA:30:6B:C5:DE:24:7C:BF:09:3B:D0:C2:4D:5E:5B:12 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #5124: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #5125: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5126: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132743 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5127: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5128: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #5129: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5130: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 108132744 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5131: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5132: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5133: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9169/localhost-27064-CA0-108132634.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5134: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0Root-108132619.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5135: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5136: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #5137: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0-108132634.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5138: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 108132745 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5139: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5140: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5141: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9169/localhost-27064-CA0-108132634.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5142: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0Root-108132620.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5143: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5144: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #5145: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5146: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 108132746 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5147: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5148: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5149: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0-108132634.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5150: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0Root-108132621.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5151: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5152: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5153: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0-108132634.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5154: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0Root-108132622.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5155: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5156: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160108185814Z nextupdate=20170108185814Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Jan 08 18:58:14 2016 Next Update: Sun Jan 08 18:58:14 2017 CRL Extensions: chains.sh: #5157: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108185815Z nextupdate=20170108185815Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 18:58:15 2016 Next Update: Sun Jan 08 18:58:15 2017 CRL Extensions: chains.sh: #5158: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108185815Z nextupdate=20170108185815Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 18:58:15 2016 Next Update: Sun Jan 08 18:58:15 2017 CRL Extensions: chains.sh: #5159: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160108185816Z nextupdate=20170108185816Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Jan 08 18:58:16 2016 Next Update: Sun Jan 08 18:58:16 2017 CRL Extensions: chains.sh: #5160: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108185817Z addcert 20 20160108185817Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 18:58:17 2016 Next Update: Sun Jan 08 18:58:15 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Jan 08 18:58:17 2016 CRL Extensions: chains.sh: #5161: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108185818Z addcert 40 20160108185818Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 18:58:18 2016 Next Update: Sun Jan 08 18:58:15 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Jan 08 18:58:17 2016 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Fri Jan 08 18:58:18 2016 CRL Extensions: chains.sh: #5162: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5163: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5164: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #5165: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132743 (0x671f987) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 18:57:04 2016 Not After : Fri Jan 08 18:57:04 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:df:72:32:e2:93:fa:2e:32:14:74:93:d2:7e:56:a1: 95:bc:25:de:e3:56:d1:3c:10:7f:b8:d9:3e:12:8d:c8: b0:84:d5:cf:b3:ab:73:a0:47:1e:64:0e:88:18:6d:a3: cf:f1:92:2e:54:84:fd:af:9d:58:e2:ca:f1:41:29:56: 63:99:bd:77:24:fd:e3:ac:5d:04:b5:7c:42:99:ce:fa: 7d:f8:5a:70:b0:29:84:e4:e1:40:29:b3:fb:5f:64:bb: 37:78:f2:50:ad:da:19:66:55:69:d4:59:2c:77:b8:49: 2b:d1:5c:16:ad:1e:1e:01:67:cc:50:c4:8e:0a:b7:f9: ca:78:f6:33:06:08:e1:28:e0:8e:1e:2c:f1:56:92:58: 2d:45:01:57:6d:fb:e4:bf:49:78:f9:92:17:e5:35:6a: dd:90:d1:5a:41:4c:c7:cf:c2:58:0d:fb:a7:d5:27:91: f3:99:0e:60:f3:54:5e:f5:8e:34:8e:90:bd:af:99:ca: 4d:01:13:3c:a2:2c:22:77:69:dc:40:82:98:6d:77:76: 14:3c:24:e7:fc:09:e0:a8:ac:be:63:06:2c:c6:48:9a: 94:20:f5:e1:d0:95:11:a4:91:5d:1d:f3:8a:58:31:20: e4:60:41:43:f4:6c:06:d1:23:60:ba:5e:ee:c8:76:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:22:53:e0:c7:01:27:e7:53:5e:c7:9a:32:5f:11:4f: b1:7e:50:2d:17:b8:a3:ff:91:b2:0f:8e:a2:b8:ef:be: 88:82:9d:77:47:fe:2e:63:8f:f3:13:34:f9:55:d5:3a: 5b:02:94:18:1e:bc:b3:07:ab:da:07:4d:05:f5:5d:18: 75:30:6c:ca:68:24:a8:2d:62:24:83:2d:db:fb:07:c6: 78:42:cb:c5:05:be:03:b9:c6:ee:0e:c8:0b:49:40:12: 13:d9:24:49:3a:6d:ab:8d:52:8b:68:22:44:ba:3d:63: ec:34:f4:9f:34:de:b4:a4:ef:3c:18:93:af:ac:f8:44: 73:16:1d:99:73:22:47:e2:48:41:ff:a5:4b:97:b8:52: 2b:de:81:22:a2:7b:7c:3a:fa:a6:fb:d9:f8:db:58:21: 7e:84:09:ce:88:e4:4c:f4:1f:7e:68:73:9d:2a:3d:d5: 24:4e:b6:05:27:80:d2:a7:2a:f4:a7:06:24:93:9d:30: 0b:32:23:41:f6:20:91:dc:f9:8d:81:34:57:c0:dc:6a: 8f:d4:c5:47:e7:5c:ae:84:4e:bd:ce:e6:03:5e:34:b1: 6e:1e:69:5e:20:0e:8f:39:6c:fb:e0:8c:d6:22:ec:25: e6:a2:e9:f5:66:82:46:80:1f:96:05:02:62:e8:25:a4 Fingerprint (SHA-256): 94:72:1C:A1:08:96:63:1F:27:E5:90:E3:BB:C1:59:41:EF:D1:E7:04:98:8B:F9:2C:8B:EE:DF:DE:5D:0F:9E:3A Fingerprint (SHA1): 83:5E:1B:17:6F:87:8B:46:78:A3:95:D5:17:F4:97:93:D0:6F:75:A6 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #5166: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #5167: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132743 (0x671f987) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 18:57:04 2016 Not After : Fri Jan 08 18:57:04 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:df:72:32:e2:93:fa:2e:32:14:74:93:d2:7e:56:a1: 95:bc:25:de:e3:56:d1:3c:10:7f:b8:d9:3e:12:8d:c8: b0:84:d5:cf:b3:ab:73:a0:47:1e:64:0e:88:18:6d:a3: cf:f1:92:2e:54:84:fd:af:9d:58:e2:ca:f1:41:29:56: 63:99:bd:77:24:fd:e3:ac:5d:04:b5:7c:42:99:ce:fa: 7d:f8:5a:70:b0:29:84:e4:e1:40:29:b3:fb:5f:64:bb: 37:78:f2:50:ad:da:19:66:55:69:d4:59:2c:77:b8:49: 2b:d1:5c:16:ad:1e:1e:01:67:cc:50:c4:8e:0a:b7:f9: ca:78:f6:33:06:08:e1:28:e0:8e:1e:2c:f1:56:92:58: 2d:45:01:57:6d:fb:e4:bf:49:78:f9:92:17:e5:35:6a: dd:90:d1:5a:41:4c:c7:cf:c2:58:0d:fb:a7:d5:27:91: f3:99:0e:60:f3:54:5e:f5:8e:34:8e:90:bd:af:99:ca: 4d:01:13:3c:a2:2c:22:77:69:dc:40:82:98:6d:77:76: 14:3c:24:e7:fc:09:e0:a8:ac:be:63:06:2c:c6:48:9a: 94:20:f5:e1:d0:95:11:a4:91:5d:1d:f3:8a:58:31:20: e4:60:41:43:f4:6c:06:d1:23:60:ba:5e:ee:c8:76:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:22:53:e0:c7:01:27:e7:53:5e:c7:9a:32:5f:11:4f: b1:7e:50:2d:17:b8:a3:ff:91:b2:0f:8e:a2:b8:ef:be: 88:82:9d:77:47:fe:2e:63:8f:f3:13:34:f9:55:d5:3a: 5b:02:94:18:1e:bc:b3:07:ab:da:07:4d:05:f5:5d:18: 75:30:6c:ca:68:24:a8:2d:62:24:83:2d:db:fb:07:c6: 78:42:cb:c5:05:be:03:b9:c6:ee:0e:c8:0b:49:40:12: 13:d9:24:49:3a:6d:ab:8d:52:8b:68:22:44:ba:3d:63: ec:34:f4:9f:34:de:b4:a4:ef:3c:18:93:af:ac:f8:44: 73:16:1d:99:73:22:47:e2:48:41:ff:a5:4b:97:b8:52: 2b:de:81:22:a2:7b:7c:3a:fa:a6:fb:d9:f8:db:58:21: 7e:84:09:ce:88:e4:4c:f4:1f:7e:68:73:9d:2a:3d:d5: 24:4e:b6:05:27:80:d2:a7:2a:f4:a7:06:24:93:9d:30: 0b:32:23:41:f6:20:91:dc:f9:8d:81:34:57:c0:dc:6a: 8f:d4:c5:47:e7:5c:ae:84:4e:bd:ce:e6:03:5e:34:b1: 6e:1e:69:5e:20:0e:8f:39:6c:fb:e0:8c:d6:22:ec:25: e6:a2:e9:f5:66:82:46:80:1f:96:05:02:62:e8:25:a4 Fingerprint (SHA-256): 94:72:1C:A1:08:96:63:1F:27:E5:90:E3:BB:C1:59:41:EF:D1:E7:04:98:8B:F9:2C:8B:EE:DF:DE:5D:0F:9E:3A Fingerprint (SHA1): 83:5E:1B:17:6F:87:8B:46:78:A3:95:D5:17:F4:97:93:D0:6F:75:A6 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #5168: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #5169: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #5170: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132747 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5171: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #5172: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5173: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5174: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108132748 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5175: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5176: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5177: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5178: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108132749 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5179: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5180: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5181: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5182: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 108132750 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5183: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5184: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #5185: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132751 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5186: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #5187: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #5188: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5189: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 108132752 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5190: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5191: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5192: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5193: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 108132753 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5194: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5195: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #5196: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #5197: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #5198: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132747 (0x671f98b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 18:58:29 2016 Not After : Fri Jan 08 18:58:29 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:2a:f9:9d:8b:1c:19:39:1c:ab:97:31:36:39:dc:42: df:08:ec:ae:fd:e2:e6:67:e4:22:c0:4c:93:45:51:46: c4:41:bd:fa:b5:09:12:bb:98:83:44:52:91:a9:7b:eb: 85:c6:fa:9b:80:d5:ce:11:4c:82:11:69:29:4a:f1:4b: 48:b4:c8:f6:da:88:4a:9e:6d:2d:0a:7e:a7:41:23:c4: 31:79:d6:df:d2:eb:34:26:42:b5:16:01:c1:56:ee:f6: ec:9c:b1:03:88:5e:15:4c:e7:31:07:88:63:dc:9f:00: e4:e3:23:de:cf:16:33:58:08:5b:3c:b6:70:36:f5:9a: 3f:8a:dc:d8:6c:24:19:b6:0d:99:5e:69:08:10:b1:aa: 81:ef:9f:97:c4:a3:7c:e1:21:a8:56:ac:86:f6:07:06: 99:db:ef:0d:9d:30:0f:4e:51:b7:49:9c:2b:0e:79:e2: 76:26:b1:36:50:7c:03:bd:c5:fa:c2:e8:75:18:3a:98: d7:3f:e5:55:47:70:ac:15:65:69:b5:48:8a:63:af:f5: ab:3c:6d:e0:17:07:90:60:83:5b:9c:c2:80:de:e8:2d: 18:d9:db:9a:83:79:69:e6:47:7a:62:3c:a9:b5:8c:a6: e0:66:c7:28:e7:de:5f:8e:40:26:ee:36:c6:35:17:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bb:36:5a:2c:b2:99:7d:eb:8b:f2:98:40:24:7e:0e:b6: 4a:f0:1e:1e:2f:6f:35:d9:77:98:fa:3b:34:3b:95:21: 4e:aa:8c:ee:b7:66:7f:27:aa:aa:13:24:9f:e0:57:9e: 91:5f:ef:a0:be:10:1f:45:7d:05:e5:67:ad:bd:1a:15: 91:f7:63:04:40:78:7f:ee:99:7d:c9:c3:45:13:2a:b8: b8:4d:78:a0:22:5a:9e:fc:6c:f5:94:c6:66:4f:d9:c5: d8:63:4e:b3:93:69:90:c8:a9:14:71:cd:9f:b5:24:c9: 34:2b:07:4c:a6:39:67:6b:1d:74:d0:89:ab:c9:6b:48: 85:40:a1:2a:45:04:1c:01:75:7b:b5:f0:14:40:52:35: 6b:3f:9f:af:48:ba:04:c1:df:f4:25:ae:f2:10:73:61: 2d:b6:3f:97:ba:da:23:c6:11:eb:19:57:f9:87:10:72: 3d:42:e3:7a:95:39:b2:ac:4d:a5:79:a6:8e:dc:e9:25: 2d:b3:f6:4e:31:76:5d:b0:32:45:d7:7f:29:67:d2:fa: 75:29:21:fe:87:60:75:3a:fa:05:30:c8:0b:fd:97:d2: 1b:0d:1e:73:9a:99:cd:73:c9:ab:85:7e:34:d6:ac:4f: bf:d5:c1:a2:04:53:65:50:63:2c:c1:73:21:63:87:5a Fingerprint (SHA-256): A1:AE:28:C8:BC:48:96:E2:0F:9D:2A:C1:20:9F:0F:ED:E4:1A:24:F1:09:B6:69:13:D3:32:96:A0:CA:89:58:94 Fingerprint (SHA1): EC:69:A0:63:57:C7:E7:4D:40:FE:CD:57:1E:3E:10:B1:59:28:85:0A Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5199: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132749 (0x671f98d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 18:58:52 2016 Not After : Fri Jan 08 18:58:52 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:1c:3e:49:27:10:1a:4f:d8:c5:26:ff:d7:f3:fa:c6: d5:6f:9e:b0:80:35:c1:50:f4:86:9e:b5:6b:d0:f2:33: 19:46:7f:8b:c3:40:3f:64:22:70:ef:61:5b:23:81:ff: 96:60:0c:5d:06:6f:40:b1:45:52:26:82:3e:b1:6e:4f: 55:2b:f5:2f:38:48:e8:a5:e5:d4:49:37:f6:ed:e6:83: cc:2d:c2:4d:db:5d:42:2a:55:24:cc:65:5c:4f:96:98: 4c:57:49:07:7e:13:ed:96:d5:8a:6b:39:3c:43:2e:83: 3f:ce:dc:19:59:fa:6f:a0:04:85:0c:4d:c0:69:ff:cc: 9e:c1:e4:16:31:6c:c5:d1:48:6a:30:7b:41:db:2c:c9: 9e:14:4b:05:36:88:0f:2f:1c:05:ed:d5:ed:c1:46:ed: e3:d4:6e:e2:d9:1c:fb:3f:28:d9:de:d0:39:7c:b4:f6: 59:8c:a1:90:74:09:0b:5f:bb:e4:61:07:96:a5:01:19: ae:c7:0c:fc:51:e7:83:e8:8e:bb:25:ba:93:aa:d9:7f: 1e:38:aa:87:27:e0:64:ba:53:13:90:5a:25:02:f9:48: b1:7e:15:ae:3f:23:3b:32:6f:2a:cd:18:8d:a6:9e:b8: 5a:34:42:73:ad:3e:71:f9:97:6a:ba:67:5e:aa:27:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ad:97:76:8d:17:91:51:30:1a:66:91:68:da:5c:ad:8f: 5c:fd:ca:15:73:ca:8e:fe:4a:e8:33:3a:06:b9:96:7d: 0e:a5:3f:80:b3:7c:9f:66:93:97:16:8d:9f:24:24:16: 17:6d:4a:4f:f4:ec:48:67:bd:ef:93:7c:0e:4c:f2:24: 26:8a:7a:ca:dd:92:02:54:74:ca:83:a1:7a:57:82:2a: a7:c1:fe:fe:c3:40:de:35:98:41:06:d8:82:22:91:40: a1:f0:6e:fc:0c:17:1d:b5:27:a7:44:09:ad:7d:2e:82: af:87:0a:d9:8d:8d:ba:99:7f:d7:63:fa:50:0f:72:e4: 97:06:0d:7f:2d:8f:73:d2:e3:14:9a:54:ad:1b:83:8a: 8c:83:d9:9c:11:c8:d0:37:2d:af:c8:f6:8b:86:28:5b: 12:28:27:45:22:be:69:ed:e6:a3:e8:7d:21:f2:2e:e4: b5:57:cd:90:fc:12:35:64:6a:fc:aa:2b:50:9c:4b:01: 79:d2:36:4a:ec:82:44:f6:f4:63:90:2b:2b:d3:51:e3: fc:0b:76:92:ac:71:ed:43:6c:87:f6:0c:0b:80:cc:3a: e6:98:ec:df:cc:d0:b4:39:7f:55:63:2d:9d:b1:f0:81: 10:0a:65:5a:dc:96:45:aa:b8:07:b1:98:aa:7b:06:55 Fingerprint (SHA-256): 55:9E:C3:BD:F6:10:20:A7:60:8C:3D:63:DC:87:C1:D2:4B:FB:1A:C7:8C:28:A5:6E:A6:C8:39:73:D2:31:99:10 Fingerprint (SHA1): A3:94:59:F4:0E:DB:2A:22:C7:06:08:66:0C:C3:57:31:75:50:72:CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #5200: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132747 (0x671f98b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 18:58:29 2016 Not After : Fri Jan 08 18:58:29 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:2a:f9:9d:8b:1c:19:39:1c:ab:97:31:36:39:dc:42: df:08:ec:ae:fd:e2:e6:67:e4:22:c0:4c:93:45:51:46: c4:41:bd:fa:b5:09:12:bb:98:83:44:52:91:a9:7b:eb: 85:c6:fa:9b:80:d5:ce:11:4c:82:11:69:29:4a:f1:4b: 48:b4:c8:f6:da:88:4a:9e:6d:2d:0a:7e:a7:41:23:c4: 31:79:d6:df:d2:eb:34:26:42:b5:16:01:c1:56:ee:f6: ec:9c:b1:03:88:5e:15:4c:e7:31:07:88:63:dc:9f:00: e4:e3:23:de:cf:16:33:58:08:5b:3c:b6:70:36:f5:9a: 3f:8a:dc:d8:6c:24:19:b6:0d:99:5e:69:08:10:b1:aa: 81:ef:9f:97:c4:a3:7c:e1:21:a8:56:ac:86:f6:07:06: 99:db:ef:0d:9d:30:0f:4e:51:b7:49:9c:2b:0e:79:e2: 76:26:b1:36:50:7c:03:bd:c5:fa:c2:e8:75:18:3a:98: d7:3f:e5:55:47:70:ac:15:65:69:b5:48:8a:63:af:f5: ab:3c:6d:e0:17:07:90:60:83:5b:9c:c2:80:de:e8:2d: 18:d9:db:9a:83:79:69:e6:47:7a:62:3c:a9:b5:8c:a6: e0:66:c7:28:e7:de:5f:8e:40:26:ee:36:c6:35:17:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bb:36:5a:2c:b2:99:7d:eb:8b:f2:98:40:24:7e:0e:b6: 4a:f0:1e:1e:2f:6f:35:d9:77:98:fa:3b:34:3b:95:21: 4e:aa:8c:ee:b7:66:7f:27:aa:aa:13:24:9f:e0:57:9e: 91:5f:ef:a0:be:10:1f:45:7d:05:e5:67:ad:bd:1a:15: 91:f7:63:04:40:78:7f:ee:99:7d:c9:c3:45:13:2a:b8: b8:4d:78:a0:22:5a:9e:fc:6c:f5:94:c6:66:4f:d9:c5: d8:63:4e:b3:93:69:90:c8:a9:14:71:cd:9f:b5:24:c9: 34:2b:07:4c:a6:39:67:6b:1d:74:d0:89:ab:c9:6b:48: 85:40:a1:2a:45:04:1c:01:75:7b:b5:f0:14:40:52:35: 6b:3f:9f:af:48:ba:04:c1:df:f4:25:ae:f2:10:73:61: 2d:b6:3f:97:ba:da:23:c6:11:eb:19:57:f9:87:10:72: 3d:42:e3:7a:95:39:b2:ac:4d:a5:79:a6:8e:dc:e9:25: 2d:b3:f6:4e:31:76:5d:b0:32:45:d7:7f:29:67:d2:fa: 75:29:21:fe:87:60:75:3a:fa:05:30:c8:0b:fd:97:d2: 1b:0d:1e:73:9a:99:cd:73:c9:ab:85:7e:34:d6:ac:4f: bf:d5:c1:a2:04:53:65:50:63:2c:c1:73:21:63:87:5a Fingerprint (SHA-256): A1:AE:28:C8:BC:48:96:E2:0F:9D:2A:C1:20:9F:0F:ED:E4:1A:24:F1:09:B6:69:13:D3:32:96:A0:CA:89:58:94 Fingerprint (SHA1): EC:69:A0:63:57:C7:E7:4D:40:FE:CD:57:1E:3E:10:B1:59:28:85:0A Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5201: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #5202: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132747 (0x671f98b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 18:58:29 2016 Not After : Fri Jan 08 18:58:29 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:2a:f9:9d:8b:1c:19:39:1c:ab:97:31:36:39:dc:42: df:08:ec:ae:fd:e2:e6:67:e4:22:c0:4c:93:45:51:46: c4:41:bd:fa:b5:09:12:bb:98:83:44:52:91:a9:7b:eb: 85:c6:fa:9b:80:d5:ce:11:4c:82:11:69:29:4a:f1:4b: 48:b4:c8:f6:da:88:4a:9e:6d:2d:0a:7e:a7:41:23:c4: 31:79:d6:df:d2:eb:34:26:42:b5:16:01:c1:56:ee:f6: ec:9c:b1:03:88:5e:15:4c:e7:31:07:88:63:dc:9f:00: e4:e3:23:de:cf:16:33:58:08:5b:3c:b6:70:36:f5:9a: 3f:8a:dc:d8:6c:24:19:b6:0d:99:5e:69:08:10:b1:aa: 81:ef:9f:97:c4:a3:7c:e1:21:a8:56:ac:86:f6:07:06: 99:db:ef:0d:9d:30:0f:4e:51:b7:49:9c:2b:0e:79:e2: 76:26:b1:36:50:7c:03:bd:c5:fa:c2:e8:75:18:3a:98: d7:3f:e5:55:47:70:ac:15:65:69:b5:48:8a:63:af:f5: ab:3c:6d:e0:17:07:90:60:83:5b:9c:c2:80:de:e8:2d: 18:d9:db:9a:83:79:69:e6:47:7a:62:3c:a9:b5:8c:a6: e0:66:c7:28:e7:de:5f:8e:40:26:ee:36:c6:35:17:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bb:36:5a:2c:b2:99:7d:eb:8b:f2:98:40:24:7e:0e:b6: 4a:f0:1e:1e:2f:6f:35:d9:77:98:fa:3b:34:3b:95:21: 4e:aa:8c:ee:b7:66:7f:27:aa:aa:13:24:9f:e0:57:9e: 91:5f:ef:a0:be:10:1f:45:7d:05:e5:67:ad:bd:1a:15: 91:f7:63:04:40:78:7f:ee:99:7d:c9:c3:45:13:2a:b8: b8:4d:78:a0:22:5a:9e:fc:6c:f5:94:c6:66:4f:d9:c5: d8:63:4e:b3:93:69:90:c8:a9:14:71:cd:9f:b5:24:c9: 34:2b:07:4c:a6:39:67:6b:1d:74:d0:89:ab:c9:6b:48: 85:40:a1:2a:45:04:1c:01:75:7b:b5:f0:14:40:52:35: 6b:3f:9f:af:48:ba:04:c1:df:f4:25:ae:f2:10:73:61: 2d:b6:3f:97:ba:da:23:c6:11:eb:19:57:f9:87:10:72: 3d:42:e3:7a:95:39:b2:ac:4d:a5:79:a6:8e:dc:e9:25: 2d:b3:f6:4e:31:76:5d:b0:32:45:d7:7f:29:67:d2:fa: 75:29:21:fe:87:60:75:3a:fa:05:30:c8:0b:fd:97:d2: 1b:0d:1e:73:9a:99:cd:73:c9:ab:85:7e:34:d6:ac:4f: bf:d5:c1:a2:04:53:65:50:63:2c:c1:73:21:63:87:5a Fingerprint (SHA-256): A1:AE:28:C8:BC:48:96:E2:0F:9D:2A:C1:20:9F:0F:ED:E4:1A:24:F1:09:B6:69:13:D3:32:96:A0:CA:89:58:94 Fingerprint (SHA1): EC:69:A0:63:57:C7:E7:4D:40:FE:CD:57:1E:3E:10:B1:59:28:85:0A Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5203: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132749 (0x671f98d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 18:58:52 2016 Not After : Fri Jan 08 18:58:52 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:1c:3e:49:27:10:1a:4f:d8:c5:26:ff:d7:f3:fa:c6: d5:6f:9e:b0:80:35:c1:50:f4:86:9e:b5:6b:d0:f2:33: 19:46:7f:8b:c3:40:3f:64:22:70:ef:61:5b:23:81:ff: 96:60:0c:5d:06:6f:40:b1:45:52:26:82:3e:b1:6e:4f: 55:2b:f5:2f:38:48:e8:a5:e5:d4:49:37:f6:ed:e6:83: cc:2d:c2:4d:db:5d:42:2a:55:24:cc:65:5c:4f:96:98: 4c:57:49:07:7e:13:ed:96:d5:8a:6b:39:3c:43:2e:83: 3f:ce:dc:19:59:fa:6f:a0:04:85:0c:4d:c0:69:ff:cc: 9e:c1:e4:16:31:6c:c5:d1:48:6a:30:7b:41:db:2c:c9: 9e:14:4b:05:36:88:0f:2f:1c:05:ed:d5:ed:c1:46:ed: e3:d4:6e:e2:d9:1c:fb:3f:28:d9:de:d0:39:7c:b4:f6: 59:8c:a1:90:74:09:0b:5f:bb:e4:61:07:96:a5:01:19: ae:c7:0c:fc:51:e7:83:e8:8e:bb:25:ba:93:aa:d9:7f: 1e:38:aa:87:27:e0:64:ba:53:13:90:5a:25:02:f9:48: b1:7e:15:ae:3f:23:3b:32:6f:2a:cd:18:8d:a6:9e:b8: 5a:34:42:73:ad:3e:71:f9:97:6a:ba:67:5e:aa:27:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ad:97:76:8d:17:91:51:30:1a:66:91:68:da:5c:ad:8f: 5c:fd:ca:15:73:ca:8e:fe:4a:e8:33:3a:06:b9:96:7d: 0e:a5:3f:80:b3:7c:9f:66:93:97:16:8d:9f:24:24:16: 17:6d:4a:4f:f4:ec:48:67:bd:ef:93:7c:0e:4c:f2:24: 26:8a:7a:ca:dd:92:02:54:74:ca:83:a1:7a:57:82:2a: a7:c1:fe:fe:c3:40:de:35:98:41:06:d8:82:22:91:40: a1:f0:6e:fc:0c:17:1d:b5:27:a7:44:09:ad:7d:2e:82: af:87:0a:d9:8d:8d:ba:99:7f:d7:63:fa:50:0f:72:e4: 97:06:0d:7f:2d:8f:73:d2:e3:14:9a:54:ad:1b:83:8a: 8c:83:d9:9c:11:c8:d0:37:2d:af:c8:f6:8b:86:28:5b: 12:28:27:45:22:be:69:ed:e6:a3:e8:7d:21:f2:2e:e4: b5:57:cd:90:fc:12:35:64:6a:fc:aa:2b:50:9c:4b:01: 79:d2:36:4a:ec:82:44:f6:f4:63:90:2b:2b:d3:51:e3: fc:0b:76:92:ac:71:ed:43:6c:87:f6:0c:0b:80:cc:3a: e6:98:ec:df:cc:d0:b4:39:7f:55:63:2d:9d:b1:f0:81: 10:0a:65:5a:dc:96:45:aa:b8:07:b1:98:aa:7b:06:55 Fingerprint (SHA-256): 55:9E:C3:BD:F6:10:20:A7:60:8C:3D:63:DC:87:C1:D2:4B:FB:1A:C7:8C:28:A5:6E:A6:C8:39:73:D2:31:99:10 Fingerprint (SHA1): A3:94:59:F4:0E:DB:2A:22:C7:06:08:66:0C:C3:57:31:75:50:72:CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #5204: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #5205: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #5206: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #5207: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132747 (0x671f98b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 18:58:29 2016 Not After : Fri Jan 08 18:58:29 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:2a:f9:9d:8b:1c:19:39:1c:ab:97:31:36:39:dc:42: df:08:ec:ae:fd:e2:e6:67:e4:22:c0:4c:93:45:51:46: c4:41:bd:fa:b5:09:12:bb:98:83:44:52:91:a9:7b:eb: 85:c6:fa:9b:80:d5:ce:11:4c:82:11:69:29:4a:f1:4b: 48:b4:c8:f6:da:88:4a:9e:6d:2d:0a:7e:a7:41:23:c4: 31:79:d6:df:d2:eb:34:26:42:b5:16:01:c1:56:ee:f6: ec:9c:b1:03:88:5e:15:4c:e7:31:07:88:63:dc:9f:00: e4:e3:23:de:cf:16:33:58:08:5b:3c:b6:70:36:f5:9a: 3f:8a:dc:d8:6c:24:19:b6:0d:99:5e:69:08:10:b1:aa: 81:ef:9f:97:c4:a3:7c:e1:21:a8:56:ac:86:f6:07:06: 99:db:ef:0d:9d:30:0f:4e:51:b7:49:9c:2b:0e:79:e2: 76:26:b1:36:50:7c:03:bd:c5:fa:c2:e8:75:18:3a:98: d7:3f:e5:55:47:70:ac:15:65:69:b5:48:8a:63:af:f5: ab:3c:6d:e0:17:07:90:60:83:5b:9c:c2:80:de:e8:2d: 18:d9:db:9a:83:79:69:e6:47:7a:62:3c:a9:b5:8c:a6: e0:66:c7:28:e7:de:5f:8e:40:26:ee:36:c6:35:17:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bb:36:5a:2c:b2:99:7d:eb:8b:f2:98:40:24:7e:0e:b6: 4a:f0:1e:1e:2f:6f:35:d9:77:98:fa:3b:34:3b:95:21: 4e:aa:8c:ee:b7:66:7f:27:aa:aa:13:24:9f:e0:57:9e: 91:5f:ef:a0:be:10:1f:45:7d:05:e5:67:ad:bd:1a:15: 91:f7:63:04:40:78:7f:ee:99:7d:c9:c3:45:13:2a:b8: b8:4d:78:a0:22:5a:9e:fc:6c:f5:94:c6:66:4f:d9:c5: d8:63:4e:b3:93:69:90:c8:a9:14:71:cd:9f:b5:24:c9: 34:2b:07:4c:a6:39:67:6b:1d:74:d0:89:ab:c9:6b:48: 85:40:a1:2a:45:04:1c:01:75:7b:b5:f0:14:40:52:35: 6b:3f:9f:af:48:ba:04:c1:df:f4:25:ae:f2:10:73:61: 2d:b6:3f:97:ba:da:23:c6:11:eb:19:57:f9:87:10:72: 3d:42:e3:7a:95:39:b2:ac:4d:a5:79:a6:8e:dc:e9:25: 2d:b3:f6:4e:31:76:5d:b0:32:45:d7:7f:29:67:d2:fa: 75:29:21:fe:87:60:75:3a:fa:05:30:c8:0b:fd:97:d2: 1b:0d:1e:73:9a:99:cd:73:c9:ab:85:7e:34:d6:ac:4f: bf:d5:c1:a2:04:53:65:50:63:2c:c1:73:21:63:87:5a Fingerprint (SHA-256): A1:AE:28:C8:BC:48:96:E2:0F:9D:2A:C1:20:9F:0F:ED:E4:1A:24:F1:09:B6:69:13:D3:32:96:A0:CA:89:58:94 Fingerprint (SHA1): EC:69:A0:63:57:C7:E7:4D:40:FE:CD:57:1E:3E:10:B1:59:28:85:0A Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5208: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132751 (0x671f98f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Jan 08 18:59:01 2016 Not After : Fri Jan 08 18:59:01 2066 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:dc:fe:da:35:21:15:e3:1e:74:89:ce:e9:6a:f1:54: 71:c2:6b:7f:dd:ff:c3:96:9b:68:24:48:ea:b0:7f:79: ef:ac:5a:e8:88:8d:01:a0:58:c6:b9:91:07:34:7a:23: 12:97:de:c8:77:19:3f:7e:2e:dc:3c:63:b1:f1:2c:1c: 3d:dd:14:75:7e:9f:41:89:1e:f6:74:14:71:0c:f8:77: 4f:77:5b:49:e6:04:01:6a:ba:5f:05:9d:97:c6:94:39: 2f:13:9d:6a:09:4c:36:84:9e:34:14:a8:70:5c:49:f0: d6:dd:c4:38:f7:4f:cc:98:77:18:6a:93:c4:c5:aa:86: c2:dd:af:db:58:8f:a2:6d:f2:23:2c:3d:08:6f:74:a2: 30:c7:d6:bb:68:7e:46:66:cd:10:01:4d:0e:8b:46:82: 1b:34:06:ec:e6:72:98:16:0a:cb:47:4b:2c:18:ba:94: 1a:b1:c7:61:98:f5:75:19:66:e5:c0:ed:b8:fd:3b:29: 62:ab:86:fd:57:5e:5e:6e:95:10:23:92:ea:3e:71:21: 10:e5:f1:31:44:da:5d:c9:c5:91:01:c4:12:8b:9b:47: 0b:be:76:88:68:97:38:4b:d6:4f:f6:cf:d2:08:05:c4: be:e0:18:19:4e:9f:62:80:e3:66:05:ff:3a:3b:55:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:6e:ba:26:95:44:46:cd:e4:47:fb:f5:b3:c3:8a:7b: 29:cf:f9:3d:e5:ad:a6:83:37:8f:18:0c:b3:45:20:f6: 3f:e8:c9:31:e3:66:1e:3d:a9:3b:fa:ff:90:30:a5:76: f3:7c:b2:55:c1:05:09:c7:bf:b0:88:b6:7a:2c:ad:0f: d5:37:43:1f:0a:8e:de:54:8d:2b:1a:ae:4c:71:3b:21: a5:39:55:fb:ed:af:d2:64:79:00:ef:ff:61:ad:cb:4f: 5c:41:51:b6:eb:cb:84:c9:24:85:1f:42:eb:91:0d:f1: 8d:78:47:06:79:b8:fa:4e:00:ea:de:bd:8e:f6:51:dd: c8:fb:05:a7:0d:9c:0f:d5:f8:87:ae:da:c7:4e:ba:e6: f0:83:27:f4:9a:ff:89:e8:8c:f7:05:f7:27:59:d1:2f: 4a:ef:da:81:6b:38:ae:03:06:4f:50:1c:d8:6f:27:31: 27:6c:c5:d7:66:ef:8f:fb:55:9b:41:50:ab:5a:d8:79: 2f:56:e7:ac:7e:6c:c1:c2:c0:c6:56:41:02:ba:18:0c: 2b:7d:1d:12:76:ed:07:e4:3f:7e:33:29:53:b1:10:17: 7f:28:3d:61:92:a3:0c:7b:f5:00:31:eb:3e:79:f2:fe: 4c:e1:78:a7:97:b0:70:7e:5c:4a:0f:ee:e3:64:07:b7 Fingerprint (SHA-256): 14:7F:34:FC:A8:0A:22:5A:8D:23:34:A2:8A:95:D4:C6:16:AC:79:7A:BF:4E:04:74:A1:FF:FA:9C:9B:55:2F:EC Fingerprint (SHA1): E8:D6:14:D7:82:FF:FB:24:6C:D2:0E:3D:91:C1:21:63:E0:63:98:C2 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #5209: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132747 (0x671f98b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 18:58:29 2016 Not After : Fri Jan 08 18:58:29 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:2a:f9:9d:8b:1c:19:39:1c:ab:97:31:36:39:dc:42: df:08:ec:ae:fd:e2:e6:67:e4:22:c0:4c:93:45:51:46: c4:41:bd:fa:b5:09:12:bb:98:83:44:52:91:a9:7b:eb: 85:c6:fa:9b:80:d5:ce:11:4c:82:11:69:29:4a:f1:4b: 48:b4:c8:f6:da:88:4a:9e:6d:2d:0a:7e:a7:41:23:c4: 31:79:d6:df:d2:eb:34:26:42:b5:16:01:c1:56:ee:f6: ec:9c:b1:03:88:5e:15:4c:e7:31:07:88:63:dc:9f:00: e4:e3:23:de:cf:16:33:58:08:5b:3c:b6:70:36:f5:9a: 3f:8a:dc:d8:6c:24:19:b6:0d:99:5e:69:08:10:b1:aa: 81:ef:9f:97:c4:a3:7c:e1:21:a8:56:ac:86:f6:07:06: 99:db:ef:0d:9d:30:0f:4e:51:b7:49:9c:2b:0e:79:e2: 76:26:b1:36:50:7c:03:bd:c5:fa:c2:e8:75:18:3a:98: d7:3f:e5:55:47:70:ac:15:65:69:b5:48:8a:63:af:f5: ab:3c:6d:e0:17:07:90:60:83:5b:9c:c2:80:de:e8:2d: 18:d9:db:9a:83:79:69:e6:47:7a:62:3c:a9:b5:8c:a6: e0:66:c7:28:e7:de:5f:8e:40:26:ee:36:c6:35:17:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bb:36:5a:2c:b2:99:7d:eb:8b:f2:98:40:24:7e:0e:b6: 4a:f0:1e:1e:2f:6f:35:d9:77:98:fa:3b:34:3b:95:21: 4e:aa:8c:ee:b7:66:7f:27:aa:aa:13:24:9f:e0:57:9e: 91:5f:ef:a0:be:10:1f:45:7d:05:e5:67:ad:bd:1a:15: 91:f7:63:04:40:78:7f:ee:99:7d:c9:c3:45:13:2a:b8: b8:4d:78:a0:22:5a:9e:fc:6c:f5:94:c6:66:4f:d9:c5: d8:63:4e:b3:93:69:90:c8:a9:14:71:cd:9f:b5:24:c9: 34:2b:07:4c:a6:39:67:6b:1d:74:d0:89:ab:c9:6b:48: 85:40:a1:2a:45:04:1c:01:75:7b:b5:f0:14:40:52:35: 6b:3f:9f:af:48:ba:04:c1:df:f4:25:ae:f2:10:73:61: 2d:b6:3f:97:ba:da:23:c6:11:eb:19:57:f9:87:10:72: 3d:42:e3:7a:95:39:b2:ac:4d:a5:79:a6:8e:dc:e9:25: 2d:b3:f6:4e:31:76:5d:b0:32:45:d7:7f:29:67:d2:fa: 75:29:21:fe:87:60:75:3a:fa:05:30:c8:0b:fd:97:d2: 1b:0d:1e:73:9a:99:cd:73:c9:ab:85:7e:34:d6:ac:4f: bf:d5:c1:a2:04:53:65:50:63:2c:c1:73:21:63:87:5a Fingerprint (SHA-256): A1:AE:28:C8:BC:48:96:E2:0F:9D:2A:C1:20:9F:0F:ED:E4:1A:24:F1:09:B6:69:13:D3:32:96:A0:CA:89:58:94 Fingerprint (SHA1): EC:69:A0:63:57:C7:E7:4D:40:FE:CD:57:1E:3E:10:B1:59:28:85:0A Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5210: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #5211: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #5212: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #5213: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #5214: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #5215: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132752 (0x671f990) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Jan 08 18:59:07 2016 Not After : Fri Jan 08 18:59:07 2021 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:13:fe:2a:b8:de:c1:9d:9d:8b:b8:2e:70:d3:81:6e: dc:b0:36:c8:ac:25:22:4c:ad:70:f8:81:7b:66:0b:c3: 1c:e0:4e:b1:dc:d7:92:29:c8:d7:24:22:8f:1b:f1:37: b0:fd:64:0c:63:e0:d9:5e:cb:d2:cd:44:e2:33:ba:4f: 86:07:e9:6d:6c:b5:f1:86:0b:3e:72:47:d1:be:9d:0c: 79:90:cb:a1:d2:c0:72:3b:ba:bd:db:2a:dd:b7:3b:a7: 70:b1:7e:77:d3:21:29:cb:79:d8:a2:e4:2f:bb:36:cf: 05:81:e4:91:89:99:3a:1b:fb:52:54:77:9b:39:7c:b5: a7:cf:36:4f:a4:d5:bc:16:38:d9:bd:73:bb:8d:b6:9a: 08:c6:92:85:de:d5:51:1c:3b:22:65:31:83:ff:44:9c: 12:3e:9e:72:c5:7c:9e:eb:a3:80:bd:d7:d4:ee:58:2e: 30:98:94:90:e5:42:30:05:c2:09:cd:a8:ac:40:05:80: be:a4:f5:1c:7a:d2:b3:5e:c9:8a:c0:25:3e:8e:fa:fc: 47:74:2a:3a:be:2a:82:a6:e6:39:cb:5a:12:de:86:ad: 60:d2:fe:70:2c:62:c3:a0:d1:91:5e:b4:9b:48:e6:dd: 36:88:ef:be:6d:fb:ac:1b:01:10:ff:fb:ca:d7:87:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 80:0e:ac:e4:fe:d4:82:34:99:68:6a:e2:d0:d6:b7:78: 39:f7:f6:19:3c:f5:f6:59:fc:1f:ca:5f:08:1d:e7:33: 66:2a:96:be:52:54:36:63:37:9b:cb:22:f9:00:e1:19: 04:3a:91:7a:b0:26:5b:39:91:fe:81:7a:ad:d7:1e:e6: 6d:4b:c3:2e:d1:6f:dc:e7:36:0a:bf:b2:96:f3:a2:1a: 9c:6e:e5:af:3b:6c:7a:b8:b2:a2:0b:0e:13:d3:74:46: e3:99:67:f6:d9:6d:92:6a:33:a3:b0:70:39:b6:09:5e: 37:3d:31:67:c3:bd:d6:14:29:dc:fb:a3:7c:a5:16:a1: 55:ac:71:fc:dd:c8:80:dc:4e:30:b1:93:68:24:d0:c1: 8b:ed:11:19:8e:14:e9:a0:1e:f6:86:e3:b1:60:76:dc: b8:3b:66:05:49:1b:be:0d:ea:4c:d6:df:3b:c6:52:15: a2:e5:c9:5e:6a:f2:f4:e8:13:54:a5:aa:19:42:c3:62: 20:cf:01:07:9e:6b:7d:e9:8d:e2:7e:05:45:75:23:d9: 7e:35:7f:51:5e:a2:27:88:ac:c5:bc:98:34:5a:0a:6a: 16:94:cf:4b:7f:10:88:00:53:e8:06:02:65:14:de:cd: 12:fb:66:6d:04:aa:14:02:c1:c0:7b:e4:55:b7:46:7a Fingerprint (SHA-256): 1A:9E:63:CE:96:27:48:2F:12:AD:B3:4B:F3:89:81:E6:32:53:65:2E:62:3D:C4:63:11:B4:E3:9B:37:32:10:3E Fingerprint (SHA1): 5C:E1:57:55:69:06:63:3C:8B:EF:58:03:3C:15:F2:16:9A:B8:D4:84 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #5216: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #5217: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #5218: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #5219: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #5220: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #5221: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #5222: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #5223: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #5224: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #5225: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #5226: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #5227: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #5228: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #5229: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #5230: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #5231: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #5232: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #5233: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #5234: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #5235: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #5236: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #5237: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #5238: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #5239: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED trying to kill httpserv with PID 27668 at Fri Jan 8 13:59:46 EST 2016 kill -USR1 27668 httpserv: normal termination httpserv -b -p 9169 2>/dev/null; httpserv with PID 27668 killed at Fri Jan 8 13:59:46 EST 2016 httpserv starting at Fri Jan 8 13:59:46 EST 2016 httpserv -D -p 9169 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O get-unknown -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/aiahttp/http_pid.27064 & trying to connect to httpserv at Fri Jan 8 13:59:46 EST 2016 tstclnt -p 9169 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to httpserv at Fri Jan 8 13:59:51 EST 2016 tstclnt -p 9169 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #5240: Waiting for Server - FAILED kill -0 10691 >/dev/null 2>/dev/null httpserv with PID 10691 found at Fri Jan 8 13:59:52 EST 2016 httpserv with PID 10691 started at Fri Jan 8 13:59:52 EST 2016 chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #5241: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132754 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5242: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #5243: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #5244: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132755 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5245: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #5246: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #5247: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5248: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108132756 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5249: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5250: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108132757 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5251: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5252: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #5253: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #5254: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5255: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 108132758 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5256: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5257: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5258: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #5259: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #5260: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132755 (0x671f993) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 19:00:03 2016 Not After : Fri Jan 08 19:00:03 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:97:c8:f6:95:19:f9:84:e1:60:f5:1f:5c:84:01:8a: 89:ed:12:5d:0f:d8:d5:40:ea:a2:c6:65:cf:c4:d0:60: e9:00:0e:a7:1d:a5:f9:86:ae:2f:be:36:3c:2f:99:87: a8:4d:3e:9c:f3:f6:bb:9f:dd:b4:1f:bc:45:63:9b:15: d8:00:06:2e:15:4e:83:ea:84:08:96:f0:b9:26:b2:df: f7:ea:92:ef:0a:7c:3a:50:5f:88:96:ff:84:6b:3b:f0: 51:cd:a9:c3:f4:36:39:d9:9f:c5:6c:2b:25:d0:30:6f: cc:bf:c9:6b:e2:cd:ce:33:69:15:8b:e1:49:3e:81:79: f0:ab:39:15:68:6a:ed:a6:b6:d2:bc:c5:32:73:a8:d6: c7:4a:3e:e0:72:c6:fe:a7:13:ba:4a:13:8e:80:9e:47: a6:ff:88:a6:03:34:9c:82:5f:cd:60:6b:fe:45:71:52: 8d:65:47:bb:a7:2d:cb:cd:a6:55:cd:ff:b7:42:a0:a0: 4e:7c:44:6b:28:09:2f:6b:ed:ba:c0:0f:00:6c:97:94: e1:e6:17:b5:2e:75:0d:65:cb:b4:c6:ac:c7:67:5f:32: e3:be:ca:45:fe:bc:0b:9f:ba:4b:e0:ff:89:68:05:87: 37:25:79:27:dc:2a:08:a4:bc:65:55:15:af:f3:56:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:9a:fb:93:14:e5:cf:38:cc:ee:5a:bf:e5:48:0f:39: 05:69:4a:6f:17:97:6d:7a:59:66:57:d3:35:fc:9c:82: 8b:cb:77:ac:39:0a:c8:b6:25:59:b8:f0:5a:e4:8a:eb: e1:5d:19:51:ff:da:99:03:ab:65:81:d4:2f:1a:27:2d: b7:dd:ad:cd:5e:c0:34:ce:7e:45:c7:cd:35:74:67:98: 3a:3b:53:17:5e:94:82:94:ad:ee:1d:0f:88:53:78:8d: 85:78:ef:7d:d1:3e:e8:4e:5b:3c:77:44:5e:bd:cc:b7: 9c:56:9f:ea:0c:f5:f8:90:52:38:40:ca:f2:6a:29:de: a1:fa:62:ea:e1:12:76:12:ac:3d:59:64:33:f9:ad:c0: ba:f5:87:15:f2:8c:cd:e7:8a:b6:57:21:e5:4b:a4:fb: 98:0c:ce:bf:05:e0:b4:80:4b:b6:4a:d3:69:68:09:c4: 79:72:0c:70:fb:48:c7:d2:89:a4:aa:a1:d9:93:b3:fa: 43:19:66:96:35:03:40:fc:b3:34:3e:7c:f1:b0:8d:b1: 0b:08:e7:1a:1d:46:d6:03:14:ed:aa:39:35:a1:26:53: a3:2e:6c:9a:74:74:ca:df:50:3a:21:e5:52:27:19:d8: c4:20:46:36:32:dd:17:20:a8:bc:a2:7b:d0:9c:d8:d3 Fingerprint (SHA-256): 24:83:90:71:1F:E8:B5:76:23:D0:B0:3C:5C:2B:0A:E5:0A:E8:3B:77:CF:76:7B:6A:FF:AA:7D:F2:AD:FA:CF:BF Fingerprint (SHA1): F6:0D:7D:6C:F8:D9:E5:2F:7F:DA:50:CE:EA:E0:7F:0F:DB:5C:E8:27 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5261: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132754 (0x671f992) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 18:59:57 2016 Not After : Fri Jan 08 18:59:57 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:fb:c6:db:cf:f8:ea:2f:e4:8c:88:d1:76:0d:0f:0e: e8:bb:70:c2:b7:e6:85:db:50:33:9e:16:df:1d:cd:20: c2:e0:8c:e1:15:8d:e6:01:60:a0:74:42:d1:03:5c:96: 62:c2:ce:e7:84:49:39:52:e1:1d:e1:1e:58:02:7d:0b: 89:c7:a6:bb:d3:0e:0b:df:2d:d4:a8:0b:af:e1:b9:ac: c9:51:d7:a4:f8:8d:c4:19:af:af:e4:21:f0:d6:0a:69: ff:e1:14:be:60:6a:2c:e3:a7:20:73:70:cf:18:2b:ab: b8:9a:59:75:71:e3:c4:cd:0e:5e:c5:77:95:10:7e:01: 6f:30:9b:e7:87:a4:a4:57:12:f7:74:2f:77:43:2e:cb: f4:01:e4:bc:f8:2e:7f:d5:22:67:30:8f:7c:99:54:d2: 03:9d:e5:a4:b7:7a:8d:3c:e2:0a:26:25:a5:3f:df:2e: fb:6f:bd:ae:8e:af:55:1a:f2:ed:cc:d6:c5:47:16:b8: 9e:b9:3e:27:aa:f4:c8:57:d0:39:2d:6d:70:9f:95:10: 90:af:8d:66:da:c5:15:a9:6a:e5:ee:00:af:6c:8b:d2: ed:00:b4:e8:c7:36:0a:88:6c:08:94:b5:30:9f:58:b1: c0:0d:da:84:6b:1f:bf:35:02:cc:09:f1:86:e1:d5:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a1:90:16:fd:df:09:86:b0:f7:e7:0a:f8:f6:c4:a5:8a: 24:a3:38:4b:81:9c:2f:5c:f3:8a:6f:ae:39:e9:29:76: 07:0c:47:58:ad:c6:16:68:e2:9d:53:9f:94:7e:32:12: 00:1b:58:01:b5:79:fd:d4:30:6d:86:e1:8e:fa:c6:12: 1c:e3:6c:c7:ce:3a:3b:46:78:25:a9:bf:4f:91:21:bc: f3:08:46:ef:41:35:43:62:4b:5d:77:11:db:78:1e:6a: f2:cf:7b:9f:0e:3a:56:2f:30:25:b6:3f:de:36:1f:e9: 6e:cd:7b:3c:7f:c7:22:e6:23:f6:77:01:18:88:12:4d: 4d:87:d4:18:0a:8c:60:27:06:d9:db:6c:f1:38:9c:53: 2f:38:04:48:3a:4f:ef:08:ff:fc:92:0c:62:44:a2:9b: 14:bc:29:fc:9c:d5:c2:af:cc:a6:eb:35:49:f6:a9:b4: a3:15:99:70:48:db:57:57:4d:eb:94:4f:d8:17:72:20: 33:7d:66:02:a0:97:0b:5b:9c:a9:19:3c:bd:0d:b6:6a: b5:dc:61:1f:7e:3b:86:b0:6a:62:9c:27:45:68:26:a6: 14:1c:45:38:c5:4c:13:23:00:c4:b4:75:a3:eb:47:6f: 1a:62:93:b2:4e:74:19:5d:07:3c:26:5a:af:b8:08:f1 Fingerprint (SHA-256): 17:19:D9:F7:76:F1:30:FD:F8:7F:2E:C0:12:86:7C:13:45:05:C2:F1:49:E9:65:63:4E:29:E9:8A:61:A2:E9:B7 Fingerprint (SHA1): 72:2E:D2:0B:8F:80:42:39:B4:8D:C7:45:5D:12:BD:0A:E4:DC:64:85 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5262: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #5263: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #5264: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #5265: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132754 (0x671f992) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 18:59:57 2016 Not After : Fri Jan 08 18:59:57 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:fb:c6:db:cf:f8:ea:2f:e4:8c:88:d1:76:0d:0f:0e: e8:bb:70:c2:b7:e6:85:db:50:33:9e:16:df:1d:cd:20: c2:e0:8c:e1:15:8d:e6:01:60:a0:74:42:d1:03:5c:96: 62:c2:ce:e7:84:49:39:52:e1:1d:e1:1e:58:02:7d:0b: 89:c7:a6:bb:d3:0e:0b:df:2d:d4:a8:0b:af:e1:b9:ac: c9:51:d7:a4:f8:8d:c4:19:af:af:e4:21:f0:d6:0a:69: ff:e1:14:be:60:6a:2c:e3:a7:20:73:70:cf:18:2b:ab: b8:9a:59:75:71:e3:c4:cd:0e:5e:c5:77:95:10:7e:01: 6f:30:9b:e7:87:a4:a4:57:12:f7:74:2f:77:43:2e:cb: f4:01:e4:bc:f8:2e:7f:d5:22:67:30:8f:7c:99:54:d2: 03:9d:e5:a4:b7:7a:8d:3c:e2:0a:26:25:a5:3f:df:2e: fb:6f:bd:ae:8e:af:55:1a:f2:ed:cc:d6:c5:47:16:b8: 9e:b9:3e:27:aa:f4:c8:57:d0:39:2d:6d:70:9f:95:10: 90:af:8d:66:da:c5:15:a9:6a:e5:ee:00:af:6c:8b:d2: ed:00:b4:e8:c7:36:0a:88:6c:08:94:b5:30:9f:58:b1: c0:0d:da:84:6b:1f:bf:35:02:cc:09:f1:86:e1:d5:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a1:90:16:fd:df:09:86:b0:f7:e7:0a:f8:f6:c4:a5:8a: 24:a3:38:4b:81:9c:2f:5c:f3:8a:6f:ae:39:e9:29:76: 07:0c:47:58:ad:c6:16:68:e2:9d:53:9f:94:7e:32:12: 00:1b:58:01:b5:79:fd:d4:30:6d:86:e1:8e:fa:c6:12: 1c:e3:6c:c7:ce:3a:3b:46:78:25:a9:bf:4f:91:21:bc: f3:08:46:ef:41:35:43:62:4b:5d:77:11:db:78:1e:6a: f2:cf:7b:9f:0e:3a:56:2f:30:25:b6:3f:de:36:1f:e9: 6e:cd:7b:3c:7f:c7:22:e6:23:f6:77:01:18:88:12:4d: 4d:87:d4:18:0a:8c:60:27:06:d9:db:6c:f1:38:9c:53: 2f:38:04:48:3a:4f:ef:08:ff:fc:92:0c:62:44:a2:9b: 14:bc:29:fc:9c:d5:c2:af:cc:a6:eb:35:49:f6:a9:b4: a3:15:99:70:48:db:57:57:4d:eb:94:4f:d8:17:72:20: 33:7d:66:02:a0:97:0b:5b:9c:a9:19:3c:bd:0d:b6:6a: b5:dc:61:1f:7e:3b:86:b0:6a:62:9c:27:45:68:26:a6: 14:1c:45:38:c5:4c:13:23:00:c4:b4:75:a3:eb:47:6f: 1a:62:93:b2:4e:74:19:5d:07:3c:26:5a:af:b8:08:f1 Fingerprint (SHA-256): 17:19:D9:F7:76:F1:30:FD:F8:7F:2E:C0:12:86:7C:13:45:05:C2:F1:49:E9:65:63:4E:29:E9:8A:61:A2:E9:B7 Fingerprint (SHA1): 72:2E:D2:0B:8F:80:42:39:B4:8D:C7:45:5D:12:BD:0A:E4:DC:64:85 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5266: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132755 (0x671f993) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 19:00:03 2016 Not After : Fri Jan 08 19:00:03 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:97:c8:f6:95:19:f9:84:e1:60:f5:1f:5c:84:01:8a: 89:ed:12:5d:0f:d8:d5:40:ea:a2:c6:65:cf:c4:d0:60: e9:00:0e:a7:1d:a5:f9:86:ae:2f:be:36:3c:2f:99:87: a8:4d:3e:9c:f3:f6:bb:9f:dd:b4:1f:bc:45:63:9b:15: d8:00:06:2e:15:4e:83:ea:84:08:96:f0:b9:26:b2:df: f7:ea:92:ef:0a:7c:3a:50:5f:88:96:ff:84:6b:3b:f0: 51:cd:a9:c3:f4:36:39:d9:9f:c5:6c:2b:25:d0:30:6f: cc:bf:c9:6b:e2:cd:ce:33:69:15:8b:e1:49:3e:81:79: f0:ab:39:15:68:6a:ed:a6:b6:d2:bc:c5:32:73:a8:d6: c7:4a:3e:e0:72:c6:fe:a7:13:ba:4a:13:8e:80:9e:47: a6:ff:88:a6:03:34:9c:82:5f:cd:60:6b:fe:45:71:52: 8d:65:47:bb:a7:2d:cb:cd:a6:55:cd:ff:b7:42:a0:a0: 4e:7c:44:6b:28:09:2f:6b:ed:ba:c0:0f:00:6c:97:94: e1:e6:17:b5:2e:75:0d:65:cb:b4:c6:ac:c7:67:5f:32: e3:be:ca:45:fe:bc:0b:9f:ba:4b:e0:ff:89:68:05:87: 37:25:79:27:dc:2a:08:a4:bc:65:55:15:af:f3:56:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:9a:fb:93:14:e5:cf:38:cc:ee:5a:bf:e5:48:0f:39: 05:69:4a:6f:17:97:6d:7a:59:66:57:d3:35:fc:9c:82: 8b:cb:77:ac:39:0a:c8:b6:25:59:b8:f0:5a:e4:8a:eb: e1:5d:19:51:ff:da:99:03:ab:65:81:d4:2f:1a:27:2d: b7:dd:ad:cd:5e:c0:34:ce:7e:45:c7:cd:35:74:67:98: 3a:3b:53:17:5e:94:82:94:ad:ee:1d:0f:88:53:78:8d: 85:78:ef:7d:d1:3e:e8:4e:5b:3c:77:44:5e:bd:cc:b7: 9c:56:9f:ea:0c:f5:f8:90:52:38:40:ca:f2:6a:29:de: a1:fa:62:ea:e1:12:76:12:ac:3d:59:64:33:f9:ad:c0: ba:f5:87:15:f2:8c:cd:e7:8a:b6:57:21:e5:4b:a4:fb: 98:0c:ce:bf:05:e0:b4:80:4b:b6:4a:d3:69:68:09:c4: 79:72:0c:70:fb:48:c7:d2:89:a4:aa:a1:d9:93:b3:fa: 43:19:66:96:35:03:40:fc:b3:34:3e:7c:f1:b0:8d:b1: 0b:08:e7:1a:1d:46:d6:03:14:ed:aa:39:35:a1:26:53: a3:2e:6c:9a:74:74:ca:df:50:3a:21:e5:52:27:19:d8: c4:20:46:36:32:dd:17:20:a8:bc:a2:7b:d0:9c:d8:d3 Fingerprint (SHA-256): 24:83:90:71:1F:E8:B5:76:23:D0:B0:3C:5C:2B:0A:E5:0A:E8:3B:77:CF:76:7B:6A:FF:AA:7D:F2:AD:FA:CF:BF Fingerprint (SHA1): F6:0D:7D:6C:F8:D9:E5:2F:7F:DA:50:CE:EA:E0:7F:0F:DB:5C:E8:27 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5267: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #5268: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #5269: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #5270: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #5271: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #5272: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132755 (0x671f993) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 19:00:03 2016 Not After : Fri Jan 08 19:00:03 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:97:c8:f6:95:19:f9:84:e1:60:f5:1f:5c:84:01:8a: 89:ed:12:5d:0f:d8:d5:40:ea:a2:c6:65:cf:c4:d0:60: e9:00:0e:a7:1d:a5:f9:86:ae:2f:be:36:3c:2f:99:87: a8:4d:3e:9c:f3:f6:bb:9f:dd:b4:1f:bc:45:63:9b:15: d8:00:06:2e:15:4e:83:ea:84:08:96:f0:b9:26:b2:df: f7:ea:92:ef:0a:7c:3a:50:5f:88:96:ff:84:6b:3b:f0: 51:cd:a9:c3:f4:36:39:d9:9f:c5:6c:2b:25:d0:30:6f: cc:bf:c9:6b:e2:cd:ce:33:69:15:8b:e1:49:3e:81:79: f0:ab:39:15:68:6a:ed:a6:b6:d2:bc:c5:32:73:a8:d6: c7:4a:3e:e0:72:c6:fe:a7:13:ba:4a:13:8e:80:9e:47: a6:ff:88:a6:03:34:9c:82:5f:cd:60:6b:fe:45:71:52: 8d:65:47:bb:a7:2d:cb:cd:a6:55:cd:ff:b7:42:a0:a0: 4e:7c:44:6b:28:09:2f:6b:ed:ba:c0:0f:00:6c:97:94: e1:e6:17:b5:2e:75:0d:65:cb:b4:c6:ac:c7:67:5f:32: e3:be:ca:45:fe:bc:0b:9f:ba:4b:e0:ff:89:68:05:87: 37:25:79:27:dc:2a:08:a4:bc:65:55:15:af:f3:56:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:9a:fb:93:14:e5:cf:38:cc:ee:5a:bf:e5:48:0f:39: 05:69:4a:6f:17:97:6d:7a:59:66:57:d3:35:fc:9c:82: 8b:cb:77:ac:39:0a:c8:b6:25:59:b8:f0:5a:e4:8a:eb: e1:5d:19:51:ff:da:99:03:ab:65:81:d4:2f:1a:27:2d: b7:dd:ad:cd:5e:c0:34:ce:7e:45:c7:cd:35:74:67:98: 3a:3b:53:17:5e:94:82:94:ad:ee:1d:0f:88:53:78:8d: 85:78:ef:7d:d1:3e:e8:4e:5b:3c:77:44:5e:bd:cc:b7: 9c:56:9f:ea:0c:f5:f8:90:52:38:40:ca:f2:6a:29:de: a1:fa:62:ea:e1:12:76:12:ac:3d:59:64:33:f9:ad:c0: ba:f5:87:15:f2:8c:cd:e7:8a:b6:57:21:e5:4b:a4:fb: 98:0c:ce:bf:05:e0:b4:80:4b:b6:4a:d3:69:68:09:c4: 79:72:0c:70:fb:48:c7:d2:89:a4:aa:a1:d9:93:b3:fa: 43:19:66:96:35:03:40:fc:b3:34:3e:7c:f1:b0:8d:b1: 0b:08:e7:1a:1d:46:d6:03:14:ed:aa:39:35:a1:26:53: a3:2e:6c:9a:74:74:ca:df:50:3a:21:e5:52:27:19:d8: c4:20:46:36:32:dd:17:20:a8:bc:a2:7b:d0:9c:d8:d3 Fingerprint (SHA-256): 24:83:90:71:1F:E8:B5:76:23:D0:B0:3C:5C:2B:0A:E5:0A:E8:3B:77:CF:76:7B:6A:FF:AA:7D:F2:AD:FA:CF:BF Fingerprint (SHA1): F6:0D:7D:6C:F8:D9:E5:2F:7F:DA:50:CE:EA:E0:7F:0F:DB:5C:E8:27 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5273: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132755 (0x671f993) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 19:00:03 2016 Not After : Fri Jan 08 19:00:03 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:97:c8:f6:95:19:f9:84:e1:60:f5:1f:5c:84:01:8a: 89:ed:12:5d:0f:d8:d5:40:ea:a2:c6:65:cf:c4:d0:60: e9:00:0e:a7:1d:a5:f9:86:ae:2f:be:36:3c:2f:99:87: a8:4d:3e:9c:f3:f6:bb:9f:dd:b4:1f:bc:45:63:9b:15: d8:00:06:2e:15:4e:83:ea:84:08:96:f0:b9:26:b2:df: f7:ea:92:ef:0a:7c:3a:50:5f:88:96:ff:84:6b:3b:f0: 51:cd:a9:c3:f4:36:39:d9:9f:c5:6c:2b:25:d0:30:6f: cc:bf:c9:6b:e2:cd:ce:33:69:15:8b:e1:49:3e:81:79: f0:ab:39:15:68:6a:ed:a6:b6:d2:bc:c5:32:73:a8:d6: c7:4a:3e:e0:72:c6:fe:a7:13:ba:4a:13:8e:80:9e:47: a6:ff:88:a6:03:34:9c:82:5f:cd:60:6b:fe:45:71:52: 8d:65:47:bb:a7:2d:cb:cd:a6:55:cd:ff:b7:42:a0:a0: 4e:7c:44:6b:28:09:2f:6b:ed:ba:c0:0f:00:6c:97:94: e1:e6:17:b5:2e:75:0d:65:cb:b4:c6:ac:c7:67:5f:32: e3:be:ca:45:fe:bc:0b:9f:ba:4b:e0:ff:89:68:05:87: 37:25:79:27:dc:2a:08:a4:bc:65:55:15:af:f3:56:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:9a:fb:93:14:e5:cf:38:cc:ee:5a:bf:e5:48:0f:39: 05:69:4a:6f:17:97:6d:7a:59:66:57:d3:35:fc:9c:82: 8b:cb:77:ac:39:0a:c8:b6:25:59:b8:f0:5a:e4:8a:eb: e1:5d:19:51:ff:da:99:03:ab:65:81:d4:2f:1a:27:2d: b7:dd:ad:cd:5e:c0:34:ce:7e:45:c7:cd:35:74:67:98: 3a:3b:53:17:5e:94:82:94:ad:ee:1d:0f:88:53:78:8d: 85:78:ef:7d:d1:3e:e8:4e:5b:3c:77:44:5e:bd:cc:b7: 9c:56:9f:ea:0c:f5:f8:90:52:38:40:ca:f2:6a:29:de: a1:fa:62:ea:e1:12:76:12:ac:3d:59:64:33:f9:ad:c0: ba:f5:87:15:f2:8c:cd:e7:8a:b6:57:21:e5:4b:a4:fb: 98:0c:ce:bf:05:e0:b4:80:4b:b6:4a:d3:69:68:09:c4: 79:72:0c:70:fb:48:c7:d2:89:a4:aa:a1:d9:93:b3:fa: 43:19:66:96:35:03:40:fc:b3:34:3e:7c:f1:b0:8d:b1: 0b:08:e7:1a:1d:46:d6:03:14:ed:aa:39:35:a1:26:53: a3:2e:6c:9a:74:74:ca:df:50:3a:21:e5:52:27:19:d8: c4:20:46:36:32:dd:17:20:a8:bc:a2:7b:d0:9c:d8:d3 Fingerprint (SHA-256): 24:83:90:71:1F:E8:B5:76:23:D0:B0:3C:5C:2B:0A:E5:0A:E8:3B:77:CF:76:7B:6A:FF:AA:7D:F2:AD:FA:CF:BF Fingerprint (SHA1): F6:0D:7D:6C:F8:D9:E5:2F:7F:DA:50:CE:EA:E0:7F:0F:DB:5C:E8:27 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5274: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #5275: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #5276: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #5277: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #5278: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #5279: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132754 (0x671f992) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 18:59:57 2016 Not After : Fri Jan 08 18:59:57 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:fb:c6:db:cf:f8:ea:2f:e4:8c:88:d1:76:0d:0f:0e: e8:bb:70:c2:b7:e6:85:db:50:33:9e:16:df:1d:cd:20: c2:e0:8c:e1:15:8d:e6:01:60:a0:74:42:d1:03:5c:96: 62:c2:ce:e7:84:49:39:52:e1:1d:e1:1e:58:02:7d:0b: 89:c7:a6:bb:d3:0e:0b:df:2d:d4:a8:0b:af:e1:b9:ac: c9:51:d7:a4:f8:8d:c4:19:af:af:e4:21:f0:d6:0a:69: ff:e1:14:be:60:6a:2c:e3:a7:20:73:70:cf:18:2b:ab: b8:9a:59:75:71:e3:c4:cd:0e:5e:c5:77:95:10:7e:01: 6f:30:9b:e7:87:a4:a4:57:12:f7:74:2f:77:43:2e:cb: f4:01:e4:bc:f8:2e:7f:d5:22:67:30:8f:7c:99:54:d2: 03:9d:e5:a4:b7:7a:8d:3c:e2:0a:26:25:a5:3f:df:2e: fb:6f:bd:ae:8e:af:55:1a:f2:ed:cc:d6:c5:47:16:b8: 9e:b9:3e:27:aa:f4:c8:57:d0:39:2d:6d:70:9f:95:10: 90:af:8d:66:da:c5:15:a9:6a:e5:ee:00:af:6c:8b:d2: ed:00:b4:e8:c7:36:0a:88:6c:08:94:b5:30:9f:58:b1: c0:0d:da:84:6b:1f:bf:35:02:cc:09:f1:86:e1:d5:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a1:90:16:fd:df:09:86:b0:f7:e7:0a:f8:f6:c4:a5:8a: 24:a3:38:4b:81:9c:2f:5c:f3:8a:6f:ae:39:e9:29:76: 07:0c:47:58:ad:c6:16:68:e2:9d:53:9f:94:7e:32:12: 00:1b:58:01:b5:79:fd:d4:30:6d:86:e1:8e:fa:c6:12: 1c:e3:6c:c7:ce:3a:3b:46:78:25:a9:bf:4f:91:21:bc: f3:08:46:ef:41:35:43:62:4b:5d:77:11:db:78:1e:6a: f2:cf:7b:9f:0e:3a:56:2f:30:25:b6:3f:de:36:1f:e9: 6e:cd:7b:3c:7f:c7:22:e6:23:f6:77:01:18:88:12:4d: 4d:87:d4:18:0a:8c:60:27:06:d9:db:6c:f1:38:9c:53: 2f:38:04:48:3a:4f:ef:08:ff:fc:92:0c:62:44:a2:9b: 14:bc:29:fc:9c:d5:c2:af:cc:a6:eb:35:49:f6:a9:b4: a3:15:99:70:48:db:57:57:4d:eb:94:4f:d8:17:72:20: 33:7d:66:02:a0:97:0b:5b:9c:a9:19:3c:bd:0d:b6:6a: b5:dc:61:1f:7e:3b:86:b0:6a:62:9c:27:45:68:26:a6: 14:1c:45:38:c5:4c:13:23:00:c4:b4:75:a3:eb:47:6f: 1a:62:93:b2:4e:74:19:5d:07:3c:26:5a:af:b8:08:f1 Fingerprint (SHA-256): 17:19:D9:F7:76:F1:30:FD:F8:7F:2E:C0:12:86:7C:13:45:05:C2:F1:49:E9:65:63:4E:29:E9:8A:61:A2:E9:B7 Fingerprint (SHA1): 72:2E:D2:0B:8F:80:42:39:B4:8D:C7:45:5D:12:BD:0A:E4:DC:64:85 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5280: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132754 (0x671f992) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 18:59:57 2016 Not After : Fri Jan 08 18:59:57 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:fb:c6:db:cf:f8:ea:2f:e4:8c:88:d1:76:0d:0f:0e: e8:bb:70:c2:b7:e6:85:db:50:33:9e:16:df:1d:cd:20: c2:e0:8c:e1:15:8d:e6:01:60:a0:74:42:d1:03:5c:96: 62:c2:ce:e7:84:49:39:52:e1:1d:e1:1e:58:02:7d:0b: 89:c7:a6:bb:d3:0e:0b:df:2d:d4:a8:0b:af:e1:b9:ac: c9:51:d7:a4:f8:8d:c4:19:af:af:e4:21:f0:d6:0a:69: ff:e1:14:be:60:6a:2c:e3:a7:20:73:70:cf:18:2b:ab: b8:9a:59:75:71:e3:c4:cd:0e:5e:c5:77:95:10:7e:01: 6f:30:9b:e7:87:a4:a4:57:12:f7:74:2f:77:43:2e:cb: f4:01:e4:bc:f8:2e:7f:d5:22:67:30:8f:7c:99:54:d2: 03:9d:e5:a4:b7:7a:8d:3c:e2:0a:26:25:a5:3f:df:2e: fb:6f:bd:ae:8e:af:55:1a:f2:ed:cc:d6:c5:47:16:b8: 9e:b9:3e:27:aa:f4:c8:57:d0:39:2d:6d:70:9f:95:10: 90:af:8d:66:da:c5:15:a9:6a:e5:ee:00:af:6c:8b:d2: ed:00:b4:e8:c7:36:0a:88:6c:08:94:b5:30:9f:58:b1: c0:0d:da:84:6b:1f:bf:35:02:cc:09:f1:86:e1:d5:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a1:90:16:fd:df:09:86:b0:f7:e7:0a:f8:f6:c4:a5:8a: 24:a3:38:4b:81:9c:2f:5c:f3:8a:6f:ae:39:e9:29:76: 07:0c:47:58:ad:c6:16:68:e2:9d:53:9f:94:7e:32:12: 00:1b:58:01:b5:79:fd:d4:30:6d:86:e1:8e:fa:c6:12: 1c:e3:6c:c7:ce:3a:3b:46:78:25:a9:bf:4f:91:21:bc: f3:08:46:ef:41:35:43:62:4b:5d:77:11:db:78:1e:6a: f2:cf:7b:9f:0e:3a:56:2f:30:25:b6:3f:de:36:1f:e9: 6e:cd:7b:3c:7f:c7:22:e6:23:f6:77:01:18:88:12:4d: 4d:87:d4:18:0a:8c:60:27:06:d9:db:6c:f1:38:9c:53: 2f:38:04:48:3a:4f:ef:08:ff:fc:92:0c:62:44:a2:9b: 14:bc:29:fc:9c:d5:c2:af:cc:a6:eb:35:49:f6:a9:b4: a3:15:99:70:48:db:57:57:4d:eb:94:4f:d8:17:72:20: 33:7d:66:02:a0:97:0b:5b:9c:a9:19:3c:bd:0d:b6:6a: b5:dc:61:1f:7e:3b:86:b0:6a:62:9c:27:45:68:26:a6: 14:1c:45:38:c5:4c:13:23:00:c4:b4:75:a3:eb:47:6f: 1a:62:93:b2:4e:74:19:5d:07:3c:26:5a:af:b8:08:f1 Fingerprint (SHA-256): 17:19:D9:F7:76:F1:30:FD:F8:7F:2E:C0:12:86:7C:13:45:05:C2:F1:49:E9:65:63:4E:29:E9:8A:61:A2:E9:B7 Fingerprint (SHA1): 72:2E:D2:0B:8F:80:42:39:B4:8D:C7:45:5D:12:BD:0A:E4:DC:64:85 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5281: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #5282: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132759 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5283: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #5284: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #5285: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132760 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5286: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #5287: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #5288: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132761 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5289: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #5290: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #5291: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132762 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5292: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #5293: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #5294: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132763 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5295: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #5296: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #5297: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132764 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5298: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #5299: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #5300: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132765 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5301: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #5302: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #5303: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132766 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5304: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #5305: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #5306: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132767 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5307: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #5308: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #5309: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5310: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 108132768 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5311: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5312: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 108132769 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5313: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5314: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 108132770 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5315: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5316: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #5317: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #5318: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5319: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 108132771 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5320: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5321: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 108132772 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5322: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5323: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 108132773 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5324: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5325: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #5326: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #5327: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5328: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 108132774 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5329: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5330: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 108132775 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5331: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5332: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 108132776 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5333: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5334: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #5335: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #5336: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5337: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 108132777 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5338: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5339: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 108132778 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5340: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5341: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 108132779 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5342: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5343: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #5344: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5345: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5346: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 108132780 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5347: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5348: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5349: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5350: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108132781 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5351: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5352: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132759 (0x671f997) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Fri Jan 08 19:00:38 2016 Not After : Fri Jan 08 19:00:38 2066 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:26:50:f3:a4:ff:58:99:32:f8:40:ff:3e:bc:a3:da: dd:e1:54:32:26:49:13:81:77:2e:c2:ba:0d:a2:ff:c2: c6:30:fa:e4:da:5f:96:bb:e1:be:70:39:83:48:ed:2b: 76:69:c7:a0:69:1b:af:23:8f:30:71:7e:32:72:1c:94: 50:d3:92:1a:53:f5:dc:52:2d:a1:7d:56:e9:07:7d:62: 21:66:ed:2d:67:41:3d:c1:4c:e5:40:08:ad:f0:56:37: ef:2d:cf:63:9f:e6:22:ea:76:e7:28:35:70:65:0f:5d: 62:4d:81:1f:4f:32:13:09:ab:ed:52:6b:be:81:4b:09: 03:0d:c9:67:f4:d7:61:04:1e:65:86:c2:8d:74:d6:0f: ef:a1:dd:d5:c9:78:9d:2a:8d:af:7b:34:89:ff:c4:e3: 7f:e5:ac:9a:a6:8c:4f:19:19:8f:ee:d6:1b:c5:70:a5: fd:5f:94:e1:5e:c4:92:a5:d9:a4:af:63:07:06:05:af: cd:79:39:02:48:fc:a1:92:b1:91:c8:10:8d:45:4a:e9: 8b:76:d7:e0:a6:bc:20:c5:c8:66:ed:b3:9b:05:6f:67: 38:eb:65:96:76:73:21:ba:b0:53:38:8c:fb:f9:f8:ba: e4:f3:e4:a5:bc:cd:5f:27:a7:4c:3d:94:64:90:1a:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6c:b4:bc:4d:56:ac:3f:a4:0f:f5:a5:bb:96:9a:b0:6d: fe:81:cd:fb:14:2a:75:b6:34:1a:50:76:6c:5c:47:cc: f7:0e:56:42:ca:81:56:70:fb:3d:af:ed:5c:af:f9:63: 36:b3:2a:2e:ff:a2:31:34:9f:01:cb:57:bb:29:b0:20: b9:86:e5:82:16:a7:31:ae:0b:68:e4:49:a6:11:e4:75: 3c:4c:56:9a:0e:45:5d:2d:10:44:cf:d6:a0:43:ab:a5: 78:60:fc:38:1a:1a:de:f1:aa:b0:d7:64:9a:6b:cc:48: b6:be:82:87:d6:13:5a:ec:08:9e:2f:f6:90:4a:e2:ae: e5:3e:05:e2:1d:ab:8c:eb:2a:57:38:8a:20:11:c1:35: c3:68:42:1a:c9:b2:e5:f8:3f:4a:1e:b1:c1:da:ea:a8: 5b:d2:fd:9e:77:66:6b:c4:39:f8:92:0a:5a:3f:24:ce: be:49:7e:9f:18:fa:34:40:6e:46:88:0c:fe:2b:04:c2: f8:65:dc:4b:ff:0a:0d:5e:c6:f9:24:7c:ef:97:de:7f: 0d:bd:d6:6e:4c:c3:30:de:c2:1e:0f:52:40:e3:10:4d: a3:2e:4b:33:a5:ba:4b:07:d1:90:ac:c2:d2:40:c4:54: 4b:4d:b6:ba:6a:62:fc:61:be:b9:29:aa:54:b4:1e:db Fingerprint (SHA-256): A2:8D:24:0B:CF:72:0D:F4:26:91:58:7D:7A:52:97:3E:86:CF:0F:A8:1F:FD:CA:4E:04:65:A2:D8:1A:05:95:9F Fingerprint (SHA1): 62:B1:BA:99:C6:B1:53:BC:3F:27:6C:00:A8:0A:5E:43:D5:6C:8F:28 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #5353: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132760 (0x671f998) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Fri Jan 08 19:00:44 2016 Not After : Fri Jan 08 19:00:44 2066 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:53:a9:11:88:c9:57:32:af:b8:50:8f:85:6e:af:b1: 00:53:eb:43:f6:86:2d:f3:79:be:d9:7a:d4:73:8c:04: 92:de:6d:75:ce:5d:96:f7:af:c8:d1:04:8f:e9:24:b6: f2:51:0c:6b:c0:80:3b:f2:63:60:1b:2e:af:7d:81:c6: 8e:b5:63:eb:1d:6d:6b:c0:cf:62:80:93:32:87:3c:61: 76:6d:a0:6d:1b:ab:47:76:57:5a:00:c5:cf:21:b6:ca: 59:21:10:88:14:96:34:04:ee:84:32:b4:e0:7c:31:e8: 0d:53:4e:7d:99:5c:d7:e3:b8:f1:a8:56:b0:73:d9:f0: 6e:c6:84:d2:81:06:ec:60:08:a7:a9:d9:2b:3c:63:7c: 5d:43:b4:33:67:ab:90:96:73:50:78:1f:9d:45:6e:f2: 86:93:33:67:5d:03:fe:5c:a0:c8:f7:ce:47:50:bd:f9: 9d:20:1c:8c:c7:a7:c9:e3:0d:d9:ee:e5:55:f8:12:3e: 85:9e:b4:c5:20:20:a9:50:81:9b:96:87:f0:1d:d4:48: 98:79:a9:64:ca:e1:15:ea:1c:83:de:8a:86:11:3c:42: a1:c9:d0:91:07:69:6e:74:1a:cb:ec:b2:29:13:fe:61: 02:1c:aa:ba:fe:a3:34:07:ec:43:a2:6a:34:0f:17:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9b:d9:b3:83:af:56:c5:27:e8:c6:1f:a5:ee:76:70:be: 87:73:fd:fc:8f:40:61:8d:c3:76:be:5d:0c:54:d1:ee: a9:4b:d6:4f:07:eb:c0:fa:d3:c3:24:eb:f0:1b:8d:68: 71:95:c1:9a:91:22:0c:1a:6c:bd:49:7d:cd:03:b1:d5: 93:6a:18:12:90:27:d0:46:3f:14:88:db:0c:4f:f9:ea: 8a:74:64:ab:8c:6b:5b:bf:73:12:84:f7:de:28:ca:6c: 3a:aa:c6:32:bd:5f:f0:b7:af:74:ea:07:aa:d5:b0:1d: d6:7c:78:7b:8b:f6:6a:d3:de:b7:12:bf:09:4d:2b:c0: 2c:bb:39:8e:1f:45:78:06:c9:dd:5d:28:4b:17:2d:af: 12:60:ec:7a:11:60:15:d4:3e:e0:c2:2e:ce:24:82:36: 44:01:a9:fd:d5:1b:97:09:c0:c5:7f:0d:d9:32:a8:b8: 59:6e:b2:ff:d7:88:1f:c9:8d:bb:39:4c:5d:d7:b4:0f: b9:f8:f7:e0:03:1b:99:3f:b3:74:b3:bb:f3:cd:0c:79: a4:66:05:e2:6b:ae:f0:3a:7c:84:d9:24:f3:5e:1a:73: 4a:35:9d:5a:65:83:9a:0a:30:cc:14:07:97:de:ce:01: 03:4f:ca:97:1f:ca:ea:2d:1a:81:6a:ad:69:c1:fb:1f Fingerprint (SHA-256): 31:9C:F4:67:59:94:8D:90:90:84:8E:1C:48:97:0C:3C:DC:1F:53:2C:DC:FA:DF:6B:0B:28:D7:49:6B:56:DE:95 Fingerprint (SHA1): EB:91:70:1D:7B:AC:79:17:F2:5D:83:68:F3:81:81:C9:B9:04:FA:68 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #5354: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132761 (0x671f999) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Fri Jan 08 19:00:58 2016 Not After : Fri Jan 08 19:00:58 2066 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:40:b7:5b:78:53:13:ed:51:f5:f7:90:9b:26:52:bd: c6:2e:bc:13:8a:f1:57:fb:b5:ed:c5:1e:03:94:18:d2: 22:42:d5:09:91:b5:11:6a:99:44:0e:ff:92:2f:fa:91: 88:40:3b:2d:0a:56:aa:c2:c9:d8:2f:51:92:c1:86:11: 99:30:e1:3e:76:0e:da:b1:11:5f:84:1c:d5:22:c9:59: 0b:cd:b3:e1:ec:af:1f:8f:3f:5b:29:d3:63:d7:b4:2d: a7:3e:7a:2b:62:f4:33:24:77:64:a8:f5:f3:b5:23:17: 4a:c9:56:30:af:83:31:88:95:1b:51:7d:fb:47:b0:65: 88:ac:b8:ff:0d:0e:24:71:42:25:2f:c9:41:7a:e8:36: cf:ba:92:7a:c8:af:52:95:1a:17:cd:c6:4c:4b:b0:4a: 6d:c6:ac:17:7c:ed:f8:52:2b:45:62:22:f9:b9:0c:32: f7:bc:1c:b1:4d:ed:81:d0:7e:23:1c:da:20:a1:cd:e0: 4e:91:5e:bc:39:ab:87:8a:f0:85:9d:19:db:0c:41:a6: 43:fd:61:73:01:e7:9a:e3:e1:31:9f:70:67:de:5f:61: 72:df:e5:48:94:c5:99:9b:e7:02:95:f3:bb:53:6b:b0: 3c:d0:2a:fe:47:9b:4d:36:66:b8:01:46:fc:f2:a1:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6e:08:b8:11:18:ca:3c:84:e7:ba:42:3a:ec:7e:c6:3e: 25:df:5d:b1:ba:d4:ec:94:fa:67:f0:55:16:a1:af:62: 9f:ba:0d:43:d1:5e:90:b6:e9:17:5a:66:28:ee:e1:21: d8:95:ee:3c:7a:ba:bc:23:50:5b:7d:68:13:74:65:08: c0:8d:1e:dc:ac:a0:86:97:4c:22:34:56:23:40:f3:68: 4f:0f:9e:be:51:41:eb:c9:21:85:e3:c8:be:a5:b5:05: 7c:fc:aa:d7:3c:f2:fe:c1:f9:17:9c:86:43:ba:bf:e9: 30:61:dc:1f:3d:6f:a0:a4:a2:34:8f:f9:1c:c9:34:df: dc:15:ec:43:3e:66:45:93:c7:4c:e6:cd:09:5f:01:32: c7:f0:82:48:d0:75:21:e5:b2:3d:82:c3:5a:5e:05:94: ee:34:8c:dd:70:45:2e:5b:ce:b9:db:87:b1:f0:a3:41: 64:f7:7c:64:eb:bd:88:13:8c:ae:20:8f:7f:1c:f6:27: 66:70:ad:22:30:96:c3:64:88:b4:39:ef:71:f1:06:fe: 70:78:ce:0a:5a:2f:35:36:a2:64:f6:4b:41:f1:79:9b: b7:58:95:7d:b0:0b:f6:0b:2e:76:22:b5:b5:71:ef:04: 4a:03:b9:29:38:3b:69:46:7c:2f:dc:eb:9e:db:58:2e Fingerprint (SHA-256): 61:5B:79:D6:84:88:8F:9C:11:F0:68:D9:85:1D:47:DB:4B:95:C5:46:9A:F4:C5:D5:80:13:BA:A1:46:30:FD:0C Fingerprint (SHA1): A1:A3:35:38:2A:AC:6D:35:04:8F:21:02:0D:B6:A6:65:FA:20:E6:6F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #5355: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132762 (0x671f99a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Fri Jan 08 19:01:03 2016 Not After : Fri Jan 08 19:01:03 2066 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:68:a1:38:ad:db:b9:ba:71:82:3e:cd:b8:d8:48:7a: 1f:d1:dd:74:af:f6:5e:2b:37:61:86:3b:ff:44:09:22: 8f:cc:9b:38:0d:33:df:f8:5f:6f:d0:99:16:3c:00:06: 41:52:be:34:29:00:bc:9d:f6:98:fa:cf:f9:6f:40:3f: d7:1b:cb:1b:9c:66:b4:7c:08:77:13:dd:02:57:d6:a2: 69:0d:ff:17:16:1b:36:89:11:5d:88:12:9f:c6:94:c9: 16:04:34:57:c7:0e:7c:08:77:d9:bb:e1:29:9d:d1:98: 8a:9b:e5:53:c9:75:a9:37:03:e7:dd:a0:6c:2b:1f:a2: 4e:f0:e9:a6:74:d0:e0:95:b1:03:71:cc:9d:0d:44:6f: ac:53:51:a8:05:f9:1b:7e:ea:b9:12:4c:f4:d1:ac:d3: 67:13:4f:95:dd:86:25:7d:c2:60:13:c0:f9:3b:78:e7: ac:5d:2a:d3:a8:bf:be:2f:31:a6:65:7f:02:1c:9c:01: 7e:ab:83:a7:d2:b0:7c:a1:30:f3:c4:45:05:9a:1b:95: f1:ad:c3:ec:c4:16:92:c5:be:42:b7:34:3e:ba:62:cd: f8:c5:a5:eb:52:93:f0:13:44:5f:c7:96:f9:ed:a7:fc: b6:51:b8:7d:a5:0b:bc:5b:ef:82:ee:26:1b:82:a0:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:69:3c:3b:00:8c:07:a2:41:8b:11:58:2d:4a:b1:d8: 65:95:4e:2f:96:fa:a6:b2:62:ab:b3:8f:ef:b0:9c:ac: e9:f7:41:37:e1:45:3e:93:9e:03:11:7e:e1:9a:bb:f6: 13:9e:f2:0d:2e:2c:71:6c:e1:6b:8c:36:da:0e:29:01: 90:3f:f6:9b:3e:d4:f6:b7:69:bc:6f:82:12:1c:30:46: 7a:a5:45:10:24:4f:eb:9b:29:ea:26:cc:a6:46:cd:d4: 4b:65:c6:88:d4:ac:11:b0:29:4f:2e:13:6b:41:9a:59: 96:0e:8a:fc:1a:83:29:14:44:a7:3a:1f:0b:04:27:7d: 37:e9:6f:7c:d2:73:1d:24:06:8c:58:e3:c7:cf:f1:cc: 21:65:2d:53:f4:1e:5a:be:8a:21:c0:f7:13:25:b0:7e: 58:53:18:30:ec:fe:e5:1d:04:6a:51:3d:79:4b:64:d2: b5:66:18:a5:0d:3d:ae:3f:13:5c:96:55:c5:5e:3f:1b: 06:e0:17:7e:f8:94:d9:91:31:a4:0e:d9:e3:44:c2:a5: 87:68:2e:10:3b:d9:9c:6d:69:56:7e:a6:f7:e1:55:28: 8a:9b:7c:7f:09:12:c8:c9:5c:e9:87:62:b5:97:ea:f9: 5f:86:c8:59:42:41:c5:bb:ac:de:9f:c4:0e:c0:5d:2d Fingerprint (SHA-256): F6:D3:56:83:73:04:8F:1C:21:27:3A:BD:16:DA:96:2D:9F:18:67:31:97:F4:19:FC:0E:10:1E:D4:58:84:F8:8C Fingerprint (SHA1): 74:C3:5C:33:54:7E:D9:C6:04:E4:22:89:A4:4A:A1:95:BC:CB:36:03 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #5356: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132763 (0x671f99b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Fri Jan 08 19:01:10 2016 Not After : Fri Jan 08 19:01:10 2066 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:7e:9b:ed:04:d3:3f:72:f7:f8:16:40:4e:94:65:78: 7f:a2:35:66:ee:e7:42:2e:95:2d:db:cf:32:0a:20:48: 83:8b:5a:1e:27:01:b5:24:ac:f6:e4:90:2e:75:2b:8f: 1f:3a:cb:9a:c8:f3:b0:a3:0d:6e:2e:7a:80:c6:80:94: 50:01:6c:de:9a:43:aa:bf:66:39:66:a9:ee:7a:38:7e: 97:57:b8:93:ea:57:f4:fc:a5:85:4c:95:71:3f:57:66: e9:71:da:be:d6:67:c1:b0:32:d0:9b:80:2a:5a:cc:cc: a0:67:cb:df:9e:32:f3:dd:ac:cd:96:b7:87:0c:e4:02: 8e:c3:d0:0d:b5:7c:9e:45:8e:1b:73:c3:46:fc:36:8b: 8e:34:32:34:b1:12:8a:8b:c9:7c:a2:8f:68:a2:78:e1: 87:a9:ac:cf:b7:31:03:cb:4b:cb:4c:c1:1f:ed:d8:70: f3:dc:cd:32:db:77:71:82:d1:74:81:f5:f0:d8:40:47: a6:9e:3e:f2:58:b3:66:45:51:27:67:67:42:17:73:3f: 62:ca:7a:df:d7:41:44:2c:11:14:04:f4:42:ca:d8:5c: dc:ea:2d:15:00:94:1b:0c:8c:4e:01:d3:95:da:ce:c6: 05:55:c7:53:09:a0:09:92:fd:bc:69:ff:b7:53:e1:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:48:50:01:bf:44:b8:25:4f:c0:af:a1:62:34:6b:fd: d6:18:a4:2a:e4:70:8e:89:72:3a:31:24:2f:04:40:1f: cd:61:e5:73:eb:f5:d2:7c:a4:7b:eb:d0:c5:8d:e3:4c: a2:40:44:bf:8d:2c:73:a0:28:d0:7a:f0:3d:9a:cf:7a: 80:6a:23:11:2d:50:d6:a0:c7:f5:bd:df:94:fa:ab:7b: 32:07:7d:ee:90:5a:87:3d:48:0e:35:a5:ca:b0:1a:04: cc:c2:ff:1b:92:67:08:42:75:b8:73:8f:2e:80:bb:2e: 72:22:3c:0e:e0:d8:3f:22:7a:99:bc:37:8c:c5:5d:c6: f6:f1:f6:9f:26:e8:c9:6e:cc:33:ce:1d:44:4b:28:bb: 1f:fd:9f:f4:27:c9:93:d5:fb:ac:1d:d5:dd:06:68:17: eb:f5:81:83:fb:06:80:88:93:0f:70:e4:3b:56:af:09: 45:82:0a:3c:19:e6:a9:ef:28:64:4d:74:07:bf:31:41: 61:e8:53:29:91:47:9c:0d:d7:a9:5b:47:28:3b:6f:2e: be:fe:2e:e1:56:1b:a0:25:92:13:f1:7d:78:91:96:18: 88:0d:11:70:bb:0f:d3:19:58:24:ed:7d:9c:9c:a1:78: 43:81:50:cb:ed:db:4e:a5:1d:52:16:68:e1:23:90:6f Fingerprint (SHA-256): AB:DE:27:34:F2:77:23:D1:17:8A:A6:85:69:52:CD:1B:CD:78:49:87:10:BF:EA:52:D0:00:FE:08:73:B8:6D:1C Fingerprint (SHA1): 0A:5C:D7:69:78:2F:E3:DD:42:8C:3A:78:19:95:6F:CB:43:E3:6C:02 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #5357: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132764 (0x671f99c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Fri Jan 08 19:01:21 2016 Not After : Fri Jan 08 19:01:21 2066 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:2d:a1:ca:f8:50:d8:0a:8e:cb:ac:f6:05:78:f9:13: f6:81:0c:50:d3:41:64:ab:6b:13:90:96:74:3e:16:a2: 38:b7:d2:72:61:d0:3b:c9:c7:05:e1:53:71:aa:36:e7: 9e:cd:97:6a:07:cd:5f:2a:2f:82:33:ad:10:6e:9b:59: af:70:02:92:68:84:ee:37:ae:89:73:23:9f:a5:25:2e: a4:85:49:ba:5f:4b:c2:86:a2:12:12:b1:f1:2a:24:46: 6b:de:64:32:0b:d7:e7:8b:e5:a9:32:47:4f:5c:07:64: 24:dd:1d:01:52:7a:df:63:99:ff:d3:95:97:e8:97:de: e3:cc:60:b6:f5:2a:e7:c2:bc:89:f2:b3:63:e2:78:b0: e4:c6:9c:2a:ae:b2:f2:e3:59:e6:75:03:8b:47:83:9c: 1b:f5:88:44:6f:01:b6:9f:32:35:e0:fa:12:e1:f4:d3: 12:b0:79:8e:f9:a5:01:d3:b9:b2:7f:c0:35:19:de:3e: b4:3e:18:71:b1:31:81:36:d6:72:6c:dc:39:99:fa:31: 4c:19:07:36:a1:2e:ca:47:c4:d6:b4:80:0c:0f:fe:98: 1b:72:3f:88:09:03:b1:1e:c1:2e:d4:72:65:22:bd:76: 95:ff:0e:8b:01:80:3b:1e:6a:1f:1e:26:65:cf:f7:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ad:2a:b1:d7:27:59:54:75:95:7d:95:22:d5:63:d1:21: 20:b2:dd:f3:a7:7f:03:a4:ec:e7:c4:b4:1c:65:81:b1: ce:68:ff:3e:61:36:25:d2:30:5e:53:91:7b:18:86:98: e9:ca:ca:32:aa:61:b5:d8:b6:a4:a0:27:66:13:00:d5: 34:0a:d4:34:e3:ba:6a:32:fa:ef:11:75:23:6c:b1:90: c6:cc:ea:23:2c:e2:ae:3a:5d:3b:b1:95:b1:b9:db:83: 2b:c0:e3:26:38:c0:5f:9b:e3:80:4a:97:88:1f:ae:82: df:d0:5a:ae:c3:5c:b3:65:58:09:b5:ad:9d:41:ef:10: 41:53:eb:33:76:92:66:e8:87:eb:92:e9:95:c5:45:f5: 7b:48:8d:73:12:a3:8c:c9:f4:cc:51:c6:41:81:97:19: 2f:86:29:87:bd:0a:eb:15:1d:6b:22:07:a5:91:df:de: 3f:f8:f1:89:62:ab:ad:f7:bc:66:e3:9f:c1:db:68:f0: 8a:8a:30:0c:4c:76:1f:4c:44:77:d6:89:60:57:b6:55: 62:02:42:4c:3f:19:4d:2a:35:3e:6a:2d:7a:fe:5d:75: 4e:d7:1d:e3:5a:78:0a:cf:ea:d2:12:f2:60:32:0d:0a: 18:56:16:0b:27:de:ef:88:b9:34:d7:bd:9c:8b:12:fd Fingerprint (SHA-256): 3B:1E:F9:4C:15:FD:F9:73:BA:94:1C:D8:41:DE:BB:06:3C:79:9D:EA:3D:34:97:5F:9A:A7:6B:CF:71:79:2C:72 Fingerprint (SHA1): 4B:40:81:EF:60:51:B8:40:9E:BE:81:6A:E9:25:71:BE:F7:78:3E:1F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #5358: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132765 (0x671f99d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Fri Jan 08 19:01:33 2016 Not After : Fri Jan 08 19:01:33 2066 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:69:d1:3a:4a:3a:8d:ac:58:b8:d8:50:e7:59:f2:f0: ba:c7:57:45:ef:98:67:3b:de:1e:8f:7b:71:c8:38:60: 77:bf:55:d6:69:bd:54:86:59:dd:a1:74:8f:5c:05:8f: f5:33:d0:40:3e:30:26:7f:46:d5:1f:13:30:d1:00:95: 75:0d:4e:ec:ea:dd:10:e9:ac:45:b2:48:3c:99:37:5d: 34:5e:55:13:c4:4d:0e:b5:8d:b6:01:0f:bf:03:a3:d4: ab:13:db:b0:7a:e2:68:ab:ef:64:6e:8d:a7:3e:16:a3: d8:57:d8:de:17:6d:a8:f5:ba:a1:ae:af:f3:5a:31:87: f2:25:bf:59:18:09:8a:36:89:b8:ca:7b:a7:13:bb:7e: 56:c2:bf:87:8f:e6:9b:a6:6c:5c:c5:bf:a5:91:c0:86: 40:64:e1:70:75:e4:c9:78:84:29:60:9c:d4:42:8c:71: ec:64:3c:be:f4:cf:cc:a2:cc:48:30:b3:a1:ab:50:89: d1:e1:29:f6:df:0d:34:56:7e:22:a9:d2:b2:82:ac:ce: 02:3a:b3:b4:46:83:ff:5d:61:d5:be:37:b3:20:5c:75: f4:f8:af:06:10:87:34:da:4a:48:cb:27:38:71:48:a0: 5f:57:87:78:92:3c:cb:c9:86:3f:ed:9b:3d:94:9d:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:dd:b6:bb:db:be:20:1a:b2:ab:a5:27:d1:e0:3a:09: 06:9d:d5:7d:d2:5b:3e:ca:b8:b5:ed:4b:61:bf:a1:1d: 0e:5f:5a:03:ca:17:58:de:0b:8f:0a:a0:42:e4:ce:ce: 1c:ed:c1:ef:44:10:bc:3d:e7:4e:aa:a5:c7:20:5c:42: 29:0a:23:8d:4f:38:ef:47:41:cc:24:b4:01:a6:23:21: 02:d8:51:d9:f3:94:bd:c8:a3:7b:5f:0d:c1:bb:6d:be: 97:fa:e4:1c:d3:10:ed:12:59:93:b6:75:42:58:fe:14: 0b:46:b6:76:d4:90:58:13:fa:d3:a1:01:ef:a1:d8:e3: c5:35:1d:07:8b:dd:c5:69:f1:7f:fb:5f:68:78:80:d9: cc:83:af:c9:49:ed:ea:97:6e:ad:33:e4:03:96:a8:3d: cf:b3:da:7e:c8:91:9d:a0:2f:28:ec:23:62:e1:b5:65: 6a:26:a6:ed:36:38:78:36:53:18:74:5a:15:dd:ac:9c: 24:9c:b3:85:54:8d:de:56:af:11:e2:b7:5c:95:d1:2b: cf:f9:d0:58:e2:f8:d9:0f:9f:d3:d9:f8:01:43:9d:65: 08:fd:d0:d3:fc:38:d4:23:da:50:5d:f8:2d:1a:4d:28: 22:9d:f9:b5:60:87:56:1f:9a:58:1a:19:7d:94:26:dd Fingerprint (SHA-256): F8:78:B0:A8:EC:80:C6:B4:81:0A:C3:69:8D:83:48:55:A7:D2:E3:90:8B:6A:A5:08:E1:77:2C:38:E7:33:F1:BC Fingerprint (SHA1): 4C:3B:2E:43:F0:61:77:4C:A6:3B:01:CC:AE:21:F0:66:C2:28:07:80 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #5359: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132766 (0x671f99e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Fri Jan 08 19:01:42 2016 Not After : Fri Jan 08 19:01:42 2066 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:f5:f5:87:da:16:81:bc:cb:83:98:7b:90:c4:6e:1f: 0f:3a:4d:45:77:50:f6:65:b8:23:d7:af:e5:f9:b8:01: b2:3a:6c:25:01:7c:9c:4e:85:d6:ae:54:e4:09:09:23: ea:ad:8c:ae:5b:93:d2:65:27:a5:9b:c0:53:78:51:12: fa:df:8a:53:a9:13:9d:7e:96:d3:8b:95:70:b1:a7:5d: 74:52:10:25:17:20:84:0b:c5:d7:a3:e7:85:ef:f8:b0: 7a:ce:26:8d:5b:d8:a7:fb:1f:0f:e1:cb:5b:3b:d2:fa: a4:58:b8:28:0f:eb:dd:46:a2:54:20:f4:81:05:8e:2d: ea:1c:07:e8:28:c9:6f:32:e0:35:f8:7e:6b:4e:0a:8f: 15:90:9b:31:1b:86:24:27:23:82:45:b5:35:84:11:ed: 84:9e:b6:dc:68:9c:27:6c:92:d7:b2:5c:a1:88:39:56: aa:7b:5c:52:52:72:5a:38:2f:69:c9:75:5f:28:3f:27: 60:9a:15:f0:87:f0:14:2b:67:d4:0c:09:ca:03:3b:fc: d6:aa:05:54:e8:15:00:17:f0:84:32:3f:e0:7a:bf:7c: ff:1a:52:3d:ca:7b:c2:c5:f5:fe:2d:20:24:5c:fe:a5: 77:24:b6:c1:48:d3:48:d2:f3:61:bd:8a:00:5a:fa:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:7c:6b:89:2d:39:3f:e7:70:18:db:a1:6c:3b:a9:26: 4b:2b:8e:8e:d1:39:92:91:50:b0:8b:8f:43:da:6a:9d: 85:e1:d1:47:2c:7f:d8:8a:ab:de:7b:d7:a6:6b:91:e6: b8:fd:56:01:d0:61:3f:c9:5c:29:bd:86:ea:c6:9b:f7: 2f:4d:c2:c6:80:aa:9a:dd:16:2a:f3:46:27:df:f7:5d: 0b:8a:81:f2:c2:7e:94:67:fc:6b:ca:ae:fe:ee:76:fc: d9:86:4b:7a:83:25:f9:f6:8f:5c:38:46:f1:52:de:2a: e6:ff:71:54:98:0b:90:e5:a7:94:37:52:25:d9:11:62: 89:e3:cc:bf:eb:72:ef:0f:f5:8c:2d:e3:a6:3a:b5:8a: 21:85:be:38:53:a7:6a:8c:0e:6f:4e:b2:69:63:17:c2: f8:95:36:9e:24:97:60:b9:83:49:6f:8a:70:97:f0:6f: 97:20:d4:a6:0e:db:b2:9b:e6:d9:c6:3c:f6:29:05:ae: 0c:93:7f:e9:cb:2b:b9:3f:d8:1f:94:c2:43:e0:9c:5a: fc:e6:55:50:be:21:3c:49:f9:71:40:8e:73:51:78:9b: 14:2c:2e:97:46:e7:96:b8:a4:6e:70:58:6a:7e:9d:69: bf:41:32:34:64:c5:97:de:98:d9:e4:ab:ad:a9:9f:3e Fingerprint (SHA-256): 84:B2:4B:0E:87:17:28:8E:17:16:B5:43:C6:5D:C7:A7:46:50:11:A4:F9:89:E5:3C:29:01:0B:22:CF:30:2D:41 Fingerprint (SHA1): A9:FD:4C:79:A2:C8:58:3D:E0:63:6E:5F:14:BE:AE:ED:24:51:C3:F5 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #5360: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132767 (0x671f99f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Fri Jan 08 19:02:09 2016 Not After : Fri Jan 08 19:02:09 2066 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:fd:e0:71:d0:87:9c:61:00:67:f3:41:09:8b:91:cc: 22:39:a1:0e:fc:52:a9:62:3e:a7:7d:76:a2:40:f8:39: 22:dd:a7:e0:4d:13:c0:f3:1f:00:fc:5c:59:dd:b0:45: c9:a4:b0:70:4e:ba:f8:77:e3:f3:17:f8:b5:2d:a4:74: 91:54:71:18:b0:8b:51:2f:57:12:aa:f1:43:49:03:8b: e2:f0:77:6f:32:3e:50:16:cd:64:89:bc:d1:b2:38:b9: 3a:56:d4:66:11:48:48:c1:52:87:7d:b5:a8:df:f4:8e: 84:1e:7d:53:ac:07:2c:17:23:bd:33:35:74:06:ce:49: e0:78:7a:46:b8:48:6d:0b:a5:f2:ec:03:2a:39:f8:9b: ae:88:97:c9:09:f8:ca:e7:a3:43:91:52:30:ff:b3:24: 2f:a9:39:c4:f3:35:59:c7:79:8c:a4:64:95:5f:65:dd: 9c:57:8c:95:c1:53:a9:c2:49:cc:49:78:68:50:5b:d2: 51:df:f4:27:20:dc:65:60:54:bb:4e:a8:a3:a3:df:1d: 96:10:02:a4:d6:56:0b:ff:ba:bd:a8:66:b0:df:73:03: 50:35:67:a0:ef:09:33:66:d6:c8:92:b1:af:0d:e7:48: 2a:33:f7:7b:d4:8d:f1:88:76:fa:9c:59:d1:45:a5:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5a:d4:e7:a1:8b:86:9f:91:55:3a:b7:0d:69:f5:a4:22: fe:e3:fc:b7:b4:22:cc:e7:4e:a5:52:5a:df:23:37:87: 37:40:d5:0d:6e:ef:76:eb:6f:92:7b:85:40:8b:44:76: 80:4e:0e:ef:d6:15:d9:bf:bf:3b:5e:f3:05:dd:aa:6d: 7c:a6:54:60:09:20:33:db:02:47:70:01:13:17:fc:94: 7a:49:d0:5a:e5:0c:60:66:84:e6:e1:73:a4:4d:ec:7a: c0:6a:86:82:f2:e4:48:14:b1:8d:4e:54:e2:b6:f0:f4: 9d:91:b9:9b:98:78:75:87:a5:7a:95:ee:13:ad:4f:79: 36:f9:7d:86:c3:82:ca:82:45:36:d8:85:44:55:c8:70: 35:0b:f0:7f:72:e9:6f:14:60:50:cc:6c:da:fb:91:98: b5:81:1f:80:a7:be:1d:f7:68:a2:2b:a8:71:07:65:4e: 3c:5a:6a:97:e9:aa:bc:74:a5:fe:d7:de:cd:a1:20:59: 4d:48:2c:85:20:2f:b9:40:bd:24:09:2b:c4:90:8a:e4: 84:8b:44:28:2d:ec:d3:4c:90:3e:c2:96:0a:d0:57:dc: f3:06:c7:09:fe:57:b5:5e:02:db:cc:b5:45:b9:1e:48: ca:db:98:2e:eb:c4:d7:f5:ed:91:59:80:bc:73:aa:8b Fingerprint (SHA-256): 56:9C:62:FB:CB:4B:EB:CE:02:24:DA:27:FC:E6:AE:15:E8:5E:D2:79:61:C3:5F:D9:CB:55:46:BC:4C:50:99:EA Fingerprint (SHA1): 3A:CD:3D:40:6C:32:14:05:48:B5:69:FC:7B:95:0C:E8:20:2B:31:C7 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #5361: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5362: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132782 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5363: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5364: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5365: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5366: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108132783 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5367: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5368: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5369: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5370: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108132784 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5371: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5372: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #5373: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5374: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108132785 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5375: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5376: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5377: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132782 (0x671f9ae) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 19:04:13 2016 Not After : Fri Jan 08 19:04:13 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:4f:7d:ba:8e:b1:6e:46:23:64:98:3b:6c:2e:1d:01: 5f:7c:ef:5b:aa:5c:b0:c3:19:13:67:fc:2d:d6:ec:e1: 45:be:51:74:ce:2c:46:90:17:1b:d4:88:04:a1:42:ac: b1:5a:01:1a:ed:4b:b1:2b:44:c5:b0:fa:7d:80:cf:83: a5:a6:fb:1a:cc:61:0e:6c:64:1e:ad:c7:e9:6c:70:71: f7:47:a6:ff:38:cd:96:0f:83:57:be:92:c3:42:eb:8a: 22:8b:f1:78:bd:4b:5a:77:e8:3b:4b:9a:4f:59:ff:89: 18:79:b0:1b:6f:39:fe:7c:99:5c:cb:12:ea:9a:0b:e1: 95:41:07:0f:d0:ce:c6:ae:f1:d5:3a:78:03:1e:63:02: 88:8f:eb:38:31:e4:c9:75:69:b4:31:ac:72:49:66:11: f0:7f:4a:64:a6:3c:ec:64:8a:eb:9b:c4:76:55:9f:57: 06:68:7a:fa:2c:af:60:f9:b5:02:6f:80:45:13:e8:ec: 0d:3f:5d:2f:f6:5b:a9:3f:88:72:5f:bb:7f:7d:f2:4f: f1:2d:02:d7:e1:f4:b0:3f:5e:96:4f:eb:9d:fd:6e:ef: 97:ff:4e:ec:80:f4:b2:41:05:5f:d1:9d:d1:4e:4c:80: 6a:86:e6:ef:05:1c:90:88:66:92:30:12:54:eb:dd:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 44:44:0a:b1:6e:d5:dc:27:44:14:de:0b:08:0c:0a:06: 98:78:91:30:ad:72:d3:9b:ce:dd:83:2b:61:51:4d:46: 1c:e9:f8:1d:50:0b:c2:81:d2:8b:da:ec:d2:03:22:c8: fd:a2:75:12:6b:16:28:0a:78:3d:eb:51:45:0a:90:c8: 8f:1c:12:c1:3e:57:aa:e4:c7:0f:86:6e:1f:22:78:07: 83:2f:e9:7b:8c:a6:d3:d9:e9:f9:d6:bc:81:ef:fd:ca: 1a:f4:71:9e:1d:b8:81:93:7d:5a:dc:cb:6c:0f:2d:30: d2:b9:6c:38:3d:51:84:89:97:42:3e:60:d9:d0:33:07: bf:6e:9e:81:5d:e3:d9:ec:f7:0a:ef:b4:9d:0d:a8:ed: 38:e2:c2:99:a1:4f:0d:42:ad:b8:6c:a5:d7:0e:be:f1: 7a:db:a7:cb:2e:be:63:be:80:15:dd:9b:41:d3:e7:ad: d0:d8:b4:54:ba:9f:51:85:93:36:71:4a:32:7d:fd:c2: 56:2b:74:5d:4c:30:07:f2:8f:98:97:2b:e4:88:64:d5: 02:55:10:0c:b6:c9:1e:e7:08:4b:c1:82:0e:29:02:72: 41:e4:89:51:6a:35:75:bf:f1:6b:67:4f:25:d1:9c:ae: ee:b3:2d:f2:0c:ea:cb:0d:86:dd:0c:0d:38:05:26:e5 Fingerprint (SHA-256): 18:AB:47:A7:5D:F8:4D:8A:23:75:63:06:FB:22:4A:81:E4:CA:71:3B:70:30:0C:1F:35:8D:4B:F2:BE:F0:09:39 Fingerprint (SHA1): 7E:51:F8:46:55:0C:B8:BC:68:E5:85:83:8F:20:EA:AA:13:30:23:12 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5378: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5379: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132783 (0x671f9af) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 19:04:25 2016 Not After : Fri Jan 08 19:04:25 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:12:df:74:55:04:64:8e:39:f0:70:9b:04:a8:6b:88: d9:e4:3b:b5:26:e7:15:c2:fa:61:21:9e:b6:fb:aa:76: 5c:47:91:1a:2c:fe:2d:3f:b7:47:78:7d:8f:2b:32:38: 76:6d:da:d4:b9:98:c7:14:9d:07:d4:a4:15:01:79:f4: 2e:76:ec:a5:39:2f:3f:c7:93:9b:fd:1a:2a:45:53:97: 28:7b:74:e2:25:0b:4b:0b:be:12:a8:6e:97:ce:b0:23: ec:c9:14:0a:7b:93:9a:47:66:34:5c:66:32:7c:51:16: ed:58:9a:aa:e3:6a:06:a1:84:6a:71:f2:94:c0:ad:3d: ec:21:72:ab:31:15:56:05:b8:bd:02:b0:16:0c:a8:88: 29:88:db:7c:a3:b2:94:36:45:fd:61:af:2a:ed:b1:12: de:f4:4a:8f:17:9d:6c:0b:ed:a3:54:af:c4:a5:1e:e9: 9d:6b:1a:6e:09:94:9c:2d:96:df:28:77:2e:aa:05:35: d2:c8:5a:dc:53:df:a2:8b:8e:b3:17:98:39:34:26:41: c8:d5:72:56:6f:73:b9:31:d5:43:f8:78:0f:07:45:01: 55:90:3a:82:c1:ae:53:35:85:60:99:92:6c:52:4f:b4: d4:7b:8d:ff:d5:25:ff:4a:04:d2:eb:09:c7:1a:20:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:d1:d7:60:1b:ed:94:ec:c8:c9:27:f7:2c:80:75:98: 08:92:fc:b3:e0:35:d6:5f:d9:6a:ce:de:5e:69:65:6d: 50:4d:b5:b8:a7:58:f6:38:09:51:c4:35:59:74:4a:28: 46:4a:59:e9:54:96:0e:9f:80:17:af:89:04:a0:f7:6f: 9e:11:5b:46:34:33:d5:1e:03:3c:b6:6b:fd:17:e2:b9: c7:33:0c:50:f6:fd:ba:c7:b2:ee:2a:b6:cd:93:c5:6a: d0:1c:b1:1e:b7:4a:c9:37:a3:bf:70:3f:2f:96:c1:37: 78:e3:f1:7d:ed:4b:a7:7a:b6:72:0f:f1:52:04:aa:22: d8:8c:ac:37:1a:27:e9:4a:45:23:8b:9f:55:f5:df:a5: 14:92:a4:34:7a:78:35:e9:df:11:6e:1d:3f:9d:79:51: aa:3b:a8:6d:62:12:46:5c:0a:e1:e4:62:72:c1:ce:12: 7a:65:f8:04:c0:10:d6:00:20:67:3d:f4:40:14:12:95: 02:c2:68:8b:4b:59:0b:b5:bc:bc:3a:08:98:b6:2d:7b: f6:ba:10:cd:d2:fb:75:8e:3a:cd:5b:0a:e1:c0:a2:06: ba:16:86:84:86:b2:6d:ef:b0:81:5d:a6:25:08:b1:7b: f0:c1:7a:34:a2:54:ca:aa:5c:91:13:f3:e5:31:03:d7 Fingerprint (SHA-256): 44:1F:61:57:F3:4E:F6:F5:42:97:9B:90:D9:ED:5F:DA:73:77:67:BE:B0:CF:AF:67:56:09:B1:0F:F2:09:85:5E Fingerprint (SHA1): AC:FC:F6:90:03:55:B3:E1:A4:9B:50:B7:A5:69:90:54:86:4C:CC:8E Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5380: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5381: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132784 (0x671f9b0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 19:04:34 2016 Not After : Fri Jan 08 19:04:34 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:fc:5d:54:50:30:56:02:04:1e:ec:cf:65:b3:7b:c9: 66:e5:e2:42:c3:20:a8:bc:39:19:e5:d6:96:3e:96:47: bc:a8:5b:f4:9e:c5:88:f4:cc:c1:e0:4a:e4:2b:a2:8d: ae:dc:82:80:a2:60:2b:8a:85:62:da:27:d3:27:56:a4: 8c:f0:e5:ee:38:3b:36:b4:7a:85:cd:c6:c5:98:2e:71: e6:ff:b8:c7:94:91:ec:05:dc:a5:05:06:c9:df:49:e3: 74:13:c6:be:21:e0:38:70:4b:98:35:72:78:3a:76:07: a8:bc:13:6b:99:2c:b4:82:4e:da:c3:40:fa:30:15:60: 5f:4a:36:bd:f1:4e:aa:09:ed:ee:8d:e0:aa:11:7b:49: 13:61:bb:68:0c:ab:42:ba:df:4d:12:6b:74:e9:0e:05: 1c:55:b8:e9:24:c4:60:81:a9:b4:6e:8a:0c:a2:ee:8c: e4:10:4f:ac:49:03:38:0a:81:35:08:37:3e:28:f3:0b: 4b:5a:f6:f0:da:89:34:79:05:1c:7c:20:8d:e6:3c:3f: c9:ad:a8:bf:69:bf:5c:71:eb:10:26:38:91:6a:84:d8: 75:4c:d2:7f:d6:93:b7:c4:70:35:b7:b6:53:4a:95:03: a2:b8:c6:50:ea:3b:38:86:08:d7:16:7c:cf:18:fc:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:6f:69:16:9b:6c:39:ae:d3:a9:f1:11:bf:04:75:33: d9:21:06:c6:fe:62:ba:a2:60:18:14:90:a7:87:c4:1c: 73:4a:78:4e:fd:74:5b:98:26:af:2a:d8:77:9d:ad:39: b0:26:5d:3e:db:ff:44:e1:e6:ab:91:97:72:08:e9:11: e4:eb:28:13:2c:6b:69:c1:34:9d:ee:db:ce:ab:32:01: 41:eb:61:f6:2d:e2:71:e6:74:f2:71:e3:c5:f8:50:b5: de:5c:59:82:18:25:3a:fe:df:6c:9e:0b:e5:d0:0d:3e: 60:ec:04:cf:c1:87:a7:d2:66:6a:e6:0b:8b:33:be:11: ae:bc:79:e1:c5:a5:86:b9:0f:88:e6:b7:eb:06:92:f8: 91:42:55:08:54:d5:9d:f6:e1:c6:86:bd:43:3b:42:56: 80:c0:04:9c:59:98:11:da:16:2b:b2:e9:d7:77:a1:89: 77:1f:63:7e:49:77:fb:02:53:fd:7e:fa:87:43:1d:22: ec:52:64:29:1e:5f:7f:65:e9:08:ab:cf:11:17:9a:37: 11:ca:f9:d3:ef:05:f8:7d:b7:61:1f:ef:e4:7e:c5:c9: aa:2f:ea:01:08:4d:ba:8e:6f:9c:ab:4d:5d:07:82:86: 3c:e7:8f:96:af:07:6b:c8:86:01:82:53:9d:16:3b:04 Fingerprint (SHA-256): 10:19:5F:28:8E:60:6C:E5:26:0D:29:C2:5C:00:08:7F:32:0B:8F:C0:B3:4C:C3:9C:9A:F6:A5:09:A4:1D:7D:0E Fingerprint (SHA1): A6:55:49:BE:1C:35:9D:F2:73:35:05:88:60:D9:6B:BE:65:6B:E8:84 Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #5382: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5383: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #5384: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #5385: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #5386: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132782 (0x671f9ae) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 19:04:13 2016 Not After : Fri Jan 08 19:04:13 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:4f:7d:ba:8e:b1:6e:46:23:64:98:3b:6c:2e:1d:01: 5f:7c:ef:5b:aa:5c:b0:c3:19:13:67:fc:2d:d6:ec:e1: 45:be:51:74:ce:2c:46:90:17:1b:d4:88:04:a1:42:ac: b1:5a:01:1a:ed:4b:b1:2b:44:c5:b0:fa:7d:80:cf:83: a5:a6:fb:1a:cc:61:0e:6c:64:1e:ad:c7:e9:6c:70:71: f7:47:a6:ff:38:cd:96:0f:83:57:be:92:c3:42:eb:8a: 22:8b:f1:78:bd:4b:5a:77:e8:3b:4b:9a:4f:59:ff:89: 18:79:b0:1b:6f:39:fe:7c:99:5c:cb:12:ea:9a:0b:e1: 95:41:07:0f:d0:ce:c6:ae:f1:d5:3a:78:03:1e:63:02: 88:8f:eb:38:31:e4:c9:75:69:b4:31:ac:72:49:66:11: f0:7f:4a:64:a6:3c:ec:64:8a:eb:9b:c4:76:55:9f:57: 06:68:7a:fa:2c:af:60:f9:b5:02:6f:80:45:13:e8:ec: 0d:3f:5d:2f:f6:5b:a9:3f:88:72:5f:bb:7f:7d:f2:4f: f1:2d:02:d7:e1:f4:b0:3f:5e:96:4f:eb:9d:fd:6e:ef: 97:ff:4e:ec:80:f4:b2:41:05:5f:d1:9d:d1:4e:4c:80: 6a:86:e6:ef:05:1c:90:88:66:92:30:12:54:eb:dd:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 44:44:0a:b1:6e:d5:dc:27:44:14:de:0b:08:0c:0a:06: 98:78:91:30:ad:72:d3:9b:ce:dd:83:2b:61:51:4d:46: 1c:e9:f8:1d:50:0b:c2:81:d2:8b:da:ec:d2:03:22:c8: fd:a2:75:12:6b:16:28:0a:78:3d:eb:51:45:0a:90:c8: 8f:1c:12:c1:3e:57:aa:e4:c7:0f:86:6e:1f:22:78:07: 83:2f:e9:7b:8c:a6:d3:d9:e9:f9:d6:bc:81:ef:fd:ca: 1a:f4:71:9e:1d:b8:81:93:7d:5a:dc:cb:6c:0f:2d:30: d2:b9:6c:38:3d:51:84:89:97:42:3e:60:d9:d0:33:07: bf:6e:9e:81:5d:e3:d9:ec:f7:0a:ef:b4:9d:0d:a8:ed: 38:e2:c2:99:a1:4f:0d:42:ad:b8:6c:a5:d7:0e:be:f1: 7a:db:a7:cb:2e:be:63:be:80:15:dd:9b:41:d3:e7:ad: d0:d8:b4:54:ba:9f:51:85:93:36:71:4a:32:7d:fd:c2: 56:2b:74:5d:4c:30:07:f2:8f:98:97:2b:e4:88:64:d5: 02:55:10:0c:b6:c9:1e:e7:08:4b:c1:82:0e:29:02:72: 41:e4:89:51:6a:35:75:bf:f1:6b:67:4f:25:d1:9c:ae: ee:b3:2d:f2:0c:ea:cb:0d:86:dd:0c:0d:38:05:26:e5 Fingerprint (SHA-256): 18:AB:47:A7:5D:F8:4D:8A:23:75:63:06:FB:22:4A:81:E4:CA:71:3B:70:30:0C:1F:35:8D:4B:F2:BE:F0:09:39 Fingerprint (SHA1): 7E:51:F8:46:55:0C:B8:BC:68:E5:85:83:8F:20:EA:AA:13:30:23:12 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5387: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5388: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132783 (0x671f9af) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 19:04:25 2016 Not After : Fri Jan 08 19:04:25 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:12:df:74:55:04:64:8e:39:f0:70:9b:04:a8:6b:88: d9:e4:3b:b5:26:e7:15:c2:fa:61:21:9e:b6:fb:aa:76: 5c:47:91:1a:2c:fe:2d:3f:b7:47:78:7d:8f:2b:32:38: 76:6d:da:d4:b9:98:c7:14:9d:07:d4:a4:15:01:79:f4: 2e:76:ec:a5:39:2f:3f:c7:93:9b:fd:1a:2a:45:53:97: 28:7b:74:e2:25:0b:4b:0b:be:12:a8:6e:97:ce:b0:23: ec:c9:14:0a:7b:93:9a:47:66:34:5c:66:32:7c:51:16: ed:58:9a:aa:e3:6a:06:a1:84:6a:71:f2:94:c0:ad:3d: ec:21:72:ab:31:15:56:05:b8:bd:02:b0:16:0c:a8:88: 29:88:db:7c:a3:b2:94:36:45:fd:61:af:2a:ed:b1:12: de:f4:4a:8f:17:9d:6c:0b:ed:a3:54:af:c4:a5:1e:e9: 9d:6b:1a:6e:09:94:9c:2d:96:df:28:77:2e:aa:05:35: d2:c8:5a:dc:53:df:a2:8b:8e:b3:17:98:39:34:26:41: c8:d5:72:56:6f:73:b9:31:d5:43:f8:78:0f:07:45:01: 55:90:3a:82:c1:ae:53:35:85:60:99:92:6c:52:4f:b4: d4:7b:8d:ff:d5:25:ff:4a:04:d2:eb:09:c7:1a:20:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:d1:d7:60:1b:ed:94:ec:c8:c9:27:f7:2c:80:75:98: 08:92:fc:b3:e0:35:d6:5f:d9:6a:ce:de:5e:69:65:6d: 50:4d:b5:b8:a7:58:f6:38:09:51:c4:35:59:74:4a:28: 46:4a:59:e9:54:96:0e:9f:80:17:af:89:04:a0:f7:6f: 9e:11:5b:46:34:33:d5:1e:03:3c:b6:6b:fd:17:e2:b9: c7:33:0c:50:f6:fd:ba:c7:b2:ee:2a:b6:cd:93:c5:6a: d0:1c:b1:1e:b7:4a:c9:37:a3:bf:70:3f:2f:96:c1:37: 78:e3:f1:7d:ed:4b:a7:7a:b6:72:0f:f1:52:04:aa:22: d8:8c:ac:37:1a:27:e9:4a:45:23:8b:9f:55:f5:df:a5: 14:92:a4:34:7a:78:35:e9:df:11:6e:1d:3f:9d:79:51: aa:3b:a8:6d:62:12:46:5c:0a:e1:e4:62:72:c1:ce:12: 7a:65:f8:04:c0:10:d6:00:20:67:3d:f4:40:14:12:95: 02:c2:68:8b:4b:59:0b:b5:bc:bc:3a:08:98:b6:2d:7b: f6:ba:10:cd:d2:fb:75:8e:3a:cd:5b:0a:e1:c0:a2:06: ba:16:86:84:86:b2:6d:ef:b0:81:5d:a6:25:08:b1:7b: f0:c1:7a:34:a2:54:ca:aa:5c:91:13:f3:e5:31:03:d7 Fingerprint (SHA-256): 44:1F:61:57:F3:4E:F6:F5:42:97:9B:90:D9:ED:5F:DA:73:77:67:BE:B0:CF:AF:67:56:09:B1:0F:F2:09:85:5E Fingerprint (SHA1): AC:FC:F6:90:03:55:B3:E1:A4:9B:50:B7:A5:69:90:54:86:4C:CC:8E Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5389: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5390: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132784 (0x671f9b0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 19:04:34 2016 Not After : Fri Jan 08 19:04:34 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:fc:5d:54:50:30:56:02:04:1e:ec:cf:65:b3:7b:c9: 66:e5:e2:42:c3:20:a8:bc:39:19:e5:d6:96:3e:96:47: bc:a8:5b:f4:9e:c5:88:f4:cc:c1:e0:4a:e4:2b:a2:8d: ae:dc:82:80:a2:60:2b:8a:85:62:da:27:d3:27:56:a4: 8c:f0:e5:ee:38:3b:36:b4:7a:85:cd:c6:c5:98:2e:71: e6:ff:b8:c7:94:91:ec:05:dc:a5:05:06:c9:df:49:e3: 74:13:c6:be:21:e0:38:70:4b:98:35:72:78:3a:76:07: a8:bc:13:6b:99:2c:b4:82:4e:da:c3:40:fa:30:15:60: 5f:4a:36:bd:f1:4e:aa:09:ed:ee:8d:e0:aa:11:7b:49: 13:61:bb:68:0c:ab:42:ba:df:4d:12:6b:74:e9:0e:05: 1c:55:b8:e9:24:c4:60:81:a9:b4:6e:8a:0c:a2:ee:8c: e4:10:4f:ac:49:03:38:0a:81:35:08:37:3e:28:f3:0b: 4b:5a:f6:f0:da:89:34:79:05:1c:7c:20:8d:e6:3c:3f: c9:ad:a8:bf:69:bf:5c:71:eb:10:26:38:91:6a:84:d8: 75:4c:d2:7f:d6:93:b7:c4:70:35:b7:b6:53:4a:95:03: a2:b8:c6:50:ea:3b:38:86:08:d7:16:7c:cf:18:fc:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:6f:69:16:9b:6c:39:ae:d3:a9:f1:11:bf:04:75:33: d9:21:06:c6:fe:62:ba:a2:60:18:14:90:a7:87:c4:1c: 73:4a:78:4e:fd:74:5b:98:26:af:2a:d8:77:9d:ad:39: b0:26:5d:3e:db:ff:44:e1:e6:ab:91:97:72:08:e9:11: e4:eb:28:13:2c:6b:69:c1:34:9d:ee:db:ce:ab:32:01: 41:eb:61:f6:2d:e2:71:e6:74:f2:71:e3:c5:f8:50:b5: de:5c:59:82:18:25:3a:fe:df:6c:9e:0b:e5:d0:0d:3e: 60:ec:04:cf:c1:87:a7:d2:66:6a:e6:0b:8b:33:be:11: ae:bc:79:e1:c5:a5:86:b9:0f:88:e6:b7:eb:06:92:f8: 91:42:55:08:54:d5:9d:f6:e1:c6:86:bd:43:3b:42:56: 80:c0:04:9c:59:98:11:da:16:2b:b2:e9:d7:77:a1:89: 77:1f:63:7e:49:77:fb:02:53:fd:7e:fa:87:43:1d:22: ec:52:64:29:1e:5f:7f:65:e9:08:ab:cf:11:17:9a:37: 11:ca:f9:d3:ef:05:f8:7d:b7:61:1f:ef:e4:7e:c5:c9: aa:2f:ea:01:08:4d:ba:8e:6f:9c:ab:4d:5d:07:82:86: 3c:e7:8f:96:af:07:6b:c8:86:01:82:53:9d:16:3b:04 Fingerprint (SHA-256): 10:19:5F:28:8E:60:6C:E5:26:0D:29:C2:5C:00:08:7F:32:0B:8F:C0:B3:4C:C3:9C:9A:F6:A5:09:A4:1D:7D:0E Fingerprint (SHA1): A6:55:49:BE:1C:35:9D:F2:73:35:05:88:60:D9:6B:BE:65:6B:E8:84 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #5391: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5392: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5393: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132786 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5394: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5395: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5396: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5397: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108132787 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5398: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5399: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5400: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5401: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108132788 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5402: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5403: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #5404: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5405: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 108132789 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5406: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5407: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #5408: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5409: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 108132790 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5410: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5411: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5412: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132786 (0x671f9b2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 19:05:03 2016 Not After : Fri Jan 08 19:05:03 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:b2:ed:89:90:c7:9c:71:fe:15:13:c1:db:63:ed:25: 59:aa:ca:db:bc:68:55:bc:f0:ef:7c:2d:d0:f6:ba:ee: 3e:f9:9f:fc:71:86:3c:a2:16:8e:d4:b2:b4:e1:11:9e: 10:47:f6:4b:fc:61:39:d6:9f:1b:d4:3d:a9:30:a3:a9: 57:a1:e8:23:d1:75:01:56:2d:7d:a0:83:4c:9f:f9:20: 17:2c:46:89:c4:d2:45:8e:62:e5:da:41:ce:20:ef:db: af:70:a7:c1:eb:56:5e:d2:58:6f:65:33:36:ed:27:e8: 8b:99:e0:76:e4:2b:01:19:e1:c8:67:e6:99:e1:27:89: 93:02:7f:6c:11:a5:c8:98:e0:a3:0b:c5:3c:f4:8d:c7: 94:74:bd:89:e8:54:34:96:77:63:4e:af:04:71:33:08: 74:5a:c3:62:b2:f1:d4:9b:89:ed:ff:97:69:09:86:23: 00:37:64:00:a8:01:23:47:ac:ca:e1:45:e9:14:8e:88: 95:11:24:99:c8:15:15:c0:6f:ac:2b:11:db:c2:f7:4b: 54:ee:fa:78:e8:c6:e3:f1:1c:ba:29:26:fe:e5:d3:2c: c3:c1:ac:7b:8e:63:46:81:c8:fb:76:14:cf:ac:91:1c: 50:49:2e:40:f4:1a:13:0c:d8:11:9a:21:07:6f:70:13 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 01:8a:01:93:e9:76:c0:8f:5c:aa:4a:67:7e:34:6b:5d: f2:f7:6b:87:19:3f:7c:81:ad:fe:a0:f6:4d:23:fe:f7: 5c:30:e6:e3:c3:69:41:81:88:3b:41:12:d8:fb:c2:11: 66:ec:45:35:7f:76:17:d5:43:9e:bd:4d:9c:e9:e9:03: 35:84:30:45:da:60:06:9c:39:48:df:6f:6e:cf:73:34: ff:64:f2:a1:27:94:a6:3a:d0:68:06:ee:b1:6f:a7:30: 87:c5:d0:9f:d8:56:c1:37:2c:47:a2:c8:0b:a9:81:04: 19:e1:35:81:44:e0:4c:a4:66:96:a3:a9:2f:29:85:88: 5f:4b:1b:3d:17:7a:80:96:1a:ed:51:e3:96:e3:3e:81: d6:17:c2:aa:e0:91:a5:11:76:6d:d9:bc:5f:5a:19:04: 56:73:ea:26:9e:d1:d9:bf:5f:4e:f4:84:07:96:c2:e9: 17:c9:66:59:bf:5e:00:88:40:1b:13:2e:07:9a:c5:44: 92:23:53:e6:eb:df:7a:77:06:42:16:a2:5c:3c:31:a0: 2f:aa:8c:ed:cf:f6:43:db:47:fc:b7:f1:b2:04:32:4f: 71:03:7e:a6:18:d7:a6:97:01:1e:ad:91:56:59:5a:6d: 9f:39:04:3e:d2:a3:c2:c6:98:45:01:51:fc:cf:0d:6a Fingerprint (SHA-256): 36:31:5C:74:8B:C9:38:16:DB:6F:B5:3C:70:B2:A2:CC:E9:DA:2B:96:D4:92:77:67:FB:0E:C7:2F:00:5D:36:D1 Fingerprint (SHA1): A5:08:3F:83:0D:45:D6:4A:73:37:AB:2A:1B:05:69:15:84:89:E0:C7 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5413: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5414: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132787 (0x671f9b3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 19:05:18 2016 Not After : Fri Jan 08 19:05:18 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:89:e0:11:66:b9:e6:89:42:9a:dd:8d:d4:ac:a4:9a: 24:e7:14:4f:9c:39:fb:4b:72:8e:e3:2b:04:82:12:f0: d8:48:c0:e1:0d:d3:19:58:31:c6:19:a4:59:ac:31:c0: f1:d8:b3:e2:ee:eb:e6:65:b0:a9:95:9f:fd:e0:26:b7: 76:bf:99:49:f9:76:dd:59:fa:e6:48:fd:41:2d:49:58: 44:81:c2:25:40:96:b6:a3:d9:c6:bd:04:fd:eb:af:d0: 40:b3:7e:6c:9b:0f:ae:45:f8:14:61:fe:97:3d:f3:8f: 15:92:ed:e3:1d:e8:74:f1:ff:c8:9d:d1:1e:27:93:e2: 1b:5b:92:4f:8f:cd:70:27:00:70:ea:54:20:b4:a4:fa: f7:4f:68:43:90:67:29:00:68:da:c1:b8:7e:ad:5d:5b: fe:7e:b2:f5:86:2b:d5:f7:bf:51:57:f7:a8:02:6a:49: dd:3d:db:57:e0:0e:96:23:60:fe:9c:aa:fb:73:52:bb: a4:4c:4a:1f:ac:b1:9e:63:b0:a2:d0:ca:70:48:53:ea: 9b:ea:af:0d:91:94:37:39:b7:44:34:d3:46:d4:6e:6a: de:32:ce:58:e8:c0:bd:e6:d6:42:e6:e4:b9:8d:36:d5: cf:1f:b0:e7:41:48:86:21:0d:55:4d:57:d1:65:84:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:9d:58:bd:d2:bd:0c:d9:0c:5b:d4:33:8e:88:11:27: fd:42:2a:8b:97:75:7b:7b:de:d3:4f:db:13:5e:e1:b0: 47:e2:54:34:ad:6c:d8:69:b7:21:c1:f2:4c:5b:ed:94: d8:8c:16:16:9f:b6:9a:d8:8e:78:a2:fd:0d:00:9d:0e: a8:a1:e8:31:3a:41:56:3f:02:0a:e7:aa:b3:21:dd:c7: 9c:0d:77:b0:29:27:5e:ed:e9:56:ba:80:16:87:fe:c4: a4:52:61:06:6c:20:c2:86:48:34:b6:0b:fa:05:a0:5b: a4:ef:41:b9:5d:77:3b:b5:ad:cf:40:73:52:ad:f5:f9: 23:28:d7:d3:82:bb:7f:07:ba:f3:68:da:7f:64:3d:27: 0b:10:0d:b1:a5:94:78:92:b8:a2:3a:ef:d0:14:c6:0c: 74:54:c7:c5:15:cc:96:9f:eb:e6:7d:05:bf:e9:42:5d: 61:93:e6:ec:51:c6:f5:c1:64:a4:1e:f3:c2:c2:8b:6b: a3:42:cd:8b:9e:a9:08:ee:fe:f5:07:c3:2f:ee:ef:0d: b2:97:53:e2:fd:d5:42:32:0d:79:87:b1:ff:5a:53:e7: 33:36:c1:d4:13:7f:da:df:38:42:eb:e0:42:2f:5c:2f: e0:92:16:a1:52:9a:0e:b7:f8:6a:0f:13:75:cd:62:cf Fingerprint (SHA-256): 3F:92:7C:5C:31:93:C3:56:BC:E6:59:77:7A:89:64:F9:D1:12:00:56:09:89:95:32:1E:13:61:90:64:44:80:CE Fingerprint (SHA1): F3:02:51:AF:5A:40:70:21:5F:29:FC:7F:BF:8F:D1:B9:F4:5D:8F:93 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5415: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5416: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132788 (0x671f9b4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 19:05:26 2016 Not After : Fri Jan 08 19:05:26 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:a6:49:5c:81:9a:36:a8:23:58:25:3c:02:63:9c:b3: 37:87:33:34:e9:d2:a2:fb:8c:ec:d9:4b:69:9a:6e:55: 6a:7d:84:12:07:a4:ae:af:51:94:68:63:32:02:77:07: 22:43:e1:44:e3:2e:ac:45:50:72:4c:9b:9f:4d:be:eb: 8c:b7:7a:e3:a9:0d:b7:f8:e5:ee:d2:60:46:24:a8:10: a1:b5:48:ae:72:2e:d8:9f:2b:ea:74:82:d5:2a:73:09: e1:3c:88:e4:14:d3:27:a2:d0:63:98:c8:99:87:cb:1a: 19:10:a1:80:ac:76:13:20:a9:89:f6:b6:c8:04:3f:a9: d6:a2:f2:03:c9:b3:4c:a3:fc:e0:ad:66:a0:c1:1d:ad: a3:09:f7:57:90:75:a8:bf:0e:43:2a:b8:f1:ef:80:88: 22:95:a8:a8:c7:1f:cc:9c:fb:89:6f:e8:d6:48:3a:cc: 07:93:92:4b:1a:f5:36:0e:f7:41:10:45:88:df:b7:db: 3d:04:bf:e4:1a:78:f9:21:70:c7:c3:71:18:a8:9e:7b: 41:80:a9:7d:4b:07:d2:63:58:7f:a6:d8:db:57:25:f4: 93:b3:96:8d:19:23:cf:99:08:1e:ff:f7:54:14:ec:61: 9a:d3:e6:2a:dd:2e:ea:3d:f7:83:90:0d:5a:27:36:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:0b:61:aa:cc:46:9d:45:07:74:38:cc:f9:83:c0:bf: a4:62:fb:39:a6:2a:06:0d:f8:ee:2b:d5:85:aa:58:60: 2f:27:b1:17:62:90:27:5e:b6:9f:ae:76:63:e4:6b:dd: 16:96:fd:2c:4d:31:f9:d5:0b:94:fd:05:55:4e:f5:4f: 49:7b:6b:a9:02:35:3f:b3:82:cf:87:eb:6f:00:f3:64: 04:87:a9:07:eb:6d:54:16:e7:60:55:84:3d:0d:7a:58: 9d:dc:d2:73:cb:8c:6a:03:19:28:19:33:51:70:c2:2b: d9:ba:1c:ce:01:0f:4d:2b:ff:63:fd:21:e7:71:ea:8f: b6:51:84:48:20:2c:26:8e:f4:09:3c:53:b6:0b:19:30: f0:69:1c:d0:ea:9e:83:dc:0e:df:8f:84:6d:4d:78:11: 63:6b:29:d2:ef:9e:6f:43:54:83:89:fe:86:6f:c9:7a: a6:f5:7c:c9:20:26:10:a7:20:a2:2f:ea:38:2e:ca:f2: 07:80:af:39:a2:cd:b2:2e:fd:95:56:ec:13:da:84:94: 40:d3:d3:2a:66:9c:78:71:db:77:08:fc:84:ff:f3:93: 00:cd:a9:1c:c6:04:88:c4:1a:91:01:8d:2d:b8:cd:c8: c4:b0:a2:0a:7d:02:63:21:9e:a0:8d:a7:1f:aa:88:70 Fingerprint (SHA-256): A6:0E:27:71:4B:B5:01:0B:2C:7D:E4:F8:F4:D8:4B:9A:BC:90:E9:53:D6:98:F3:7F:AD:9B:70:8E:CD:E2:C9:A5 Fingerprint (SHA1): 58:E8:CD:B1:2F:2F:3C:E7:C0:1E:4E:EE:13:04:21:75:95:AF:30:97 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #5417: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5418: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #5419: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #5420: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #5421: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132786 (0x671f9b2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 19:05:03 2016 Not After : Fri Jan 08 19:05:03 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:b2:ed:89:90:c7:9c:71:fe:15:13:c1:db:63:ed:25: 59:aa:ca:db:bc:68:55:bc:f0:ef:7c:2d:d0:f6:ba:ee: 3e:f9:9f:fc:71:86:3c:a2:16:8e:d4:b2:b4:e1:11:9e: 10:47:f6:4b:fc:61:39:d6:9f:1b:d4:3d:a9:30:a3:a9: 57:a1:e8:23:d1:75:01:56:2d:7d:a0:83:4c:9f:f9:20: 17:2c:46:89:c4:d2:45:8e:62:e5:da:41:ce:20:ef:db: af:70:a7:c1:eb:56:5e:d2:58:6f:65:33:36:ed:27:e8: 8b:99:e0:76:e4:2b:01:19:e1:c8:67:e6:99:e1:27:89: 93:02:7f:6c:11:a5:c8:98:e0:a3:0b:c5:3c:f4:8d:c7: 94:74:bd:89:e8:54:34:96:77:63:4e:af:04:71:33:08: 74:5a:c3:62:b2:f1:d4:9b:89:ed:ff:97:69:09:86:23: 00:37:64:00:a8:01:23:47:ac:ca:e1:45:e9:14:8e:88: 95:11:24:99:c8:15:15:c0:6f:ac:2b:11:db:c2:f7:4b: 54:ee:fa:78:e8:c6:e3:f1:1c:ba:29:26:fe:e5:d3:2c: c3:c1:ac:7b:8e:63:46:81:c8:fb:76:14:cf:ac:91:1c: 50:49:2e:40:f4:1a:13:0c:d8:11:9a:21:07:6f:70:13 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 01:8a:01:93:e9:76:c0:8f:5c:aa:4a:67:7e:34:6b:5d: f2:f7:6b:87:19:3f:7c:81:ad:fe:a0:f6:4d:23:fe:f7: 5c:30:e6:e3:c3:69:41:81:88:3b:41:12:d8:fb:c2:11: 66:ec:45:35:7f:76:17:d5:43:9e:bd:4d:9c:e9:e9:03: 35:84:30:45:da:60:06:9c:39:48:df:6f:6e:cf:73:34: ff:64:f2:a1:27:94:a6:3a:d0:68:06:ee:b1:6f:a7:30: 87:c5:d0:9f:d8:56:c1:37:2c:47:a2:c8:0b:a9:81:04: 19:e1:35:81:44:e0:4c:a4:66:96:a3:a9:2f:29:85:88: 5f:4b:1b:3d:17:7a:80:96:1a:ed:51:e3:96:e3:3e:81: d6:17:c2:aa:e0:91:a5:11:76:6d:d9:bc:5f:5a:19:04: 56:73:ea:26:9e:d1:d9:bf:5f:4e:f4:84:07:96:c2:e9: 17:c9:66:59:bf:5e:00:88:40:1b:13:2e:07:9a:c5:44: 92:23:53:e6:eb:df:7a:77:06:42:16:a2:5c:3c:31:a0: 2f:aa:8c:ed:cf:f6:43:db:47:fc:b7:f1:b2:04:32:4f: 71:03:7e:a6:18:d7:a6:97:01:1e:ad:91:56:59:5a:6d: 9f:39:04:3e:d2:a3:c2:c6:98:45:01:51:fc:cf:0d:6a Fingerprint (SHA-256): 36:31:5C:74:8B:C9:38:16:DB:6F:B5:3C:70:B2:A2:CC:E9:DA:2B:96:D4:92:77:67:FB:0E:C7:2F:00:5D:36:D1 Fingerprint (SHA1): A5:08:3F:83:0D:45:D6:4A:73:37:AB:2A:1B:05:69:15:84:89:E0:C7 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5422: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5423: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132787 (0x671f9b3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 19:05:18 2016 Not After : Fri Jan 08 19:05:18 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:89:e0:11:66:b9:e6:89:42:9a:dd:8d:d4:ac:a4:9a: 24:e7:14:4f:9c:39:fb:4b:72:8e:e3:2b:04:82:12:f0: d8:48:c0:e1:0d:d3:19:58:31:c6:19:a4:59:ac:31:c0: f1:d8:b3:e2:ee:eb:e6:65:b0:a9:95:9f:fd:e0:26:b7: 76:bf:99:49:f9:76:dd:59:fa:e6:48:fd:41:2d:49:58: 44:81:c2:25:40:96:b6:a3:d9:c6:bd:04:fd:eb:af:d0: 40:b3:7e:6c:9b:0f:ae:45:f8:14:61:fe:97:3d:f3:8f: 15:92:ed:e3:1d:e8:74:f1:ff:c8:9d:d1:1e:27:93:e2: 1b:5b:92:4f:8f:cd:70:27:00:70:ea:54:20:b4:a4:fa: f7:4f:68:43:90:67:29:00:68:da:c1:b8:7e:ad:5d:5b: fe:7e:b2:f5:86:2b:d5:f7:bf:51:57:f7:a8:02:6a:49: dd:3d:db:57:e0:0e:96:23:60:fe:9c:aa:fb:73:52:bb: a4:4c:4a:1f:ac:b1:9e:63:b0:a2:d0:ca:70:48:53:ea: 9b:ea:af:0d:91:94:37:39:b7:44:34:d3:46:d4:6e:6a: de:32:ce:58:e8:c0:bd:e6:d6:42:e6:e4:b9:8d:36:d5: cf:1f:b0:e7:41:48:86:21:0d:55:4d:57:d1:65:84:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:9d:58:bd:d2:bd:0c:d9:0c:5b:d4:33:8e:88:11:27: fd:42:2a:8b:97:75:7b:7b:de:d3:4f:db:13:5e:e1:b0: 47:e2:54:34:ad:6c:d8:69:b7:21:c1:f2:4c:5b:ed:94: d8:8c:16:16:9f:b6:9a:d8:8e:78:a2:fd:0d:00:9d:0e: a8:a1:e8:31:3a:41:56:3f:02:0a:e7:aa:b3:21:dd:c7: 9c:0d:77:b0:29:27:5e:ed:e9:56:ba:80:16:87:fe:c4: a4:52:61:06:6c:20:c2:86:48:34:b6:0b:fa:05:a0:5b: a4:ef:41:b9:5d:77:3b:b5:ad:cf:40:73:52:ad:f5:f9: 23:28:d7:d3:82:bb:7f:07:ba:f3:68:da:7f:64:3d:27: 0b:10:0d:b1:a5:94:78:92:b8:a2:3a:ef:d0:14:c6:0c: 74:54:c7:c5:15:cc:96:9f:eb:e6:7d:05:bf:e9:42:5d: 61:93:e6:ec:51:c6:f5:c1:64:a4:1e:f3:c2:c2:8b:6b: a3:42:cd:8b:9e:a9:08:ee:fe:f5:07:c3:2f:ee:ef:0d: b2:97:53:e2:fd:d5:42:32:0d:79:87:b1:ff:5a:53:e7: 33:36:c1:d4:13:7f:da:df:38:42:eb:e0:42:2f:5c:2f: e0:92:16:a1:52:9a:0e:b7:f8:6a:0f:13:75:cd:62:cf Fingerprint (SHA-256): 3F:92:7C:5C:31:93:C3:56:BC:E6:59:77:7A:89:64:F9:D1:12:00:56:09:89:95:32:1E:13:61:90:64:44:80:CE Fingerprint (SHA1): F3:02:51:AF:5A:40:70:21:5F:29:FC:7F:BF:8F:D1:B9:F4:5D:8F:93 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5424: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5425: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132788 (0x671f9b4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 19:05:26 2016 Not After : Fri Jan 08 19:05:26 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:a6:49:5c:81:9a:36:a8:23:58:25:3c:02:63:9c:b3: 37:87:33:34:e9:d2:a2:fb:8c:ec:d9:4b:69:9a:6e:55: 6a:7d:84:12:07:a4:ae:af:51:94:68:63:32:02:77:07: 22:43:e1:44:e3:2e:ac:45:50:72:4c:9b:9f:4d:be:eb: 8c:b7:7a:e3:a9:0d:b7:f8:e5:ee:d2:60:46:24:a8:10: a1:b5:48:ae:72:2e:d8:9f:2b:ea:74:82:d5:2a:73:09: e1:3c:88:e4:14:d3:27:a2:d0:63:98:c8:99:87:cb:1a: 19:10:a1:80:ac:76:13:20:a9:89:f6:b6:c8:04:3f:a9: d6:a2:f2:03:c9:b3:4c:a3:fc:e0:ad:66:a0:c1:1d:ad: a3:09:f7:57:90:75:a8:bf:0e:43:2a:b8:f1:ef:80:88: 22:95:a8:a8:c7:1f:cc:9c:fb:89:6f:e8:d6:48:3a:cc: 07:93:92:4b:1a:f5:36:0e:f7:41:10:45:88:df:b7:db: 3d:04:bf:e4:1a:78:f9:21:70:c7:c3:71:18:a8:9e:7b: 41:80:a9:7d:4b:07:d2:63:58:7f:a6:d8:db:57:25:f4: 93:b3:96:8d:19:23:cf:99:08:1e:ff:f7:54:14:ec:61: 9a:d3:e6:2a:dd:2e:ea:3d:f7:83:90:0d:5a:27:36:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:0b:61:aa:cc:46:9d:45:07:74:38:cc:f9:83:c0:bf: a4:62:fb:39:a6:2a:06:0d:f8:ee:2b:d5:85:aa:58:60: 2f:27:b1:17:62:90:27:5e:b6:9f:ae:76:63:e4:6b:dd: 16:96:fd:2c:4d:31:f9:d5:0b:94:fd:05:55:4e:f5:4f: 49:7b:6b:a9:02:35:3f:b3:82:cf:87:eb:6f:00:f3:64: 04:87:a9:07:eb:6d:54:16:e7:60:55:84:3d:0d:7a:58: 9d:dc:d2:73:cb:8c:6a:03:19:28:19:33:51:70:c2:2b: d9:ba:1c:ce:01:0f:4d:2b:ff:63:fd:21:e7:71:ea:8f: b6:51:84:48:20:2c:26:8e:f4:09:3c:53:b6:0b:19:30: f0:69:1c:d0:ea:9e:83:dc:0e:df:8f:84:6d:4d:78:11: 63:6b:29:d2:ef:9e:6f:43:54:83:89:fe:86:6f:c9:7a: a6:f5:7c:c9:20:26:10:a7:20:a2:2f:ea:38:2e:ca:f2: 07:80:af:39:a2:cd:b2:2e:fd:95:56:ec:13:da:84:94: 40:d3:d3:2a:66:9c:78:71:db:77:08:fc:84:ff:f3:93: 00:cd:a9:1c:c6:04:88:c4:1a:91:01:8d:2d:b8:cd:c8: c4:b0:a2:0a:7d:02:63:21:9e:a0:8d:a7:1f:aa:88:70 Fingerprint (SHA-256): A6:0E:27:71:4B:B5:01:0B:2C:7D:E4:F8:F4:D8:4B:9A:BC:90:E9:53:D6:98:F3:7F:AD:9B:70:8E:CD:E2:C9:A5 Fingerprint (SHA1): 58:E8:CD:B1:2F:2F:3C:E7:C0:1E:4E:EE:13:04:21:75:95:AF:30:97 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #5426: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5427: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132786 (0x671f9b2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 19:05:03 2016 Not After : Fri Jan 08 19:05:03 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:b2:ed:89:90:c7:9c:71:fe:15:13:c1:db:63:ed:25: 59:aa:ca:db:bc:68:55:bc:f0:ef:7c:2d:d0:f6:ba:ee: 3e:f9:9f:fc:71:86:3c:a2:16:8e:d4:b2:b4:e1:11:9e: 10:47:f6:4b:fc:61:39:d6:9f:1b:d4:3d:a9:30:a3:a9: 57:a1:e8:23:d1:75:01:56:2d:7d:a0:83:4c:9f:f9:20: 17:2c:46:89:c4:d2:45:8e:62:e5:da:41:ce:20:ef:db: af:70:a7:c1:eb:56:5e:d2:58:6f:65:33:36:ed:27:e8: 8b:99:e0:76:e4:2b:01:19:e1:c8:67:e6:99:e1:27:89: 93:02:7f:6c:11:a5:c8:98:e0:a3:0b:c5:3c:f4:8d:c7: 94:74:bd:89:e8:54:34:96:77:63:4e:af:04:71:33:08: 74:5a:c3:62:b2:f1:d4:9b:89:ed:ff:97:69:09:86:23: 00:37:64:00:a8:01:23:47:ac:ca:e1:45:e9:14:8e:88: 95:11:24:99:c8:15:15:c0:6f:ac:2b:11:db:c2:f7:4b: 54:ee:fa:78:e8:c6:e3:f1:1c:ba:29:26:fe:e5:d3:2c: c3:c1:ac:7b:8e:63:46:81:c8:fb:76:14:cf:ac:91:1c: 50:49:2e:40:f4:1a:13:0c:d8:11:9a:21:07:6f:70:13 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 01:8a:01:93:e9:76:c0:8f:5c:aa:4a:67:7e:34:6b:5d: f2:f7:6b:87:19:3f:7c:81:ad:fe:a0:f6:4d:23:fe:f7: 5c:30:e6:e3:c3:69:41:81:88:3b:41:12:d8:fb:c2:11: 66:ec:45:35:7f:76:17:d5:43:9e:bd:4d:9c:e9:e9:03: 35:84:30:45:da:60:06:9c:39:48:df:6f:6e:cf:73:34: ff:64:f2:a1:27:94:a6:3a:d0:68:06:ee:b1:6f:a7:30: 87:c5:d0:9f:d8:56:c1:37:2c:47:a2:c8:0b:a9:81:04: 19:e1:35:81:44:e0:4c:a4:66:96:a3:a9:2f:29:85:88: 5f:4b:1b:3d:17:7a:80:96:1a:ed:51:e3:96:e3:3e:81: d6:17:c2:aa:e0:91:a5:11:76:6d:d9:bc:5f:5a:19:04: 56:73:ea:26:9e:d1:d9:bf:5f:4e:f4:84:07:96:c2:e9: 17:c9:66:59:bf:5e:00:88:40:1b:13:2e:07:9a:c5:44: 92:23:53:e6:eb:df:7a:77:06:42:16:a2:5c:3c:31:a0: 2f:aa:8c:ed:cf:f6:43:db:47:fc:b7:f1:b2:04:32:4f: 71:03:7e:a6:18:d7:a6:97:01:1e:ad:91:56:59:5a:6d: 9f:39:04:3e:d2:a3:c2:c6:98:45:01:51:fc:cf:0d:6a Fingerprint (SHA-256): 36:31:5C:74:8B:C9:38:16:DB:6F:B5:3C:70:B2:A2:CC:E9:DA:2B:96:D4:92:77:67:FB:0E:C7:2F:00:5D:36:D1 Fingerprint (SHA1): A5:08:3F:83:0D:45:D6:4A:73:37:AB:2A:1B:05:69:15:84:89:E0:C7 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5428: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132786 (0x671f9b2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 19:05:03 2016 Not After : Fri Jan 08 19:05:03 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:b2:ed:89:90:c7:9c:71:fe:15:13:c1:db:63:ed:25: 59:aa:ca:db:bc:68:55:bc:f0:ef:7c:2d:d0:f6:ba:ee: 3e:f9:9f:fc:71:86:3c:a2:16:8e:d4:b2:b4:e1:11:9e: 10:47:f6:4b:fc:61:39:d6:9f:1b:d4:3d:a9:30:a3:a9: 57:a1:e8:23:d1:75:01:56:2d:7d:a0:83:4c:9f:f9:20: 17:2c:46:89:c4:d2:45:8e:62:e5:da:41:ce:20:ef:db: af:70:a7:c1:eb:56:5e:d2:58:6f:65:33:36:ed:27:e8: 8b:99:e0:76:e4:2b:01:19:e1:c8:67:e6:99:e1:27:89: 93:02:7f:6c:11:a5:c8:98:e0:a3:0b:c5:3c:f4:8d:c7: 94:74:bd:89:e8:54:34:96:77:63:4e:af:04:71:33:08: 74:5a:c3:62:b2:f1:d4:9b:89:ed:ff:97:69:09:86:23: 00:37:64:00:a8:01:23:47:ac:ca:e1:45:e9:14:8e:88: 95:11:24:99:c8:15:15:c0:6f:ac:2b:11:db:c2:f7:4b: 54:ee:fa:78:e8:c6:e3:f1:1c:ba:29:26:fe:e5:d3:2c: c3:c1:ac:7b:8e:63:46:81:c8:fb:76:14:cf:ac:91:1c: 50:49:2e:40:f4:1a:13:0c:d8:11:9a:21:07:6f:70:13 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 01:8a:01:93:e9:76:c0:8f:5c:aa:4a:67:7e:34:6b:5d: f2:f7:6b:87:19:3f:7c:81:ad:fe:a0:f6:4d:23:fe:f7: 5c:30:e6:e3:c3:69:41:81:88:3b:41:12:d8:fb:c2:11: 66:ec:45:35:7f:76:17:d5:43:9e:bd:4d:9c:e9:e9:03: 35:84:30:45:da:60:06:9c:39:48:df:6f:6e:cf:73:34: ff:64:f2:a1:27:94:a6:3a:d0:68:06:ee:b1:6f:a7:30: 87:c5:d0:9f:d8:56:c1:37:2c:47:a2:c8:0b:a9:81:04: 19:e1:35:81:44:e0:4c:a4:66:96:a3:a9:2f:29:85:88: 5f:4b:1b:3d:17:7a:80:96:1a:ed:51:e3:96:e3:3e:81: d6:17:c2:aa:e0:91:a5:11:76:6d:d9:bc:5f:5a:19:04: 56:73:ea:26:9e:d1:d9:bf:5f:4e:f4:84:07:96:c2:e9: 17:c9:66:59:bf:5e:00:88:40:1b:13:2e:07:9a:c5:44: 92:23:53:e6:eb:df:7a:77:06:42:16:a2:5c:3c:31:a0: 2f:aa:8c:ed:cf:f6:43:db:47:fc:b7:f1:b2:04:32:4f: 71:03:7e:a6:18:d7:a6:97:01:1e:ad:91:56:59:5a:6d: 9f:39:04:3e:d2:a3:c2:c6:98:45:01:51:fc:cf:0d:6a Fingerprint (SHA-256): 36:31:5C:74:8B:C9:38:16:DB:6F:B5:3C:70:B2:A2:CC:E9:DA:2B:96:D4:92:77:67:FB:0E:C7:2F:00:5D:36:D1 Fingerprint (SHA1): A5:08:3F:83:0D:45:D6:4A:73:37:AB:2A:1B:05:69:15:84:89:E0:C7 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5429: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132787 (0x671f9b3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 19:05:18 2016 Not After : Fri Jan 08 19:05:18 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:89:e0:11:66:b9:e6:89:42:9a:dd:8d:d4:ac:a4:9a: 24:e7:14:4f:9c:39:fb:4b:72:8e:e3:2b:04:82:12:f0: d8:48:c0:e1:0d:d3:19:58:31:c6:19:a4:59:ac:31:c0: f1:d8:b3:e2:ee:eb:e6:65:b0:a9:95:9f:fd:e0:26:b7: 76:bf:99:49:f9:76:dd:59:fa:e6:48:fd:41:2d:49:58: 44:81:c2:25:40:96:b6:a3:d9:c6:bd:04:fd:eb:af:d0: 40:b3:7e:6c:9b:0f:ae:45:f8:14:61:fe:97:3d:f3:8f: 15:92:ed:e3:1d:e8:74:f1:ff:c8:9d:d1:1e:27:93:e2: 1b:5b:92:4f:8f:cd:70:27:00:70:ea:54:20:b4:a4:fa: f7:4f:68:43:90:67:29:00:68:da:c1:b8:7e:ad:5d:5b: fe:7e:b2:f5:86:2b:d5:f7:bf:51:57:f7:a8:02:6a:49: dd:3d:db:57:e0:0e:96:23:60:fe:9c:aa:fb:73:52:bb: a4:4c:4a:1f:ac:b1:9e:63:b0:a2:d0:ca:70:48:53:ea: 9b:ea:af:0d:91:94:37:39:b7:44:34:d3:46:d4:6e:6a: de:32:ce:58:e8:c0:bd:e6:d6:42:e6:e4:b9:8d:36:d5: cf:1f:b0:e7:41:48:86:21:0d:55:4d:57:d1:65:84:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:9d:58:bd:d2:bd:0c:d9:0c:5b:d4:33:8e:88:11:27: fd:42:2a:8b:97:75:7b:7b:de:d3:4f:db:13:5e:e1:b0: 47:e2:54:34:ad:6c:d8:69:b7:21:c1:f2:4c:5b:ed:94: d8:8c:16:16:9f:b6:9a:d8:8e:78:a2:fd:0d:00:9d:0e: a8:a1:e8:31:3a:41:56:3f:02:0a:e7:aa:b3:21:dd:c7: 9c:0d:77:b0:29:27:5e:ed:e9:56:ba:80:16:87:fe:c4: a4:52:61:06:6c:20:c2:86:48:34:b6:0b:fa:05:a0:5b: a4:ef:41:b9:5d:77:3b:b5:ad:cf:40:73:52:ad:f5:f9: 23:28:d7:d3:82:bb:7f:07:ba:f3:68:da:7f:64:3d:27: 0b:10:0d:b1:a5:94:78:92:b8:a2:3a:ef:d0:14:c6:0c: 74:54:c7:c5:15:cc:96:9f:eb:e6:7d:05:bf:e9:42:5d: 61:93:e6:ec:51:c6:f5:c1:64:a4:1e:f3:c2:c2:8b:6b: a3:42:cd:8b:9e:a9:08:ee:fe:f5:07:c3:2f:ee:ef:0d: b2:97:53:e2:fd:d5:42:32:0d:79:87:b1:ff:5a:53:e7: 33:36:c1:d4:13:7f:da:df:38:42:eb:e0:42:2f:5c:2f: e0:92:16:a1:52:9a:0e:b7:f8:6a:0f:13:75:cd:62:cf Fingerprint (SHA-256): 3F:92:7C:5C:31:93:C3:56:BC:E6:59:77:7A:89:64:F9:D1:12:00:56:09:89:95:32:1E:13:61:90:64:44:80:CE Fingerprint (SHA1): F3:02:51:AF:5A:40:70:21:5F:29:FC:7F:BF:8F:D1:B9:F4:5D:8F:93 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5430: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132787 (0x671f9b3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 19:05:18 2016 Not After : Fri Jan 08 19:05:18 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:89:e0:11:66:b9:e6:89:42:9a:dd:8d:d4:ac:a4:9a: 24:e7:14:4f:9c:39:fb:4b:72:8e:e3:2b:04:82:12:f0: d8:48:c0:e1:0d:d3:19:58:31:c6:19:a4:59:ac:31:c0: f1:d8:b3:e2:ee:eb:e6:65:b0:a9:95:9f:fd:e0:26:b7: 76:bf:99:49:f9:76:dd:59:fa:e6:48:fd:41:2d:49:58: 44:81:c2:25:40:96:b6:a3:d9:c6:bd:04:fd:eb:af:d0: 40:b3:7e:6c:9b:0f:ae:45:f8:14:61:fe:97:3d:f3:8f: 15:92:ed:e3:1d:e8:74:f1:ff:c8:9d:d1:1e:27:93:e2: 1b:5b:92:4f:8f:cd:70:27:00:70:ea:54:20:b4:a4:fa: f7:4f:68:43:90:67:29:00:68:da:c1:b8:7e:ad:5d:5b: fe:7e:b2:f5:86:2b:d5:f7:bf:51:57:f7:a8:02:6a:49: dd:3d:db:57:e0:0e:96:23:60:fe:9c:aa:fb:73:52:bb: a4:4c:4a:1f:ac:b1:9e:63:b0:a2:d0:ca:70:48:53:ea: 9b:ea:af:0d:91:94:37:39:b7:44:34:d3:46:d4:6e:6a: de:32:ce:58:e8:c0:bd:e6:d6:42:e6:e4:b9:8d:36:d5: cf:1f:b0:e7:41:48:86:21:0d:55:4d:57:d1:65:84:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:9d:58:bd:d2:bd:0c:d9:0c:5b:d4:33:8e:88:11:27: fd:42:2a:8b:97:75:7b:7b:de:d3:4f:db:13:5e:e1:b0: 47:e2:54:34:ad:6c:d8:69:b7:21:c1:f2:4c:5b:ed:94: d8:8c:16:16:9f:b6:9a:d8:8e:78:a2:fd:0d:00:9d:0e: a8:a1:e8:31:3a:41:56:3f:02:0a:e7:aa:b3:21:dd:c7: 9c:0d:77:b0:29:27:5e:ed:e9:56:ba:80:16:87:fe:c4: a4:52:61:06:6c:20:c2:86:48:34:b6:0b:fa:05:a0:5b: a4:ef:41:b9:5d:77:3b:b5:ad:cf:40:73:52:ad:f5:f9: 23:28:d7:d3:82:bb:7f:07:ba:f3:68:da:7f:64:3d:27: 0b:10:0d:b1:a5:94:78:92:b8:a2:3a:ef:d0:14:c6:0c: 74:54:c7:c5:15:cc:96:9f:eb:e6:7d:05:bf:e9:42:5d: 61:93:e6:ec:51:c6:f5:c1:64:a4:1e:f3:c2:c2:8b:6b: a3:42:cd:8b:9e:a9:08:ee:fe:f5:07:c3:2f:ee:ef:0d: b2:97:53:e2:fd:d5:42:32:0d:79:87:b1:ff:5a:53:e7: 33:36:c1:d4:13:7f:da:df:38:42:eb:e0:42:2f:5c:2f: e0:92:16:a1:52:9a:0e:b7:f8:6a:0f:13:75:cd:62:cf Fingerprint (SHA-256): 3F:92:7C:5C:31:93:C3:56:BC:E6:59:77:7A:89:64:F9:D1:12:00:56:09:89:95:32:1E:13:61:90:64:44:80:CE Fingerprint (SHA1): F3:02:51:AF:5A:40:70:21:5F:29:FC:7F:BF:8F:D1:B9:F4:5D:8F:93 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5431: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132788 (0x671f9b4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 19:05:26 2016 Not After : Fri Jan 08 19:05:26 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:a6:49:5c:81:9a:36:a8:23:58:25:3c:02:63:9c:b3: 37:87:33:34:e9:d2:a2:fb:8c:ec:d9:4b:69:9a:6e:55: 6a:7d:84:12:07:a4:ae:af:51:94:68:63:32:02:77:07: 22:43:e1:44:e3:2e:ac:45:50:72:4c:9b:9f:4d:be:eb: 8c:b7:7a:e3:a9:0d:b7:f8:e5:ee:d2:60:46:24:a8:10: a1:b5:48:ae:72:2e:d8:9f:2b:ea:74:82:d5:2a:73:09: e1:3c:88:e4:14:d3:27:a2:d0:63:98:c8:99:87:cb:1a: 19:10:a1:80:ac:76:13:20:a9:89:f6:b6:c8:04:3f:a9: d6:a2:f2:03:c9:b3:4c:a3:fc:e0:ad:66:a0:c1:1d:ad: a3:09:f7:57:90:75:a8:bf:0e:43:2a:b8:f1:ef:80:88: 22:95:a8:a8:c7:1f:cc:9c:fb:89:6f:e8:d6:48:3a:cc: 07:93:92:4b:1a:f5:36:0e:f7:41:10:45:88:df:b7:db: 3d:04:bf:e4:1a:78:f9:21:70:c7:c3:71:18:a8:9e:7b: 41:80:a9:7d:4b:07:d2:63:58:7f:a6:d8:db:57:25:f4: 93:b3:96:8d:19:23:cf:99:08:1e:ff:f7:54:14:ec:61: 9a:d3:e6:2a:dd:2e:ea:3d:f7:83:90:0d:5a:27:36:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:0b:61:aa:cc:46:9d:45:07:74:38:cc:f9:83:c0:bf: a4:62:fb:39:a6:2a:06:0d:f8:ee:2b:d5:85:aa:58:60: 2f:27:b1:17:62:90:27:5e:b6:9f:ae:76:63:e4:6b:dd: 16:96:fd:2c:4d:31:f9:d5:0b:94:fd:05:55:4e:f5:4f: 49:7b:6b:a9:02:35:3f:b3:82:cf:87:eb:6f:00:f3:64: 04:87:a9:07:eb:6d:54:16:e7:60:55:84:3d:0d:7a:58: 9d:dc:d2:73:cb:8c:6a:03:19:28:19:33:51:70:c2:2b: d9:ba:1c:ce:01:0f:4d:2b:ff:63:fd:21:e7:71:ea:8f: b6:51:84:48:20:2c:26:8e:f4:09:3c:53:b6:0b:19:30: f0:69:1c:d0:ea:9e:83:dc:0e:df:8f:84:6d:4d:78:11: 63:6b:29:d2:ef:9e:6f:43:54:83:89:fe:86:6f:c9:7a: a6:f5:7c:c9:20:26:10:a7:20:a2:2f:ea:38:2e:ca:f2: 07:80:af:39:a2:cd:b2:2e:fd:95:56:ec:13:da:84:94: 40:d3:d3:2a:66:9c:78:71:db:77:08:fc:84:ff:f3:93: 00:cd:a9:1c:c6:04:88:c4:1a:91:01:8d:2d:b8:cd:c8: c4:b0:a2:0a:7d:02:63:21:9e:a0:8d:a7:1f:aa:88:70 Fingerprint (SHA-256): A6:0E:27:71:4B:B5:01:0B:2C:7D:E4:F8:F4:D8:4B:9A:BC:90:E9:53:D6:98:F3:7F:AD:9B:70:8E:CD:E2:C9:A5 Fingerprint (SHA1): 58:E8:CD:B1:2F:2F:3C:E7:C0:1E:4E:EE:13:04:21:75:95:AF:30:97 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #5432: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132788 (0x671f9b4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 19:05:26 2016 Not After : Fri Jan 08 19:05:26 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:a6:49:5c:81:9a:36:a8:23:58:25:3c:02:63:9c:b3: 37:87:33:34:e9:d2:a2:fb:8c:ec:d9:4b:69:9a:6e:55: 6a:7d:84:12:07:a4:ae:af:51:94:68:63:32:02:77:07: 22:43:e1:44:e3:2e:ac:45:50:72:4c:9b:9f:4d:be:eb: 8c:b7:7a:e3:a9:0d:b7:f8:e5:ee:d2:60:46:24:a8:10: a1:b5:48:ae:72:2e:d8:9f:2b:ea:74:82:d5:2a:73:09: e1:3c:88:e4:14:d3:27:a2:d0:63:98:c8:99:87:cb:1a: 19:10:a1:80:ac:76:13:20:a9:89:f6:b6:c8:04:3f:a9: d6:a2:f2:03:c9:b3:4c:a3:fc:e0:ad:66:a0:c1:1d:ad: a3:09:f7:57:90:75:a8:bf:0e:43:2a:b8:f1:ef:80:88: 22:95:a8:a8:c7:1f:cc:9c:fb:89:6f:e8:d6:48:3a:cc: 07:93:92:4b:1a:f5:36:0e:f7:41:10:45:88:df:b7:db: 3d:04:bf:e4:1a:78:f9:21:70:c7:c3:71:18:a8:9e:7b: 41:80:a9:7d:4b:07:d2:63:58:7f:a6:d8:db:57:25:f4: 93:b3:96:8d:19:23:cf:99:08:1e:ff:f7:54:14:ec:61: 9a:d3:e6:2a:dd:2e:ea:3d:f7:83:90:0d:5a:27:36:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:0b:61:aa:cc:46:9d:45:07:74:38:cc:f9:83:c0:bf: a4:62:fb:39:a6:2a:06:0d:f8:ee:2b:d5:85:aa:58:60: 2f:27:b1:17:62:90:27:5e:b6:9f:ae:76:63:e4:6b:dd: 16:96:fd:2c:4d:31:f9:d5:0b:94:fd:05:55:4e:f5:4f: 49:7b:6b:a9:02:35:3f:b3:82:cf:87:eb:6f:00:f3:64: 04:87:a9:07:eb:6d:54:16:e7:60:55:84:3d:0d:7a:58: 9d:dc:d2:73:cb:8c:6a:03:19:28:19:33:51:70:c2:2b: d9:ba:1c:ce:01:0f:4d:2b:ff:63:fd:21:e7:71:ea:8f: b6:51:84:48:20:2c:26:8e:f4:09:3c:53:b6:0b:19:30: f0:69:1c:d0:ea:9e:83:dc:0e:df:8f:84:6d:4d:78:11: 63:6b:29:d2:ef:9e:6f:43:54:83:89:fe:86:6f:c9:7a: a6:f5:7c:c9:20:26:10:a7:20:a2:2f:ea:38:2e:ca:f2: 07:80:af:39:a2:cd:b2:2e:fd:95:56:ec:13:da:84:94: 40:d3:d3:2a:66:9c:78:71:db:77:08:fc:84:ff:f3:93: 00:cd:a9:1c:c6:04:88:c4:1a:91:01:8d:2d:b8:cd:c8: c4:b0:a2:0a:7d:02:63:21:9e:a0:8d:a7:1f:aa:88:70 Fingerprint (SHA-256): A6:0E:27:71:4B:B5:01:0B:2C:7D:E4:F8:F4:D8:4B:9A:BC:90:E9:53:D6:98:F3:7F:AD:9B:70:8E:CD:E2:C9:A5 Fingerprint (SHA1): 58:E8:CD:B1:2F:2F:3C:E7:C0:1E:4E:EE:13:04:21:75:95:AF:30:97 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #5433: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #5434: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132791 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5435: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #5436: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5437: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5438: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108132792 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5439: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5440: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5441: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5442: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108132793 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #5443: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5444: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #5445: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5446: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 108132794 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5447: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5448: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #5449: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5450: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 108132795 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5451: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5452: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #5453: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5454: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 108132796 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5455: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5456: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #5457: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5458: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 108132797 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5459: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5460: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5461: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #5462: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #5463: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #5464: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #5465: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132791 (0x671f9b7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 19:06:37 2016 Not After : Fri Jan 08 19:06:37 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:d7:09:58:85:fa:81:72:ab:45:05:eb:b2:2c:6b:23: de:98:c5:51:53:a7:4c:e6:e8:94:96:2a:29:6a:2d:f8: 36:4c:92:0e:7e:ff:de:8f:37:34:06:b8:4a:cd:2a:eb: 06:0f:bb:7c:7e:7a:fa:7e:22:43:95:54:2b:3f:b5:c0: bc:5a:d7:bb:bc:fc:d0:62:ad:94:fd:97:82:ed:9d:76: 4f:68:67:ce:3b:43:22:6a:87:5d:32:13:25:88:18:1e: d8:98:f9:43:08:b2:8b:2d:30:62:b8:74:94:30:bf:0d: 45:b0:4b:3c:a9:4f:41:36:78:f2:68:e2:06:18:62:f7: 8f:de:d7:5c:4c:5b:38:ae:86:49:08:2d:cb:cd:b5:7d: 42:ef:54:ee:71:17:a6:a9:14:e4:11:88:38:07:68:4d: 12:7c:d9:4b:0c:e4:a4:e1:fc:55:7e:81:49:c8:08:14: c6:b9:1a:a9:d3:1b:3e:74:15:86:9f:28:37:b9:dc:fc: dd:52:04:ee:b7:b0:82:e3:19:60:fd:0f:14:79:da:b5: 33:51:62:39:47:ec:b2:12:45:8a:d0:81:e8:d8:4c:34: e8:11:df:9a:f5:a9:fc:b5:1e:a6:15:30:45:e0:2c:48: 78:11:6f:01:b4:a8:ee:54:1f:78:39:90:4f:0e:58:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:97:89:83:0a:75:5b:94:4e:3f:aa:5a:75:e7:0b:2a: 05:f5:a9:f7:65:0b:d1:93:45:7b:c1:6d:33:6e:bd:c1: 1c:79:a8:fa:a5:6e:52:81:59:17:99:2a:fe:e6:99:d8: b5:73:80:84:76:82:03:e0:4c:8d:a0:92:a0:d9:f7:ae: bd:db:bf:39:d2:79:07:a5:04:21:50:c5:e3:04:7a:e0: 0e:0c:6c:0d:39:4b:84:c5:12:51:59:6b:58:8c:eb:7b: 14:dc:9e:00:97:33:ba:60:9a:94:6d:35:43:81:13:3a: 96:02:4b:f5:56:64:c3:0b:6d:27:ac:7b:9d:03:3a:b2: 5e:c5:64:b4:4a:7e:11:28:0d:14:54:b4:66:9f:7d:6b: 7b:5d:1a:65:24:63:50:88:c6:c8:b5:fd:48:0f:ed:79: 8f:24:ab:55:36:93:bb:1c:1a:25:67:2a:89:6a:dc:59: e3:4e:7f:74:b9:c0:b5:e8:49:96:f8:91:89:13:0a:f6: 4b:82:9f:78:be:3d:a0:47:1b:59:77:71:7b:fc:44:64: cc:34:9d:12:5d:f8:52:60:37:5b:4e:5e:d2:4b:42:6b: 50:9f:ef:5b:b8:0c:62:74:c0:e8:10:89:fb:94:3a:ce: 90:ba:06:d7:e5:1b:a5:25:73:a7:3a:75:47:43:e0:5d Fingerprint (SHA-256): B9:87:F7:9F:8A:62:A4:FC:FC:A1:15:60:92:3C:33:43:BB:08:48:10:E4:74:5F:94:58:5A:A6:51:3E:37:95:7E Fingerprint (SHA1): 96:F1:A3:E9:D7:DF:E0:BB:42:0D:81:39:43:14:08:4F:93:FA:18:67 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5466: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5467: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5468: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5469: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132791 (0x671f9b7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 19:06:37 2016 Not After : Fri Jan 08 19:06:37 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:d7:09:58:85:fa:81:72:ab:45:05:eb:b2:2c:6b:23: de:98:c5:51:53:a7:4c:e6:e8:94:96:2a:29:6a:2d:f8: 36:4c:92:0e:7e:ff:de:8f:37:34:06:b8:4a:cd:2a:eb: 06:0f:bb:7c:7e:7a:fa:7e:22:43:95:54:2b:3f:b5:c0: bc:5a:d7:bb:bc:fc:d0:62:ad:94:fd:97:82:ed:9d:76: 4f:68:67:ce:3b:43:22:6a:87:5d:32:13:25:88:18:1e: d8:98:f9:43:08:b2:8b:2d:30:62:b8:74:94:30:bf:0d: 45:b0:4b:3c:a9:4f:41:36:78:f2:68:e2:06:18:62:f7: 8f:de:d7:5c:4c:5b:38:ae:86:49:08:2d:cb:cd:b5:7d: 42:ef:54:ee:71:17:a6:a9:14:e4:11:88:38:07:68:4d: 12:7c:d9:4b:0c:e4:a4:e1:fc:55:7e:81:49:c8:08:14: c6:b9:1a:a9:d3:1b:3e:74:15:86:9f:28:37:b9:dc:fc: dd:52:04:ee:b7:b0:82:e3:19:60:fd:0f:14:79:da:b5: 33:51:62:39:47:ec:b2:12:45:8a:d0:81:e8:d8:4c:34: e8:11:df:9a:f5:a9:fc:b5:1e:a6:15:30:45:e0:2c:48: 78:11:6f:01:b4:a8:ee:54:1f:78:39:90:4f:0e:58:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:97:89:83:0a:75:5b:94:4e:3f:aa:5a:75:e7:0b:2a: 05:f5:a9:f7:65:0b:d1:93:45:7b:c1:6d:33:6e:bd:c1: 1c:79:a8:fa:a5:6e:52:81:59:17:99:2a:fe:e6:99:d8: b5:73:80:84:76:82:03:e0:4c:8d:a0:92:a0:d9:f7:ae: bd:db:bf:39:d2:79:07:a5:04:21:50:c5:e3:04:7a:e0: 0e:0c:6c:0d:39:4b:84:c5:12:51:59:6b:58:8c:eb:7b: 14:dc:9e:00:97:33:ba:60:9a:94:6d:35:43:81:13:3a: 96:02:4b:f5:56:64:c3:0b:6d:27:ac:7b:9d:03:3a:b2: 5e:c5:64:b4:4a:7e:11:28:0d:14:54:b4:66:9f:7d:6b: 7b:5d:1a:65:24:63:50:88:c6:c8:b5:fd:48:0f:ed:79: 8f:24:ab:55:36:93:bb:1c:1a:25:67:2a:89:6a:dc:59: e3:4e:7f:74:b9:c0:b5:e8:49:96:f8:91:89:13:0a:f6: 4b:82:9f:78:be:3d:a0:47:1b:59:77:71:7b:fc:44:64: cc:34:9d:12:5d:f8:52:60:37:5b:4e:5e:d2:4b:42:6b: 50:9f:ef:5b:b8:0c:62:74:c0:e8:10:89:fb:94:3a:ce: 90:ba:06:d7:e5:1b:a5:25:73:a7:3a:75:47:43:e0:5d Fingerprint (SHA-256): B9:87:F7:9F:8A:62:A4:FC:FC:A1:15:60:92:3C:33:43:BB:08:48:10:E4:74:5F:94:58:5A:A6:51:3E:37:95:7E Fingerprint (SHA1): 96:F1:A3:E9:D7:DF:E0:BB:42:0D:81:39:43:14:08:4F:93:FA:18:67 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5470: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5471: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #5472: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132798 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5473: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #5474: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5475: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5476: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108132799 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #5477: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5478: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #5479: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5480: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 108132800 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5481: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5482: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #5483: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5484: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 108132801 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5485: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5486: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5487: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5488: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 108132802 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5489: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5490: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #5491: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5492: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 108132803 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5493: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5494: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #5495: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5496: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 108132804 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5497: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5498: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5499: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5500: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 108132805 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5501: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5502: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #5503: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5504: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 108132806 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #5505: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5506: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #5507: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5508: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 108132807 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5509: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5510: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #5511: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5512: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 108132808 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5513: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5514: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #5515: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5516: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 108132809 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5517: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5518: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #5519: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5520: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 108132810 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5521: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5522: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #5523: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5524: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 108132811 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5525: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5526: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #5527: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5528: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 108132812 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5529: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5530: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #5531: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5532: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 108132813 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5533: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5534: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #5535: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5536: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 108132814 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5537: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5538: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #5539: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5540: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 108132815 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #5541: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5542: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #5543: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5544: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 108132816 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5545: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5546: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #5547: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5548: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 108132817 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5549: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5550: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #5551: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5552: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 108132818 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5553: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5554: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #5555: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5556: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 108132819 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5557: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5558: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #5559: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5560: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 108132820 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5561: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5562: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #5563: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5564: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 108132821 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5565: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5566: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #5567: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5568: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 108132822 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5569: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5570: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #5571: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5572: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 108132823 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5573: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5574: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #5575: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5576: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 108132824 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5577: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5578: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #5579: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5580: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 108132825 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5581: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5582: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #5583: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5584: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 108132826 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5585: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5586: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #5587: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5588: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 108132827 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5589: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5590: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5591: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132798 (0x671f9be) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 19:08:06 2016 Not After : Fri Jan 08 19:08:06 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:76:76:10:c7:2b:35:4d:b1:00:34:7d:e2:de:ef:59: fe:a2:7f:22:0c:90:c9:4b:54:89:9d:5d:f0:75:60:1e: 45:cd:a8:07:57:df:c6:e3:2b:a6:f0:1e:a9:2e:26:bf: b5:77:67:22:4d:2e:61:98:69:d6:40:9a:37:60:a0:97: 2f:73:1a:4a:65:87:77:b8:f9:59:03:44:ec:35:a3:f9: ce:ac:89:f7:c5:b7:be:ab:a6:ed:65:0b:5a:c1:df:a9: 96:31:0f:f2:fc:fc:ef:7a:bb:ca:c4:ed:3f:0e:82:ec: a5:cf:f9:9b:bf:95:e5:64:b0:0c:66:35:18:82:2b:d9: 16:35:ef:4b:82:b4:43:26:84:e1:a8:2f:ca:3a:3f:43: 3c:44:17:1f:a8:02:a0:67:f9:07:02:72:5e:4a:ff:19: 99:ac:07:37:87:29:38:e1:f4:37:1c:bc:2a:08:50:14: da:09:cc:74:fa:1d:b3:b6:c7:87:52:ab:d5:51:b4:36: 20:b2:ef:97:11:5a:34:b7:0e:15:dd:07:78:bc:d0:c9: ce:11:99:ff:49:4f:0e:de:18:7f:d5:23:f7:a4:96:b6: df:5d:ae:c3:a2:e9:8f:cc:7b:15:bd:88:21:9a:dd:fa: 11:3f:b2:b4:9f:4a:f5:8a:65:9f:4d:6b:88:29:cd:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3a:4e:ab:83:7f:87:89:01:20:ed:f7:23:a8:1a:25:d5: ca:91:a4:38:4b:ec:13:78:75:c9:87:be:aa:28:fc:28: d1:08:a6:16:07:72:d0:ab:25:df:51:78:f6:c8:4f:01: dd:82:d2:ad:6a:21:1d:3b:c2:89:17:1c:f3:89:3f:9a: a0:9a:14:c7:6e:d7:9f:7d:4f:8c:3f:1a:3e:9a:76:fa: a2:5f:83:af:83:5e:00:1b:9c:03:85:a9:d4:9e:e1:86: 8a:f9:1d:27:1c:5f:d2:83:71:e8:54:e4:0c:55:19:40: ab:e4:e9:4b:33:ac:de:f2:48:1c:a1:f1:80:8f:9d:7b: d6:66:62:0c:f5:76:2d:d4:ec:1b:0c:75:12:37:8a:97: 53:a1:28:56:64:f8:1b:c8:62:5b:c6:52:a3:db:16:98: 75:29:4a:c0:dc:d1:19:54:44:1b:36:22:22:ff:2c:47: fb:29:5c:c6:0f:5b:24:00:fb:9e:be:d6:92:8c:e9:36: 62:ab:63:00:02:d0:73:a3:0f:92:be:5c:7d:84:ff:0e: b4:ea:ea:e5:bb:74:a7:75:5e:e1:30:3e:dc:6e:85:9b: 18:93:f7:62:b7:ab:af:64:e1:05:6f:16:f9:58:b5:91: fa:77:f7:e3:a6:12:85:4d:f0:9a:f6:84:47:db:f4:78 Fingerprint (SHA-256): 37:D1:6A:34:FB:17:9D:A7:50:BE:C1:03:E3:3A:3B:8E:BB:DE:C0:F0:A3:01:D5:14:57:B4:D1:19:FC:81:2F:01 Fingerprint (SHA1): 41:F8:A5:FB:E4:0C:BE:47:15:9E:8E:6D:35:5F:10:D6:02:67:F4:AD Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5592: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5593: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132798 (0x671f9be) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 19:08:06 2016 Not After : Fri Jan 08 19:08:06 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:76:76:10:c7:2b:35:4d:b1:00:34:7d:e2:de:ef:59: fe:a2:7f:22:0c:90:c9:4b:54:89:9d:5d:f0:75:60:1e: 45:cd:a8:07:57:df:c6:e3:2b:a6:f0:1e:a9:2e:26:bf: b5:77:67:22:4d:2e:61:98:69:d6:40:9a:37:60:a0:97: 2f:73:1a:4a:65:87:77:b8:f9:59:03:44:ec:35:a3:f9: ce:ac:89:f7:c5:b7:be:ab:a6:ed:65:0b:5a:c1:df:a9: 96:31:0f:f2:fc:fc:ef:7a:bb:ca:c4:ed:3f:0e:82:ec: a5:cf:f9:9b:bf:95:e5:64:b0:0c:66:35:18:82:2b:d9: 16:35:ef:4b:82:b4:43:26:84:e1:a8:2f:ca:3a:3f:43: 3c:44:17:1f:a8:02:a0:67:f9:07:02:72:5e:4a:ff:19: 99:ac:07:37:87:29:38:e1:f4:37:1c:bc:2a:08:50:14: da:09:cc:74:fa:1d:b3:b6:c7:87:52:ab:d5:51:b4:36: 20:b2:ef:97:11:5a:34:b7:0e:15:dd:07:78:bc:d0:c9: ce:11:99:ff:49:4f:0e:de:18:7f:d5:23:f7:a4:96:b6: df:5d:ae:c3:a2:e9:8f:cc:7b:15:bd:88:21:9a:dd:fa: 11:3f:b2:b4:9f:4a:f5:8a:65:9f:4d:6b:88:29:cd:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3a:4e:ab:83:7f:87:89:01:20:ed:f7:23:a8:1a:25:d5: ca:91:a4:38:4b:ec:13:78:75:c9:87:be:aa:28:fc:28: d1:08:a6:16:07:72:d0:ab:25:df:51:78:f6:c8:4f:01: dd:82:d2:ad:6a:21:1d:3b:c2:89:17:1c:f3:89:3f:9a: a0:9a:14:c7:6e:d7:9f:7d:4f:8c:3f:1a:3e:9a:76:fa: a2:5f:83:af:83:5e:00:1b:9c:03:85:a9:d4:9e:e1:86: 8a:f9:1d:27:1c:5f:d2:83:71:e8:54:e4:0c:55:19:40: ab:e4:e9:4b:33:ac:de:f2:48:1c:a1:f1:80:8f:9d:7b: d6:66:62:0c:f5:76:2d:d4:ec:1b:0c:75:12:37:8a:97: 53:a1:28:56:64:f8:1b:c8:62:5b:c6:52:a3:db:16:98: 75:29:4a:c0:dc:d1:19:54:44:1b:36:22:22:ff:2c:47: fb:29:5c:c6:0f:5b:24:00:fb:9e:be:d6:92:8c:e9:36: 62:ab:63:00:02:d0:73:a3:0f:92:be:5c:7d:84:ff:0e: b4:ea:ea:e5:bb:74:a7:75:5e:e1:30:3e:dc:6e:85:9b: 18:93:f7:62:b7:ab:af:64:e1:05:6f:16:f9:58:b5:91: fa:77:f7:e3:a6:12:85:4d:f0:9a:f6:84:47:db:f4:78 Fingerprint (SHA-256): 37:D1:6A:34:FB:17:9D:A7:50:BE:C1:03:E3:3A:3B:8E:BB:DE:C0:F0:A3:01:D5:14:57:B4:D1:19:FC:81:2F:01 Fingerprint (SHA1): 41:F8:A5:FB:E4:0C:BE:47:15:9E:8E:6D:35:5F:10:D6:02:67:F4:AD Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5594: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5595: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5596: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5597: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132798 (0x671f9be) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 19:08:06 2016 Not After : Fri Jan 08 19:08:06 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:76:76:10:c7:2b:35:4d:b1:00:34:7d:e2:de:ef:59: fe:a2:7f:22:0c:90:c9:4b:54:89:9d:5d:f0:75:60:1e: 45:cd:a8:07:57:df:c6:e3:2b:a6:f0:1e:a9:2e:26:bf: b5:77:67:22:4d:2e:61:98:69:d6:40:9a:37:60:a0:97: 2f:73:1a:4a:65:87:77:b8:f9:59:03:44:ec:35:a3:f9: ce:ac:89:f7:c5:b7:be:ab:a6:ed:65:0b:5a:c1:df:a9: 96:31:0f:f2:fc:fc:ef:7a:bb:ca:c4:ed:3f:0e:82:ec: a5:cf:f9:9b:bf:95:e5:64:b0:0c:66:35:18:82:2b:d9: 16:35:ef:4b:82:b4:43:26:84:e1:a8:2f:ca:3a:3f:43: 3c:44:17:1f:a8:02:a0:67:f9:07:02:72:5e:4a:ff:19: 99:ac:07:37:87:29:38:e1:f4:37:1c:bc:2a:08:50:14: da:09:cc:74:fa:1d:b3:b6:c7:87:52:ab:d5:51:b4:36: 20:b2:ef:97:11:5a:34:b7:0e:15:dd:07:78:bc:d0:c9: ce:11:99:ff:49:4f:0e:de:18:7f:d5:23:f7:a4:96:b6: df:5d:ae:c3:a2:e9:8f:cc:7b:15:bd:88:21:9a:dd:fa: 11:3f:b2:b4:9f:4a:f5:8a:65:9f:4d:6b:88:29:cd:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3a:4e:ab:83:7f:87:89:01:20:ed:f7:23:a8:1a:25:d5: ca:91:a4:38:4b:ec:13:78:75:c9:87:be:aa:28:fc:28: d1:08:a6:16:07:72:d0:ab:25:df:51:78:f6:c8:4f:01: dd:82:d2:ad:6a:21:1d:3b:c2:89:17:1c:f3:89:3f:9a: a0:9a:14:c7:6e:d7:9f:7d:4f:8c:3f:1a:3e:9a:76:fa: a2:5f:83:af:83:5e:00:1b:9c:03:85:a9:d4:9e:e1:86: 8a:f9:1d:27:1c:5f:d2:83:71:e8:54:e4:0c:55:19:40: ab:e4:e9:4b:33:ac:de:f2:48:1c:a1:f1:80:8f:9d:7b: d6:66:62:0c:f5:76:2d:d4:ec:1b:0c:75:12:37:8a:97: 53:a1:28:56:64:f8:1b:c8:62:5b:c6:52:a3:db:16:98: 75:29:4a:c0:dc:d1:19:54:44:1b:36:22:22:ff:2c:47: fb:29:5c:c6:0f:5b:24:00:fb:9e:be:d6:92:8c:e9:36: 62:ab:63:00:02:d0:73:a3:0f:92:be:5c:7d:84:ff:0e: b4:ea:ea:e5:bb:74:a7:75:5e:e1:30:3e:dc:6e:85:9b: 18:93:f7:62:b7:ab:af:64:e1:05:6f:16:f9:58:b5:91: fa:77:f7:e3:a6:12:85:4d:f0:9a:f6:84:47:db:f4:78 Fingerprint (SHA-256): 37:D1:6A:34:FB:17:9D:A7:50:BE:C1:03:E3:3A:3B:8E:BB:DE:C0:F0:A3:01:D5:14:57:B4:D1:19:FC:81:2F:01 Fingerprint (SHA1): 41:F8:A5:FB:E4:0C:BE:47:15:9E:8E:6D:35:5F:10:D6:02:67:F4:AD Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5598: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5599: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5600: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5601: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132798 (0x671f9be) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 19:08:06 2016 Not After : Fri Jan 08 19:08:06 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:76:76:10:c7:2b:35:4d:b1:00:34:7d:e2:de:ef:59: fe:a2:7f:22:0c:90:c9:4b:54:89:9d:5d:f0:75:60:1e: 45:cd:a8:07:57:df:c6:e3:2b:a6:f0:1e:a9:2e:26:bf: b5:77:67:22:4d:2e:61:98:69:d6:40:9a:37:60:a0:97: 2f:73:1a:4a:65:87:77:b8:f9:59:03:44:ec:35:a3:f9: ce:ac:89:f7:c5:b7:be:ab:a6:ed:65:0b:5a:c1:df:a9: 96:31:0f:f2:fc:fc:ef:7a:bb:ca:c4:ed:3f:0e:82:ec: a5:cf:f9:9b:bf:95:e5:64:b0:0c:66:35:18:82:2b:d9: 16:35:ef:4b:82:b4:43:26:84:e1:a8:2f:ca:3a:3f:43: 3c:44:17:1f:a8:02:a0:67:f9:07:02:72:5e:4a:ff:19: 99:ac:07:37:87:29:38:e1:f4:37:1c:bc:2a:08:50:14: da:09:cc:74:fa:1d:b3:b6:c7:87:52:ab:d5:51:b4:36: 20:b2:ef:97:11:5a:34:b7:0e:15:dd:07:78:bc:d0:c9: ce:11:99:ff:49:4f:0e:de:18:7f:d5:23:f7:a4:96:b6: df:5d:ae:c3:a2:e9:8f:cc:7b:15:bd:88:21:9a:dd:fa: 11:3f:b2:b4:9f:4a:f5:8a:65:9f:4d:6b:88:29:cd:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3a:4e:ab:83:7f:87:89:01:20:ed:f7:23:a8:1a:25:d5: ca:91:a4:38:4b:ec:13:78:75:c9:87:be:aa:28:fc:28: d1:08:a6:16:07:72:d0:ab:25:df:51:78:f6:c8:4f:01: dd:82:d2:ad:6a:21:1d:3b:c2:89:17:1c:f3:89:3f:9a: a0:9a:14:c7:6e:d7:9f:7d:4f:8c:3f:1a:3e:9a:76:fa: a2:5f:83:af:83:5e:00:1b:9c:03:85:a9:d4:9e:e1:86: 8a:f9:1d:27:1c:5f:d2:83:71:e8:54:e4:0c:55:19:40: ab:e4:e9:4b:33:ac:de:f2:48:1c:a1:f1:80:8f:9d:7b: d6:66:62:0c:f5:76:2d:d4:ec:1b:0c:75:12:37:8a:97: 53:a1:28:56:64:f8:1b:c8:62:5b:c6:52:a3:db:16:98: 75:29:4a:c0:dc:d1:19:54:44:1b:36:22:22:ff:2c:47: fb:29:5c:c6:0f:5b:24:00:fb:9e:be:d6:92:8c:e9:36: 62:ab:63:00:02:d0:73:a3:0f:92:be:5c:7d:84:ff:0e: b4:ea:ea:e5:bb:74:a7:75:5e:e1:30:3e:dc:6e:85:9b: 18:93:f7:62:b7:ab:af:64:e1:05:6f:16:f9:58:b5:91: fa:77:f7:e3:a6:12:85:4d:f0:9a:f6:84:47:db:f4:78 Fingerprint (SHA-256): 37:D1:6A:34:FB:17:9D:A7:50:BE:C1:03:E3:3A:3B:8E:BB:DE:C0:F0:A3:01:D5:14:57:B4:D1:19:FC:81:2F:01 Fingerprint (SHA1): 41:F8:A5:FB:E4:0C:BE:47:15:9E:8E:6D:35:5F:10:D6:02:67:F4:AD Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5602: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132798 (0x671f9be) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 19:08:06 2016 Not After : Fri Jan 08 19:08:06 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:76:76:10:c7:2b:35:4d:b1:00:34:7d:e2:de:ef:59: fe:a2:7f:22:0c:90:c9:4b:54:89:9d:5d:f0:75:60:1e: 45:cd:a8:07:57:df:c6:e3:2b:a6:f0:1e:a9:2e:26:bf: b5:77:67:22:4d:2e:61:98:69:d6:40:9a:37:60:a0:97: 2f:73:1a:4a:65:87:77:b8:f9:59:03:44:ec:35:a3:f9: ce:ac:89:f7:c5:b7:be:ab:a6:ed:65:0b:5a:c1:df:a9: 96:31:0f:f2:fc:fc:ef:7a:bb:ca:c4:ed:3f:0e:82:ec: a5:cf:f9:9b:bf:95:e5:64:b0:0c:66:35:18:82:2b:d9: 16:35:ef:4b:82:b4:43:26:84:e1:a8:2f:ca:3a:3f:43: 3c:44:17:1f:a8:02:a0:67:f9:07:02:72:5e:4a:ff:19: 99:ac:07:37:87:29:38:e1:f4:37:1c:bc:2a:08:50:14: da:09:cc:74:fa:1d:b3:b6:c7:87:52:ab:d5:51:b4:36: 20:b2:ef:97:11:5a:34:b7:0e:15:dd:07:78:bc:d0:c9: ce:11:99:ff:49:4f:0e:de:18:7f:d5:23:f7:a4:96:b6: df:5d:ae:c3:a2:e9:8f:cc:7b:15:bd:88:21:9a:dd:fa: 11:3f:b2:b4:9f:4a:f5:8a:65:9f:4d:6b:88:29:cd:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3a:4e:ab:83:7f:87:89:01:20:ed:f7:23:a8:1a:25:d5: ca:91:a4:38:4b:ec:13:78:75:c9:87:be:aa:28:fc:28: d1:08:a6:16:07:72:d0:ab:25:df:51:78:f6:c8:4f:01: dd:82:d2:ad:6a:21:1d:3b:c2:89:17:1c:f3:89:3f:9a: a0:9a:14:c7:6e:d7:9f:7d:4f:8c:3f:1a:3e:9a:76:fa: a2:5f:83:af:83:5e:00:1b:9c:03:85:a9:d4:9e:e1:86: 8a:f9:1d:27:1c:5f:d2:83:71:e8:54:e4:0c:55:19:40: ab:e4:e9:4b:33:ac:de:f2:48:1c:a1:f1:80:8f:9d:7b: d6:66:62:0c:f5:76:2d:d4:ec:1b:0c:75:12:37:8a:97: 53:a1:28:56:64:f8:1b:c8:62:5b:c6:52:a3:db:16:98: 75:29:4a:c0:dc:d1:19:54:44:1b:36:22:22:ff:2c:47: fb:29:5c:c6:0f:5b:24:00:fb:9e:be:d6:92:8c:e9:36: 62:ab:63:00:02:d0:73:a3:0f:92:be:5c:7d:84:ff:0e: b4:ea:ea:e5:bb:74:a7:75:5e:e1:30:3e:dc:6e:85:9b: 18:93:f7:62:b7:ab:af:64:e1:05:6f:16:f9:58:b5:91: fa:77:f7:e3:a6:12:85:4d:f0:9a:f6:84:47:db:f4:78 Fingerprint (SHA-256): 37:D1:6A:34:FB:17:9D:A7:50:BE:C1:03:E3:3A:3B:8E:BB:DE:C0:F0:A3:01:D5:14:57:B4:D1:19:FC:81:2F:01 Fingerprint (SHA1): 41:F8:A5:FB:E4:0C:BE:47:15:9E:8E:6D:35:5F:10:D6:02:67:F4:AD Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5603: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5604: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132798 (0x671f9be) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 19:08:06 2016 Not After : Fri Jan 08 19:08:06 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:76:76:10:c7:2b:35:4d:b1:00:34:7d:e2:de:ef:59: fe:a2:7f:22:0c:90:c9:4b:54:89:9d:5d:f0:75:60:1e: 45:cd:a8:07:57:df:c6:e3:2b:a6:f0:1e:a9:2e:26:bf: b5:77:67:22:4d:2e:61:98:69:d6:40:9a:37:60:a0:97: 2f:73:1a:4a:65:87:77:b8:f9:59:03:44:ec:35:a3:f9: ce:ac:89:f7:c5:b7:be:ab:a6:ed:65:0b:5a:c1:df:a9: 96:31:0f:f2:fc:fc:ef:7a:bb:ca:c4:ed:3f:0e:82:ec: a5:cf:f9:9b:bf:95:e5:64:b0:0c:66:35:18:82:2b:d9: 16:35:ef:4b:82:b4:43:26:84:e1:a8:2f:ca:3a:3f:43: 3c:44:17:1f:a8:02:a0:67:f9:07:02:72:5e:4a:ff:19: 99:ac:07:37:87:29:38:e1:f4:37:1c:bc:2a:08:50:14: da:09:cc:74:fa:1d:b3:b6:c7:87:52:ab:d5:51:b4:36: 20:b2:ef:97:11:5a:34:b7:0e:15:dd:07:78:bc:d0:c9: ce:11:99:ff:49:4f:0e:de:18:7f:d5:23:f7:a4:96:b6: df:5d:ae:c3:a2:e9:8f:cc:7b:15:bd:88:21:9a:dd:fa: 11:3f:b2:b4:9f:4a:f5:8a:65:9f:4d:6b:88:29:cd:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3a:4e:ab:83:7f:87:89:01:20:ed:f7:23:a8:1a:25:d5: ca:91:a4:38:4b:ec:13:78:75:c9:87:be:aa:28:fc:28: d1:08:a6:16:07:72:d0:ab:25:df:51:78:f6:c8:4f:01: dd:82:d2:ad:6a:21:1d:3b:c2:89:17:1c:f3:89:3f:9a: a0:9a:14:c7:6e:d7:9f:7d:4f:8c:3f:1a:3e:9a:76:fa: a2:5f:83:af:83:5e:00:1b:9c:03:85:a9:d4:9e:e1:86: 8a:f9:1d:27:1c:5f:d2:83:71:e8:54:e4:0c:55:19:40: ab:e4:e9:4b:33:ac:de:f2:48:1c:a1:f1:80:8f:9d:7b: d6:66:62:0c:f5:76:2d:d4:ec:1b:0c:75:12:37:8a:97: 53:a1:28:56:64:f8:1b:c8:62:5b:c6:52:a3:db:16:98: 75:29:4a:c0:dc:d1:19:54:44:1b:36:22:22:ff:2c:47: fb:29:5c:c6:0f:5b:24:00:fb:9e:be:d6:92:8c:e9:36: 62:ab:63:00:02:d0:73:a3:0f:92:be:5c:7d:84:ff:0e: b4:ea:ea:e5:bb:74:a7:75:5e:e1:30:3e:dc:6e:85:9b: 18:93:f7:62:b7:ab:af:64:e1:05:6f:16:f9:58:b5:91: fa:77:f7:e3:a6:12:85:4d:f0:9a:f6:84:47:db:f4:78 Fingerprint (SHA-256): 37:D1:6A:34:FB:17:9D:A7:50:BE:C1:03:E3:3A:3B:8E:BB:DE:C0:F0:A3:01:D5:14:57:B4:D1:19:FC:81:2F:01 Fingerprint (SHA1): 41:F8:A5:FB:E4:0C:BE:47:15:9E:8E:6D:35:5F:10:D6:02:67:F4:AD Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5605: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5606: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5607: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5608: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132798 (0x671f9be) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 19:08:06 2016 Not After : Fri Jan 08 19:08:06 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:76:76:10:c7:2b:35:4d:b1:00:34:7d:e2:de:ef:59: fe:a2:7f:22:0c:90:c9:4b:54:89:9d:5d:f0:75:60:1e: 45:cd:a8:07:57:df:c6:e3:2b:a6:f0:1e:a9:2e:26:bf: b5:77:67:22:4d:2e:61:98:69:d6:40:9a:37:60:a0:97: 2f:73:1a:4a:65:87:77:b8:f9:59:03:44:ec:35:a3:f9: ce:ac:89:f7:c5:b7:be:ab:a6:ed:65:0b:5a:c1:df:a9: 96:31:0f:f2:fc:fc:ef:7a:bb:ca:c4:ed:3f:0e:82:ec: a5:cf:f9:9b:bf:95:e5:64:b0:0c:66:35:18:82:2b:d9: 16:35:ef:4b:82:b4:43:26:84:e1:a8:2f:ca:3a:3f:43: 3c:44:17:1f:a8:02:a0:67:f9:07:02:72:5e:4a:ff:19: 99:ac:07:37:87:29:38:e1:f4:37:1c:bc:2a:08:50:14: da:09:cc:74:fa:1d:b3:b6:c7:87:52:ab:d5:51:b4:36: 20:b2:ef:97:11:5a:34:b7:0e:15:dd:07:78:bc:d0:c9: ce:11:99:ff:49:4f:0e:de:18:7f:d5:23:f7:a4:96:b6: df:5d:ae:c3:a2:e9:8f:cc:7b:15:bd:88:21:9a:dd:fa: 11:3f:b2:b4:9f:4a:f5:8a:65:9f:4d:6b:88:29:cd:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3a:4e:ab:83:7f:87:89:01:20:ed:f7:23:a8:1a:25:d5: ca:91:a4:38:4b:ec:13:78:75:c9:87:be:aa:28:fc:28: d1:08:a6:16:07:72:d0:ab:25:df:51:78:f6:c8:4f:01: dd:82:d2:ad:6a:21:1d:3b:c2:89:17:1c:f3:89:3f:9a: a0:9a:14:c7:6e:d7:9f:7d:4f:8c:3f:1a:3e:9a:76:fa: a2:5f:83:af:83:5e:00:1b:9c:03:85:a9:d4:9e:e1:86: 8a:f9:1d:27:1c:5f:d2:83:71:e8:54:e4:0c:55:19:40: ab:e4:e9:4b:33:ac:de:f2:48:1c:a1:f1:80:8f:9d:7b: d6:66:62:0c:f5:76:2d:d4:ec:1b:0c:75:12:37:8a:97: 53:a1:28:56:64:f8:1b:c8:62:5b:c6:52:a3:db:16:98: 75:29:4a:c0:dc:d1:19:54:44:1b:36:22:22:ff:2c:47: fb:29:5c:c6:0f:5b:24:00:fb:9e:be:d6:92:8c:e9:36: 62:ab:63:00:02:d0:73:a3:0f:92:be:5c:7d:84:ff:0e: b4:ea:ea:e5:bb:74:a7:75:5e:e1:30:3e:dc:6e:85:9b: 18:93:f7:62:b7:ab:af:64:e1:05:6f:16:f9:58:b5:91: fa:77:f7:e3:a6:12:85:4d:f0:9a:f6:84:47:db:f4:78 Fingerprint (SHA-256): 37:D1:6A:34:FB:17:9D:A7:50:BE:C1:03:E3:3A:3B:8E:BB:DE:C0:F0:A3:01:D5:14:57:B4:D1:19:FC:81:2F:01 Fingerprint (SHA1): 41:F8:A5:FB:E4:0C:BE:47:15:9E:8E:6D:35:5F:10:D6:02:67:F4:AD Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5609: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132798 (0x671f9be) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 19:08:06 2016 Not After : Fri Jan 08 19:08:06 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:76:76:10:c7:2b:35:4d:b1:00:34:7d:e2:de:ef:59: fe:a2:7f:22:0c:90:c9:4b:54:89:9d:5d:f0:75:60:1e: 45:cd:a8:07:57:df:c6:e3:2b:a6:f0:1e:a9:2e:26:bf: b5:77:67:22:4d:2e:61:98:69:d6:40:9a:37:60:a0:97: 2f:73:1a:4a:65:87:77:b8:f9:59:03:44:ec:35:a3:f9: ce:ac:89:f7:c5:b7:be:ab:a6:ed:65:0b:5a:c1:df:a9: 96:31:0f:f2:fc:fc:ef:7a:bb:ca:c4:ed:3f:0e:82:ec: a5:cf:f9:9b:bf:95:e5:64:b0:0c:66:35:18:82:2b:d9: 16:35:ef:4b:82:b4:43:26:84:e1:a8:2f:ca:3a:3f:43: 3c:44:17:1f:a8:02:a0:67:f9:07:02:72:5e:4a:ff:19: 99:ac:07:37:87:29:38:e1:f4:37:1c:bc:2a:08:50:14: da:09:cc:74:fa:1d:b3:b6:c7:87:52:ab:d5:51:b4:36: 20:b2:ef:97:11:5a:34:b7:0e:15:dd:07:78:bc:d0:c9: ce:11:99:ff:49:4f:0e:de:18:7f:d5:23:f7:a4:96:b6: df:5d:ae:c3:a2:e9:8f:cc:7b:15:bd:88:21:9a:dd:fa: 11:3f:b2:b4:9f:4a:f5:8a:65:9f:4d:6b:88:29:cd:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3a:4e:ab:83:7f:87:89:01:20:ed:f7:23:a8:1a:25:d5: ca:91:a4:38:4b:ec:13:78:75:c9:87:be:aa:28:fc:28: d1:08:a6:16:07:72:d0:ab:25:df:51:78:f6:c8:4f:01: dd:82:d2:ad:6a:21:1d:3b:c2:89:17:1c:f3:89:3f:9a: a0:9a:14:c7:6e:d7:9f:7d:4f:8c:3f:1a:3e:9a:76:fa: a2:5f:83:af:83:5e:00:1b:9c:03:85:a9:d4:9e:e1:86: 8a:f9:1d:27:1c:5f:d2:83:71:e8:54:e4:0c:55:19:40: ab:e4:e9:4b:33:ac:de:f2:48:1c:a1:f1:80:8f:9d:7b: d6:66:62:0c:f5:76:2d:d4:ec:1b:0c:75:12:37:8a:97: 53:a1:28:56:64:f8:1b:c8:62:5b:c6:52:a3:db:16:98: 75:29:4a:c0:dc:d1:19:54:44:1b:36:22:22:ff:2c:47: fb:29:5c:c6:0f:5b:24:00:fb:9e:be:d6:92:8c:e9:36: 62:ab:63:00:02:d0:73:a3:0f:92:be:5c:7d:84:ff:0e: b4:ea:ea:e5:bb:74:a7:75:5e:e1:30:3e:dc:6e:85:9b: 18:93:f7:62:b7:ab:af:64:e1:05:6f:16:f9:58:b5:91: fa:77:f7:e3:a6:12:85:4d:f0:9a:f6:84:47:db:f4:78 Fingerprint (SHA-256): 37:D1:6A:34:FB:17:9D:A7:50:BE:C1:03:E3:3A:3B:8E:BB:DE:C0:F0:A3:01:D5:14:57:B4:D1:19:FC:81:2F:01 Fingerprint (SHA1): 41:F8:A5:FB:E4:0C:BE:47:15:9E:8E:6D:35:5F:10:D6:02:67:F4:AD Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #5610: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132798 (0x671f9be) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 19:08:06 2016 Not After : Fri Jan 08 19:08:06 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:76:76:10:c7:2b:35:4d:b1:00:34:7d:e2:de:ef:59: fe:a2:7f:22:0c:90:c9:4b:54:89:9d:5d:f0:75:60:1e: 45:cd:a8:07:57:df:c6:e3:2b:a6:f0:1e:a9:2e:26:bf: b5:77:67:22:4d:2e:61:98:69:d6:40:9a:37:60:a0:97: 2f:73:1a:4a:65:87:77:b8:f9:59:03:44:ec:35:a3:f9: ce:ac:89:f7:c5:b7:be:ab:a6:ed:65:0b:5a:c1:df:a9: 96:31:0f:f2:fc:fc:ef:7a:bb:ca:c4:ed:3f:0e:82:ec: a5:cf:f9:9b:bf:95:e5:64:b0:0c:66:35:18:82:2b:d9: 16:35:ef:4b:82:b4:43:26:84:e1:a8:2f:ca:3a:3f:43: 3c:44:17:1f:a8:02:a0:67:f9:07:02:72:5e:4a:ff:19: 99:ac:07:37:87:29:38:e1:f4:37:1c:bc:2a:08:50:14: da:09:cc:74:fa:1d:b3:b6:c7:87:52:ab:d5:51:b4:36: 20:b2:ef:97:11:5a:34:b7:0e:15:dd:07:78:bc:d0:c9: ce:11:99:ff:49:4f:0e:de:18:7f:d5:23:f7:a4:96:b6: df:5d:ae:c3:a2:e9:8f:cc:7b:15:bd:88:21:9a:dd:fa: 11:3f:b2:b4:9f:4a:f5:8a:65:9f:4d:6b:88:29:cd:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3a:4e:ab:83:7f:87:89:01:20:ed:f7:23:a8:1a:25:d5: ca:91:a4:38:4b:ec:13:78:75:c9:87:be:aa:28:fc:28: d1:08:a6:16:07:72:d0:ab:25:df:51:78:f6:c8:4f:01: dd:82:d2:ad:6a:21:1d:3b:c2:89:17:1c:f3:89:3f:9a: a0:9a:14:c7:6e:d7:9f:7d:4f:8c:3f:1a:3e:9a:76:fa: a2:5f:83:af:83:5e:00:1b:9c:03:85:a9:d4:9e:e1:86: 8a:f9:1d:27:1c:5f:d2:83:71:e8:54:e4:0c:55:19:40: ab:e4:e9:4b:33:ac:de:f2:48:1c:a1:f1:80:8f:9d:7b: d6:66:62:0c:f5:76:2d:d4:ec:1b:0c:75:12:37:8a:97: 53:a1:28:56:64:f8:1b:c8:62:5b:c6:52:a3:db:16:98: 75:29:4a:c0:dc:d1:19:54:44:1b:36:22:22:ff:2c:47: fb:29:5c:c6:0f:5b:24:00:fb:9e:be:d6:92:8c:e9:36: 62:ab:63:00:02:d0:73:a3:0f:92:be:5c:7d:84:ff:0e: b4:ea:ea:e5:bb:74:a7:75:5e:e1:30:3e:dc:6e:85:9b: 18:93:f7:62:b7:ab:af:64:e1:05:6f:16:f9:58:b5:91: fa:77:f7:e3:a6:12:85:4d:f0:9a:f6:84:47:db:f4:78 Fingerprint (SHA-256): 37:D1:6A:34:FB:17:9D:A7:50:BE:C1:03:E3:3A:3B:8E:BB:DE:C0:F0:A3:01:D5:14:57:B4:D1:19:FC:81:2F:01 Fingerprint (SHA1): 41:F8:A5:FB:E4:0C:BE:47:15:9E:8E:6D:35:5F:10:D6:02:67:F4:AD Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #5611: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132798 (0x671f9be) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 19:08:06 2016 Not After : Fri Jan 08 19:08:06 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:76:76:10:c7:2b:35:4d:b1:00:34:7d:e2:de:ef:59: fe:a2:7f:22:0c:90:c9:4b:54:89:9d:5d:f0:75:60:1e: 45:cd:a8:07:57:df:c6:e3:2b:a6:f0:1e:a9:2e:26:bf: b5:77:67:22:4d:2e:61:98:69:d6:40:9a:37:60:a0:97: 2f:73:1a:4a:65:87:77:b8:f9:59:03:44:ec:35:a3:f9: ce:ac:89:f7:c5:b7:be:ab:a6:ed:65:0b:5a:c1:df:a9: 96:31:0f:f2:fc:fc:ef:7a:bb:ca:c4:ed:3f:0e:82:ec: a5:cf:f9:9b:bf:95:e5:64:b0:0c:66:35:18:82:2b:d9: 16:35:ef:4b:82:b4:43:26:84:e1:a8:2f:ca:3a:3f:43: 3c:44:17:1f:a8:02:a0:67:f9:07:02:72:5e:4a:ff:19: 99:ac:07:37:87:29:38:e1:f4:37:1c:bc:2a:08:50:14: da:09:cc:74:fa:1d:b3:b6:c7:87:52:ab:d5:51:b4:36: 20:b2:ef:97:11:5a:34:b7:0e:15:dd:07:78:bc:d0:c9: ce:11:99:ff:49:4f:0e:de:18:7f:d5:23:f7:a4:96:b6: df:5d:ae:c3:a2:e9:8f:cc:7b:15:bd:88:21:9a:dd:fa: 11:3f:b2:b4:9f:4a:f5:8a:65:9f:4d:6b:88:29:cd:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3a:4e:ab:83:7f:87:89:01:20:ed:f7:23:a8:1a:25:d5: ca:91:a4:38:4b:ec:13:78:75:c9:87:be:aa:28:fc:28: d1:08:a6:16:07:72:d0:ab:25:df:51:78:f6:c8:4f:01: dd:82:d2:ad:6a:21:1d:3b:c2:89:17:1c:f3:89:3f:9a: a0:9a:14:c7:6e:d7:9f:7d:4f:8c:3f:1a:3e:9a:76:fa: a2:5f:83:af:83:5e:00:1b:9c:03:85:a9:d4:9e:e1:86: 8a:f9:1d:27:1c:5f:d2:83:71:e8:54:e4:0c:55:19:40: ab:e4:e9:4b:33:ac:de:f2:48:1c:a1:f1:80:8f:9d:7b: d6:66:62:0c:f5:76:2d:d4:ec:1b:0c:75:12:37:8a:97: 53:a1:28:56:64:f8:1b:c8:62:5b:c6:52:a3:db:16:98: 75:29:4a:c0:dc:d1:19:54:44:1b:36:22:22:ff:2c:47: fb:29:5c:c6:0f:5b:24:00:fb:9e:be:d6:92:8c:e9:36: 62:ab:63:00:02:d0:73:a3:0f:92:be:5c:7d:84:ff:0e: b4:ea:ea:e5:bb:74:a7:75:5e:e1:30:3e:dc:6e:85:9b: 18:93:f7:62:b7:ab:af:64:e1:05:6f:16:f9:58:b5:91: fa:77:f7:e3:a6:12:85:4d:f0:9a:f6:84:47:db:f4:78 Fingerprint (SHA-256): 37:D1:6A:34:FB:17:9D:A7:50:BE:C1:03:E3:3A:3B:8E:BB:DE:C0:F0:A3:01:D5:14:57:B4:D1:19:FC:81:2F:01 Fingerprint (SHA1): 41:F8:A5:FB:E4:0C:BE:47:15:9E:8E:6D:35:5F:10:D6:02:67:F4:AD Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #5612: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132798 (0x671f9be) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 19:08:06 2016 Not After : Fri Jan 08 19:08:06 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:76:76:10:c7:2b:35:4d:b1:00:34:7d:e2:de:ef:59: fe:a2:7f:22:0c:90:c9:4b:54:89:9d:5d:f0:75:60:1e: 45:cd:a8:07:57:df:c6:e3:2b:a6:f0:1e:a9:2e:26:bf: b5:77:67:22:4d:2e:61:98:69:d6:40:9a:37:60:a0:97: 2f:73:1a:4a:65:87:77:b8:f9:59:03:44:ec:35:a3:f9: ce:ac:89:f7:c5:b7:be:ab:a6:ed:65:0b:5a:c1:df:a9: 96:31:0f:f2:fc:fc:ef:7a:bb:ca:c4:ed:3f:0e:82:ec: a5:cf:f9:9b:bf:95:e5:64:b0:0c:66:35:18:82:2b:d9: 16:35:ef:4b:82:b4:43:26:84:e1:a8:2f:ca:3a:3f:43: 3c:44:17:1f:a8:02:a0:67:f9:07:02:72:5e:4a:ff:19: 99:ac:07:37:87:29:38:e1:f4:37:1c:bc:2a:08:50:14: da:09:cc:74:fa:1d:b3:b6:c7:87:52:ab:d5:51:b4:36: 20:b2:ef:97:11:5a:34:b7:0e:15:dd:07:78:bc:d0:c9: ce:11:99:ff:49:4f:0e:de:18:7f:d5:23:f7:a4:96:b6: df:5d:ae:c3:a2:e9:8f:cc:7b:15:bd:88:21:9a:dd:fa: 11:3f:b2:b4:9f:4a:f5:8a:65:9f:4d:6b:88:29:cd:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3a:4e:ab:83:7f:87:89:01:20:ed:f7:23:a8:1a:25:d5: ca:91:a4:38:4b:ec:13:78:75:c9:87:be:aa:28:fc:28: d1:08:a6:16:07:72:d0:ab:25:df:51:78:f6:c8:4f:01: dd:82:d2:ad:6a:21:1d:3b:c2:89:17:1c:f3:89:3f:9a: a0:9a:14:c7:6e:d7:9f:7d:4f:8c:3f:1a:3e:9a:76:fa: a2:5f:83:af:83:5e:00:1b:9c:03:85:a9:d4:9e:e1:86: 8a:f9:1d:27:1c:5f:d2:83:71:e8:54:e4:0c:55:19:40: ab:e4:e9:4b:33:ac:de:f2:48:1c:a1:f1:80:8f:9d:7b: d6:66:62:0c:f5:76:2d:d4:ec:1b:0c:75:12:37:8a:97: 53:a1:28:56:64:f8:1b:c8:62:5b:c6:52:a3:db:16:98: 75:29:4a:c0:dc:d1:19:54:44:1b:36:22:22:ff:2c:47: fb:29:5c:c6:0f:5b:24:00:fb:9e:be:d6:92:8c:e9:36: 62:ab:63:00:02:d0:73:a3:0f:92:be:5c:7d:84:ff:0e: b4:ea:ea:e5:bb:74:a7:75:5e:e1:30:3e:dc:6e:85:9b: 18:93:f7:62:b7:ab:af:64:e1:05:6f:16:f9:58:b5:91: fa:77:f7:e3:a6:12:85:4d:f0:9a:f6:84:47:db:f4:78 Fingerprint (SHA-256): 37:D1:6A:34:FB:17:9D:A7:50:BE:C1:03:E3:3A:3B:8E:BB:DE:C0:F0:A3:01:D5:14:57:B4:D1:19:FC:81:2F:01 Fingerprint (SHA1): 41:F8:A5:FB:E4:0C:BE:47:15:9E:8E:6D:35:5F:10:D6:02:67:F4:AD Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #5613: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132798 (0x671f9be) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 19:08:06 2016 Not After : Fri Jan 08 19:08:06 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:76:76:10:c7:2b:35:4d:b1:00:34:7d:e2:de:ef:59: fe:a2:7f:22:0c:90:c9:4b:54:89:9d:5d:f0:75:60:1e: 45:cd:a8:07:57:df:c6:e3:2b:a6:f0:1e:a9:2e:26:bf: b5:77:67:22:4d:2e:61:98:69:d6:40:9a:37:60:a0:97: 2f:73:1a:4a:65:87:77:b8:f9:59:03:44:ec:35:a3:f9: ce:ac:89:f7:c5:b7:be:ab:a6:ed:65:0b:5a:c1:df:a9: 96:31:0f:f2:fc:fc:ef:7a:bb:ca:c4:ed:3f:0e:82:ec: a5:cf:f9:9b:bf:95:e5:64:b0:0c:66:35:18:82:2b:d9: 16:35:ef:4b:82:b4:43:26:84:e1:a8:2f:ca:3a:3f:43: 3c:44:17:1f:a8:02:a0:67:f9:07:02:72:5e:4a:ff:19: 99:ac:07:37:87:29:38:e1:f4:37:1c:bc:2a:08:50:14: da:09:cc:74:fa:1d:b3:b6:c7:87:52:ab:d5:51:b4:36: 20:b2:ef:97:11:5a:34:b7:0e:15:dd:07:78:bc:d0:c9: ce:11:99:ff:49:4f:0e:de:18:7f:d5:23:f7:a4:96:b6: df:5d:ae:c3:a2:e9:8f:cc:7b:15:bd:88:21:9a:dd:fa: 11:3f:b2:b4:9f:4a:f5:8a:65:9f:4d:6b:88:29:cd:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3a:4e:ab:83:7f:87:89:01:20:ed:f7:23:a8:1a:25:d5: ca:91:a4:38:4b:ec:13:78:75:c9:87:be:aa:28:fc:28: d1:08:a6:16:07:72:d0:ab:25:df:51:78:f6:c8:4f:01: dd:82:d2:ad:6a:21:1d:3b:c2:89:17:1c:f3:89:3f:9a: a0:9a:14:c7:6e:d7:9f:7d:4f:8c:3f:1a:3e:9a:76:fa: a2:5f:83:af:83:5e:00:1b:9c:03:85:a9:d4:9e:e1:86: 8a:f9:1d:27:1c:5f:d2:83:71:e8:54:e4:0c:55:19:40: ab:e4:e9:4b:33:ac:de:f2:48:1c:a1:f1:80:8f:9d:7b: d6:66:62:0c:f5:76:2d:d4:ec:1b:0c:75:12:37:8a:97: 53:a1:28:56:64:f8:1b:c8:62:5b:c6:52:a3:db:16:98: 75:29:4a:c0:dc:d1:19:54:44:1b:36:22:22:ff:2c:47: fb:29:5c:c6:0f:5b:24:00:fb:9e:be:d6:92:8c:e9:36: 62:ab:63:00:02:d0:73:a3:0f:92:be:5c:7d:84:ff:0e: b4:ea:ea:e5:bb:74:a7:75:5e:e1:30:3e:dc:6e:85:9b: 18:93:f7:62:b7:ab:af:64:e1:05:6f:16:f9:58:b5:91: fa:77:f7:e3:a6:12:85:4d:f0:9a:f6:84:47:db:f4:78 Fingerprint (SHA-256): 37:D1:6A:34:FB:17:9D:A7:50:BE:C1:03:E3:3A:3B:8E:BB:DE:C0:F0:A3:01:D5:14:57:B4:D1:19:FC:81:2F:01 Fingerprint (SHA1): 41:F8:A5:FB:E4:0C:BE:47:15:9E:8E:6D:35:5F:10:D6:02:67:F4:AD Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #5614: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5615: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5616: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132828 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5617: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5618: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #5619: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5620: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 108132829 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5621: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5622: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #5623: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5624: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 108132830 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5625: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5626: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #5627: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5628: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 108132831 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5629: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5630: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #5631: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5632: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 108132832 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5633: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5634: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #5635: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5636: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 108132833 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5637: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5638: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #5639: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5640: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 108132834 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5641: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5642: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5643: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132828 (0x671f9dc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 19:14:51 2016 Not After : Fri Jan 08 19:14:51 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:45:53:c9:6a:41:0e:c9:91:e5:49:34:fd:6d:94:e7: 1f:e5:f8:2a:d0:67:5c:2e:68:96:f5:38:d9:4b:6c:52: b6:c9:88:86:16:ba:5b:d5:18:dd:9a:e0:84:30:a6:76: 4c:ac:a1:67:dd:a9:cf:96:d8:ca:4a:f8:29:bc:e2:87: b8:a4:57:d9:32:35:c4:0e:ab:26:8a:bc:91:54:68:34: 75:e3:47:62:3d:9d:7a:eb:b9:56:4b:0e:de:a1:5d:49: 15:26:b9:48:dd:c2:48:93:a0:bc:81:f0:a6:23:85:57: 0a:08:73:ab:81:ac:07:42:b8:9e:02:a9:10:87:d2:eb: 7f:6e:0b:b3:7d:2f:40:da:46:71:03:50:70:ae:45:2a: 8b:f6:da:2d:5c:0a:6e:e1:e7:59:23:8d:a0:d1:04:d6: 35:db:9d:b5:cf:08:1c:8f:1a:ab:a8:57:3f:fb:a5:1b: 1b:56:84:38:72:f8:d6:fa:a5:0f:44:6a:49:46:f4:91: 59:d1:a1:a5:11:18:9d:e8:dc:36:d3:e0:50:27:ee:48: f9:85:65:c1:df:dd:ad:e1:81:26:bf:68:02:f8:50:b3: 58:0f:70:45:51:73:d0:f1:4d:7f:0a:4a:ac:6a:5d:7f: 8a:2a:d9:cc:11:7e:39:c1:e2:ac:23:f1:bd:33:fd:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:37:13:f5:65:31:18:ce:dd:37:2b:58:0f:de:34:7c: 44:ef:87:af:26:7c:dc:93:9c:11:8e:5e:b4:6f:f8:0c: 7d:55:9c:cb:d7:31:c1:83:03:10:d1:fa:b0:8c:0e:eb: b0:21:10:69:a9:43:6f:d4:fc:e4:96:cf:d8:f0:25:ed: 60:14:30:68:c4:04:6f:42:bc:95:1b:0e:f6:53:63:46: 53:69:22:37:1d:8e:ff:5d:67:72:07:41:b7:7e:85:1f: 42:f3:fe:8f:1b:bf:6f:d2:6d:3b:c8:34:16:c6:c2:fa: ab:02:43:f9:96:b5:8d:03:72:50:73:db:f4:14:d1:6f: a2:21:81:8b:b2:66:cd:0f:ba:0a:ef:b6:f0:1b:39:1a: 1b:28:ae:f6:6f:d4:b0:26:a2:b5:8a:4f:e5:47:97:a5: f7:04:40:73:56:fa:90:71:bd:22:25:0e:44:1b:8d:6b: 6b:0d:65:7c:36:29:6a:d7:ff:26:21:eb:34:ac:08:23: 52:db:2b:c6:68:c2:21:88:d7:fb:ed:18:a7:74:fa:0b: 65:87:9a:49:a5:e3:3e:50:a3:7d:ed:ad:a7:24:4d:39: 4e:54:62:01:5b:3e:43:9f:06:8c:ce:ff:5a:66:76:43: a9:a0:18:c5:d1:7c:9a:54:55:7b:04:74:10:6a:33:9e Fingerprint (SHA-256): CD:25:2F:01:9F:60:D2:01:52:72:6D:DF:47:66:AE:67:38:FC:FE:F8:27:57:4C:ED:E0:0E:F4:2C:6E:46:13:57 Fingerprint (SHA1): B4:1C:56:EE:BB:78:E9:87:10:C6:14:33:6B:37:52:DB:75:9A:8C:CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #5644: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5645: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5646: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #5647: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132828 (0x671f9dc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 19:14:51 2016 Not After : Fri Jan 08 19:14:51 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:45:53:c9:6a:41:0e:c9:91:e5:49:34:fd:6d:94:e7: 1f:e5:f8:2a:d0:67:5c:2e:68:96:f5:38:d9:4b:6c:52: b6:c9:88:86:16:ba:5b:d5:18:dd:9a:e0:84:30:a6:76: 4c:ac:a1:67:dd:a9:cf:96:d8:ca:4a:f8:29:bc:e2:87: b8:a4:57:d9:32:35:c4:0e:ab:26:8a:bc:91:54:68:34: 75:e3:47:62:3d:9d:7a:eb:b9:56:4b:0e:de:a1:5d:49: 15:26:b9:48:dd:c2:48:93:a0:bc:81:f0:a6:23:85:57: 0a:08:73:ab:81:ac:07:42:b8:9e:02:a9:10:87:d2:eb: 7f:6e:0b:b3:7d:2f:40:da:46:71:03:50:70:ae:45:2a: 8b:f6:da:2d:5c:0a:6e:e1:e7:59:23:8d:a0:d1:04:d6: 35:db:9d:b5:cf:08:1c:8f:1a:ab:a8:57:3f:fb:a5:1b: 1b:56:84:38:72:f8:d6:fa:a5:0f:44:6a:49:46:f4:91: 59:d1:a1:a5:11:18:9d:e8:dc:36:d3:e0:50:27:ee:48: f9:85:65:c1:df:dd:ad:e1:81:26:bf:68:02:f8:50:b3: 58:0f:70:45:51:73:d0:f1:4d:7f:0a:4a:ac:6a:5d:7f: 8a:2a:d9:cc:11:7e:39:c1:e2:ac:23:f1:bd:33:fd:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:37:13:f5:65:31:18:ce:dd:37:2b:58:0f:de:34:7c: 44:ef:87:af:26:7c:dc:93:9c:11:8e:5e:b4:6f:f8:0c: 7d:55:9c:cb:d7:31:c1:83:03:10:d1:fa:b0:8c:0e:eb: b0:21:10:69:a9:43:6f:d4:fc:e4:96:cf:d8:f0:25:ed: 60:14:30:68:c4:04:6f:42:bc:95:1b:0e:f6:53:63:46: 53:69:22:37:1d:8e:ff:5d:67:72:07:41:b7:7e:85:1f: 42:f3:fe:8f:1b:bf:6f:d2:6d:3b:c8:34:16:c6:c2:fa: ab:02:43:f9:96:b5:8d:03:72:50:73:db:f4:14:d1:6f: a2:21:81:8b:b2:66:cd:0f:ba:0a:ef:b6:f0:1b:39:1a: 1b:28:ae:f6:6f:d4:b0:26:a2:b5:8a:4f:e5:47:97:a5: f7:04:40:73:56:fa:90:71:bd:22:25:0e:44:1b:8d:6b: 6b:0d:65:7c:36:29:6a:d7:ff:26:21:eb:34:ac:08:23: 52:db:2b:c6:68:c2:21:88:d7:fb:ed:18:a7:74:fa:0b: 65:87:9a:49:a5:e3:3e:50:a3:7d:ed:ad:a7:24:4d:39: 4e:54:62:01:5b:3e:43:9f:06:8c:ce:ff:5a:66:76:43: a9:a0:18:c5:d1:7c:9a:54:55:7b:04:74:10:6a:33:9e Fingerprint (SHA-256): CD:25:2F:01:9F:60:D2:01:52:72:6D:DF:47:66:AE:67:38:FC:FE:F8:27:57:4C:ED:E0:0E:F4:2C:6E:46:13:57 Fingerprint (SHA1): B4:1C:56:EE:BB:78:E9:87:10:C6:14:33:6B:37:52:DB:75:9A:8C:CA Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #5648: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5649: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5650: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5651: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132835 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5652: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5653: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5654: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5655: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108132836 --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #5656: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5657: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5658: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5659: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108132837 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5660: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5661: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #5662: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5663: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108132838 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5664: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5665: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5666: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #5667: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #5668: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #5669: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132835 (0x671f9e3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 19:16:05 2016 Not After : Fri Jan 08 19:16:05 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:dc:a2:a1:5f:bc:80:ca:56:d9:27:18:9a:68:50:62: 35:9e:a5:30:1e:48:27:70:80:0f:56:a6:9a:c3:72:da: 09:75:2f:a6:a9:b2:1b:1f:bc:6b:49:ad:2c:c8:03:94: e7:31:70:39:d1:4c:4b:11:1a:a8:13:68:c2:63:0f:ce: 22:ce:be:87:48:ff:61:c3:96:fd:64:78:e0:09:df:e1: d3:0a:44:ea:65:11:ad:e3:00:92:29:06:55:81:75:af: 1a:f0:68:93:fe:98:c8:bd:f8:d8:38:35:0d:a3:9a:cb: 4b:49:97:3b:16:69:f5:95:31:37:8f:b7:fa:e9:4d:09: 9e:1d:68:e4:64:0b:af:90:29:50:a2:70:f4:4d:71:35: 0f:30:b9:64:ff:78:07:f9:d0:8e:f4:76:6b:d7:88:29: ea:81:50:47:9a:f7:e5:4b:94:e1:d2:03:28:d7:10:7c: 63:5f:98:3c:34:20:f1:ee:4f:6e:0a:f5:ba:33:6e:4f: 07:3b:76:ca:6a:a7:0a:18:52:2a:cb:aa:1b:7e:cf:22: f1:82:a8:58:2e:c2:0d:dc:88:d0:54:b1:61:92:2b:06: de:c2:1f:3a:04:12:98:d5:22:f6:14:8b:4f:cb:b2:41: 64:9b:3a:db:e0:90:33:8e:58:39:f6:81:79:ed:82:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:d5:16:f9:de:3f:13:ec:28:94:79:9f:ff:ef:52:97: ac:b7:c0:92:16:e1:4b:52:8d:33:fd:d3:b2:d6:6a:2b: 5d:ce:95:33:0c:2f:18:27:bc:50:14:35:42:6b:15:4f: 7f:17:9e:7b:36:73:1c:fb:ad:69:50:e4:73:49:a8:3c: dc:79:0e:ce:c4:4e:e3:be:14:07:e8:62:3b:bc:17:22: c5:b8:f9:ab:28:20:dc:47:26:78:2a:76:88:54:3c:02: b9:9a:d9:00:f7:59:4d:d0:1d:af:dc:42:fa:8c:62:b9: 4d:4f:8c:d6:bc:78:e8:52:cd:7c:ce:b9:96:09:b4:63: 42:7c:82:18:d3:1a:0c:c0:62:cb:95:53:8d:27:a6:60: e7:d0:94:f1:37:a9:80:46:b0:25:22:a2:c5:86:bd:c1: 3a:27:65:12:3a:85:3e:27:0f:e6:56:99:2e:c0:24:2c: 2f:0a:86:d7:61:be:36:8c:58:5a:45:5b:d5:ef:b9:65: 49:1a:db:9d:93:88:e4:4c:4c:18:80:8c:e0:72:93:88: 73:54:fe:30:88:f2:c2:13:3d:60:7c:ef:ec:56:f3:30: d0:90:77:74:21:b3:36:63:6e:97:3d:88:a0:b3:9a:eb: af:00:0b:b3:c1:4a:4f:2d:b0:4b:9e:62:68:09:68:d6 Fingerprint (SHA-256): 99:16:74:B1:31:63:1C:2C:47:15:CD:22:32:A7:4E:1B:70:7F:5F:EE:72:06:36:7B:E2:39:3B:94:5A:58:6C:94 Fingerprint (SHA1): 63:7E:B0:1C:BE:9B:13:3F:3C:C1:0E:19:87:45:86:31:8D:9A:43:A0 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5670: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5671: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5672: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132836 (0x671f9e4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 19:16:15 2016 Not After : Fri Jan 08 19:16:15 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:58:ae:7b:58:9c:91:25:e5:e3:13:d5:6f:2f:65:d6: a2:26:8c:35:80:43:ea:95:52:0e:6d:c3:77:65:8c:93: ef:76:1d:35:b0:82:24:98:58:ca:ea:ca:5f:c1:92:55: 2e:01:53:05:2c:c4:e6:a5:92:7d:a2:6a:30:10:0a:1a: 3b:99:35:4c:57:be:3d:4c:14:98:05:48:96:f1:69:7d: 27:02:90:73:22:82:61:32:e7:10:55:37:81:ae:c4:3d: c1:c5:36:07:cf:bd:18:db:6a:13:10:12:82:be:f1:46: 01:46:5a:92:c5:03:17:98:18:b0:45:5f:cd:ec:fc:e2: 93:9e:9e:2c:5d:a2:58:91:63:c0:77:e4:d2:b5:56:8f: 73:49:43:11:1f:ce:b0:fd:cb:e0:8a:a5:6a:4f:32:63: 24:a6:95:f0:9e:95:21:0a:3c:57:7b:e0:35:69:74:61: bb:42:64:82:a2:46:ba:86:42:88:25:f1:8f:08:f8:9f: 78:89:2f:b4:47:12:40:ac:ca:5b:eb:ac:c3:21:5a:b2: e5:27:22:5c:12:67:82:8f:d9:89:49:ce:5d:0c:10:77: e4:df:4b:59:ca:b7:3a:dc:11:18:9a:43:de:83:7f:53: d5:f0:4c:de:13:fe:7f:ac:94:b1:ee:65:92:16:3e:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:6f:99:f7:13:d3:db:55:46:8d:de:64:d6:62:82:e0: 69:15:a1:4b:93:49:c1:bc:08:52:1c:25:10:a6:2f:95: 84:9e:3d:35:cb:55:6a:9b:3e:ee:a9:7a:b7:eb:08:3e: 22:96:ec:c3:ff:0f:11:77:da:ac:4b:13:1e:50:3a:a8: 99:4b:51:0e:98:d8:26:f5:e2:29:c9:16:ba:fd:cb:41: 39:dd:96:6b:b3:b7:76:68:fd:9a:ec:85:3b:4f:d2:cb: b4:08:8f:5c:83:a7:b4:ac:ea:ef:8f:e6:51:ec:bc:6c: 78:d9:eb:d2:a6:5d:40:ac:c0:0b:de:97:90:0c:32:10: 85:f7:71:c6:6e:02:3e:92:b6:4a:d3:8c:e5:29:04:11: cf:de:3c:0e:89:cf:c3:c6:51:45:d1:b7:d7:af:12:86: 34:a7:b4:f7:95:7c:4b:88:3f:6f:fd:9d:15:5d:68:28: b8:00:69:38:4d:6b:82:c6:1c:f2:ab:b5:b6:18:a2:87: 28:84:e3:28:55:5b:16:81:49:c3:75:7d:be:42:4f:bc: 55:23:26:7f:55:c2:13:50:e0:da:08:2c:ef:39:36:91: f9:ca:7c:82:6b:5e:1b:99:90:d3:32:93:f2:26:55:8c: 25:cd:8c:9b:6f:c0:44:e1:9c:53:98:c3:68:84:b5:4a Fingerprint (SHA-256): 8C:59:5D:55:8D:12:2F:34:48:7A:CC:F0:83:7F:96:BF:51:DB:21:E7:65:C3:81:2D:4C:2A:CD:16:15:5A:54:D7 Fingerprint (SHA1): 7C:72:03:B5:0F:61:9E:9A:E3:18:B4:30:8E:35:3D:7A:A4:24:8B:C2 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5673: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5674: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132837 (0x671f9e5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 19:16:25 2016 Not After : Fri Jan 08 19:16:25 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:8c:8b:a9:e7:7f:03:b8:fc:1a:af:fb:44:83:44:29: ff:a7:13:05:e7:bc:18:34:c7:84:60:f1:88:7f:51:04: c0:fa:28:6b:62:ef:f1:2f:56:c5:90:08:1f:b4:82:21: 2c:dd:64:ed:93:ce:72:9e:7b:85:eb:61:6e:60:5e:eb: 26:f0:e9:2a:c1:0f:1d:22:69:50:20:1d:99:05:ff:2d: db:c3:67:31:32:35:ff:44:6b:d1:e7:83:c2:30:c3:03: c4:04:a5:95:3a:91:2f:8f:05:11:55:0d:47:98:4e:35: 5f:e1:47:b1:78:71:20:5f:29:20:8b:92:d2:42:c7:2a: 17:e1:0b:b7:47:24:1d:e9:81:94:13:d4:c0:35:77:5d: 09:6f:5e:53:f2:51:21:8f:1a:5a:21:6c:70:73:3a:a8: 91:16:d7:f0:85:de:a5:ee:10:e4:3e:42:62:d2:62:a9: 5d:e3:87:92:ed:ff:e8:6b:26:b0:81:4c:7d:95:2a:01: 2a:62:5a:fc:c7:43:f5:8b:b3:d6:01:25:b3:72:bb:c6: dd:98:2e:c8:c8:8f:73:db:c6:bd:82:e6:c3:3c:c1:91: d7:28:c9:ab:f1:f3:44:d2:c6:a7:87:cc:e8:19:72:49: 4f:60:1c:b6:f7:f4:13:41:a5:96:0e:a5:48:c2:b5:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8e:e8:e8:37:1e:91:a8:dc:c9:b7:75:a8:2d:c6:a4:2f: 9d:87:e9:ba:13:3d:e2:d8:8d:a0:38:09:2b:57:18:8b: ee:60:4c:0b:db:c6:aa:d8:0d:36:dd:92:82:ed:d9:0f: 95:0a:31:ff:56:45:8e:09:2c:2b:cb:cd:b7:99:e9:14: cb:e7:85:06:85:6d:f5:89:fc:ab:2e:67:61:8e:db:dd: 55:b3:f5:d9:7b:61:76:89:77:78:de:e1:64:6f:3b:0d: 2a:08:f3:99:10:30:ad:55:5f:f4:df:23:15:6e:cf:7f: f2:12:38:e1:b4:d6:eb:1a:ad:d9:e6:09:58:3c:67:8a: cc:75:77:d5:0c:b9:cd:33:da:78:54:b6:ad:5f:5a:bf: 68:7c:48:48:54:7f:ae:cc:12:52:4f:5a:46:d8:da:25: 24:70:1a:b6:04:19:ef:2a:09:25:33:30:63:09:b5:0f: 4a:f3:e8:bc:d7:0c:fc:3b:96:46:02:58:ec:41:8a:23: 9b:98:45:ff:27:81:df:b8:a2:aa:0f:c3:a3:c5:5d:3f: 30:e0:4c:ec:be:77:58:d4:a0:ef:8b:9f:a3:40:42:89: 3b:02:a2:ba:33:dd:c9:64:35:8e:84:a3:ba:30:ad:d3: bf:06:44:eb:e5:08:a2:c3:a5:12:f0:c3:4a:f3:1a:b0 Fingerprint (SHA-256): FF:AE:62:D0:77:CB:98:5B:0B:2F:F0:58:61:CA:AB:3E:AF:EA:81:E8:90:AA:E3:ED:54:97:AB:7F:C1:92:45:A8 Fingerprint (SHA1): B8:89:74:83:92:08:6F:CB:C4:07:F9:DC:90:13:2F:60:AA:DA:B6:89 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #5675: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5676: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132839 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5677: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5678: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5679: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5680: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108132840 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5681: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5682: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5683: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5684: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108132841 --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #5685: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5686: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #5687: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5688: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 108132842 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5689: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5690: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #5691: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5692: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 108132843 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5693: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5694: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5695: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #5696: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #5697: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #5698: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #5699: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132839 (0x671f9e7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 19:17:06 2016 Not After : Fri Jan 08 19:17:06 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:60:f2:56:71:cc:1b:a8:96:bf:2b:0f:a8:1b:2c:57: 85:f7:f9:59:f2:03:05:41:93:70:be:ca:fe:0c:db:c8: 85:51:54:d4:75:8a:9d:ca:e8:ed:85:0a:bc:23:1c:58: 63:dc:ef:2d:25:86:49:e6:cd:4f:3e:a1:f5:7c:03:b4: 9e:9e:58:10:4e:7c:db:bc:f1:67:0d:f8:c6:18:25:97: 29:79:fd:79:71:07:85:7f:fd:9b:20:95:a2:85:54:86: fb:62:46:7d:1d:38:45:1d:32:00:d6:c5:db:0d:20:4c: 92:dc:78:2e:74:8d:a5:e1:53:5f:c2:68:f6:0f:f3:c3: 9f:39:00:c9:39:82:ff:53:8c:2d:b8:5d:54:25:da:78: 2a:22:47:73:00:0f:68:cd:5c:3f:8c:ff:20:03:b1:3d: 59:37:c7:37:f1:5a:7c:73:2f:68:12:71:9e:c9:b4:7c: 46:cd:89:f4:03:59:02:a9:bd:89:85:61:4a:28:3b:d5: 66:8a:c5:f5:bb:cd:92:24:87:51:51:4c:23:4d:6c:44: 26:d5:f5:3e:33:8a:f2:b0:40:ce:5c:e9:f1:eb:1e:b2: 18:59:98:f2:3a:87:97:81:cc:69:98:85:66:b7:bd:40: ba:5a:ee:2f:44:b4:91:65:c7:b7:81:36:3c:d2:9f:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 13:7f:de:1a:f5:61:59:a3:85:ba:18:df:4f:04:3e:a1: c7:0c:ee:e7:04:ff:5d:ca:1b:15:12:b3:45:9b:e6:20: 34:3e:ea:fa:ad:e8:2e:23:66:b8:76:c9:ff:eb:bb:24: 23:0d:d5:b5:ce:e7:6b:ce:2c:ae:3c:ee:97:8d:52:77: 2f:ac:3d:71:01:4c:5d:9b:ca:04:9f:3d:1e:b4:6e:ce: 4c:fe:6e:d6:7d:1e:b7:4c:54:a6:55:ad:fb:f0:cb:f7: 6c:34:a2:1f:2a:a8:5a:26:ac:5c:39:9f:d1:b8:93:41: 21:4d:51:9d:45:97:56:ee:05:f2:7b:ab:26:4a:41:f5: 46:c8:89:e7:07:b0:9b:ab:13:64:49:f5:b3:e3:1f:5f: 9d:88:b4:c8:7f:4d:a7:bc:1d:28:dd:71:56:d5:b9:65: 33:ce:ea:0f:3a:80:17:a7:c2:a7:98:20:56:79:6a:c5: 89:61:ff:85:57:4e:69:b1:4e:1e:6b:31:cd:4f:b1:5b: d3:e8:5c:19:2b:36:68:98:96:f8:b2:8b:69:58:22:5e: fa:02:77:d6:e2:83:e2:db:8d:41:4a:d9:61:04:b3:04: 91:3d:79:70:28:d3:f4:80:ef:7e:97:d4:8e:8c:9c:7f: 3b:e2:86:ce:d6:a7:82:8f:32:84:54:26:2e:93:46:38 Fingerprint (SHA-256): E0:0A:44:82:A4:C6:EB:C8:0F:3B:83:E6:15:F0:4F:EB:87:2F:19:AD:E7:92:E7:EB:C2:F1:F9:C8:19:69:BB:7B Fingerprint (SHA1): 31:9B:0C:AE:C5:47:D7:58:3F:F6:1C:65:1D:C4:98:7D:28:6C:37:ED Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5700: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5701: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132840 (0x671f9e8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 19:17:16 2016 Not After : Fri Jan 08 19:17:16 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f0:a0:8a:ab:15:94:ce:b1:f0:79:f8:9b:b2:7b:07:97: 37:8b:18:ea:a2:c4:7b:53:07:44:8c:e5:43:fc:07:21: c7:c6:2d:32:fa:73:09:de:89:09:1a:f8:2a:b5:10:28: 53:f4:21:df:9d:6e:d5:fa:32:fd:81:8a:1b:04:f8:11: 57:fd:ae:a1:2b:a6:e8:86:dd:e5:b0:f5:e9:c3:a9:00: 1d:e8:b8:53:3f:70:7a:4c:b8:5b:52:8f:1d:66:6c:8f: 17:e4:ed:73:89:91:d9:16:31:77:a9:f7:a2:68:26:60: c4:c4:28:1f:40:31:02:af:a0:a1:61:cd:71:23:ba:5c: 72:46:58:cb:6f:5c:87:59:4c:b7:d5:b8:29:e1:dc:e0: 7c:2c:e7:c1:09:8e:4b:1b:c6:dc:ae:54:30:43:92:9f: 98:62:6e:4f:24:64:94:a1:43:15:46:f8:ee:7b:59:0f: cb:10:de:81:d5:6e:2b:5b:ad:64:16:b2:dd:b8:d3:a0: a7:de:56:6e:a1:f0:ff:b6:72:e9:24:b9:ad:5f:75:e0: b5:88:d6:40:8a:49:4b:f7:29:cf:a3:99:ab:60:d5:da: fb:c8:5f:55:09:ba:74:9e:43:4c:32:bb:a4:76:bb:63: b1:8f:90:4f:ab:be:45:ba:b0:1f:ad:66:9e:ad:fa:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 01:84:bf:7b:36:78:bb:cc:ef:71:c6:b9:9f:36:d4:cb: 35:a1:c3:45:87:37:9d:88:82:e8:5d:eb:e3:d5:e7:fa: cb:7b:79:e8:0f:74:2d:00:f8:ca:9e:fa:3d:91:2e:e2: 11:df:e7:d3:cd:84:54:19:bb:73:81:2b:b3:fd:d9:b4: ae:df:29:0a:fb:42:17:a8:d0:23:83:fa:9c:aa:3f:33: c6:62:cd:c0:5f:d1:5f:39:92:2d:75:2c:bc:a0:b6:d5: 2b:e2:14:e9:09:27:24:41:62:2b:01:93:60:b3:2b:c5: 82:5d:13:81:ef:d7:8b:52:68:bd:f0:71:f5:b1:17:90: e5:33:f2:8e:06:04:d5:15:ca:19:48:89:4d:6d:a9:e3: 56:bb:93:95:6f:75:86:f6:3a:6f:98:36:f2:45:46:b4: a5:8f:fe:25:1f:55:6a:9e:3b:f3:fb:2e:da:b0:27:28: 9b:19:e2:5d:39:f6:11:46:6d:b7:2e:04:18:30:b4:16: 72:72:8f:35:4f:64:23:b7:25:c6:bb:ab:0e:39:b1:7a: d1:03:cc:89:f6:17:48:2a:2f:a5:f6:eb:5d:b1:f2:5b: f0:60:c9:0a:9a:c0:b2:98:47:f4:0c:a5:1c:df:1f:f8: 85:26:42:bb:22:ec:26:d4:37:cc:82:92:3f:e0:08:57 Fingerprint (SHA-256): 4A:6F:F5:2F:33:8E:EE:F7:DC:D4:E9:AF:20:90:4F:B4:45:D7:97:E0:98:B9:4B:B2:C2:BC:3E:88:E2:FA:35:0C Fingerprint (SHA1): B7:31:81:B6:D1:BD:9A:18:86:A7:A9:D6:55:D6:CC:10:76:E0:A9:AB Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5702: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5703: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5704: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132841 (0x671f9e9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 19:17:22 2016 Not After : Fri Jan 08 19:17:22 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:ec:b8:4b:57:c6:ee:79:4c:c7:89:46:a3:a2:42:cc: 9a:60:c3:f6:16:b4:b2:5d:1a:28:d4:9e:02:01:e2:61: ab:28:d2:20:31:bb:b8:d8:e1:91:c7:14:f9:0e:37:90: 24:b7:a8:ed:30:1b:e7:ae:d6:7e:61:40:42:b4:93:be: ab:9b:dd:dc:40:ab:c4:84:56:28:5c:28:b1:3d:33:ca: 68:83:07:6d:5b:33:0c:b4:01:2f:78:db:c3:13:f4:22: 1e:0d:c5:92:f7:a7:15:e9:96:fb:df:4b:7c:1c:c8:20: c9:9f:ec:3e:4d:28:99:3d:5e:1f:89:96:73:ad:a0:64: 5c:a1:cf:96:be:9c:83:38:10:ec:24:7e:eb:50:66:2b: bb:ef:16:59:f5:8b:a2:2b:23:78:af:29:28:4f:c0:ad: 97:39:e5:45:f4:1b:5b:21:75:7e:a6:02:df:51:de:7e: 82:90:92:67:d8:d3:f0:65:7e:5e:f9:51:94:d9:7d:68: 41:f3:1f:2f:a7:61:a1:cc:76:0a:ba:fc:a4:96:cd:cb: 37:9f:8e:d6:01:e5:1f:9e:5a:ac:c8:71:14:5b:af:99: 28:92:2d:6a:14:dd:2f:1f:40:3f:82:c4:6f:cb:0a:a6: c3:07:ce:c3:47:55:b9:03:98:8d:ec:e9:2f:12:6a:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e2:1e:4c:56:bd:1b:69:d4:28:4e:43:18:74:bc:1a:e8: 1e:11:0e:be:1f:25:24:1a:5b:f2:09:7a:da:d1:3e:68: 36:7f:7e:d7:5b:42:d7:e4:d9:12:36:a5:d6:37:de:ea: 76:11:2f:c5:66:7b:2c:e4:a6:c6:7e:cd:10:4c:76:d6: bb:52:1e:09:a9:61:00:58:2e:7c:2d:90:a5:08:5f:8b: 4a:7f:34:3b:c7:05:b4:6e:04:01:18:49:a9:6e:33:13: cb:4a:85:12:35:bb:7b:12:b1:ad:9f:a2:70:ef:49:aa: 74:d6:76:c0:8b:b7:80:1b:bf:04:7e:e4:4a:97:fe:f1: 2d:26:39:45:ea:bc:f5:2c:5c:07:96:3a:e4:1a:45:a8: ec:10:58:ec:cb:cb:98:9c:68:49:66:0b:1c:5f:12:98: 5f:f0:ed:54:b0:c0:25:9b:c9:cc:64:7c:30:8a:34:08: 00:5a:3a:de:db:19:28:13:dd:3f:c5:b5:4f:ac:e6:cc: fc:d6:1f:20:fb:ac:7f:4a:68:ee:12:b0:5d:73:ec:69: 2b:81:8e:f1:ba:10:8a:85:cb:12:1e:1b:74:c9:3a:0a: 3d:a9:04:53:02:ce:d2:55:db:7a:ca:dd:6b:90:7c:b1: 1d:eb:54:65:cf:1a:5f:ce:d5:6f:e4:c1:8a:d8:71:20 Fingerprint (SHA-256): DA:98:74:1E:F5:1C:FC:99:40:4D:2D:EA:E7:77:A1:77:A6:F8:78:35:9A:F6:5A:2C:CF:0B:A7:D1:E9:04:8A:07 Fingerprint (SHA1): 76:CE:E7:9D:E2:34:17:20:2C:A5:D2:F3:C7:07:8C:E7:FE:81:A5:61 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #5705: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5706: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132844 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5707: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5708: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5709: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5710: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108132845 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5711: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5712: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5713: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5714: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108132846 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA1Root-108132623.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5715: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5716: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #5717: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5718: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108132847 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5719: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5720: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #5721: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132844 (0x671f9ec) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 19:18:09 2016 Not After : Fri Jan 08 19:18:09 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:f7:84:c5:c9:a6:52:c6:03:f7:13:28:7e:61:fe:0c: 0f:8b:a1:9a:ae:96:f9:f9:38:f5:76:ce:58:62:09:72: 02:eb:17:4a:fa:5e:7d:7b:d8:fd:03:ff:db:03:0f:fa: 4c:e1:32:87:03:6e:71:bb:c6:ff:75:04:4a:c1:59:74: 0e:f6:81:0f:9a:65:93:61:7c:eb:4a:f5:a4:b9:a5:44: 6f:94:45:bf:47:1f:e9:61:4b:e0:8e:92:7b:5f:34:50: 7c:68:87:d4:40:35:87:aa:8f:83:63:ad:0c:31:31:61: a5:f1:ce:87:ad:54:53:20:ad:88:a9:55:7c:39:78:06: c5:99:5b:69:5c:ae:a4:85:ee:e0:0a:11:d9:25:e3:a1: db:ab:dd:a3:76:d6:7a:87:ca:1c:e6:42:47:10:6a:fe: fb:46:c5:48:e4:59:2e:c3:98:d3:fa:f5:03:95:1d:f5: 42:f8:3d:be:13:a4:7a:62:31:02:6f:7e:b0:6a:b4:4e: 98:25:ed:1a:b3:40:59:5b:d6:c9:f0:ac:be:2b:7e:da: 4b:46:77:ea:50:5f:54:78:f5:ce:58:5c:ec:7c:cc:8e: ae:50:7c:dc:2c:69:d5:cb:38:3c:49:24:aa:a5:97:ce: 33:db:66:4d:1b:01:e4:3e:d0:c6:28:c6:91:9e:54:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: aa:ce:23:f6:65:23:68:14:23:8c:72:6e:9b:66:4b:27: 09:89:0f:83:9c:42:83:d4:85:f4:c5:c8:4d:18:3a:22: 39:ce:38:80:f2:40:9c:ec:d4:ea:10:44:c1:56:fa:7d: f4:72:de:97:af:86:30:3a:25:e9:63:2c:5f:26:b1:b9: e1:bb:6d:b4:04:f1:73:38:4c:7d:f5:0b:00:64:a7:48: 6d:21:d6:20:65:b4:71:ba:38:72:ae:62:87:9d:78:6d: 32:09:33:60:5d:7e:aa:c8:12:c8:19:ab:72:3f:36:f4: 07:db:13:d6:0e:c0:f5:02:f0:dd:a0:7c:1d:66:1a:28: b9:f4:a9:66:03:26:4d:90:67:ec:81:a5:1d:1a:ac:c2: 6d:de:04:4f:b5:31:04:e3:82:c0:ce:ed:92:58:f6:9b: cf:68:f1:cb:fa:7b:ca:53:08:5f:ea:87:c0:ec:7e:9f: 60:0e:a6:51:d1:84:79:9f:1a:3e:92:77:27:7b:c5:0f: d8:2a:52:3a:b2:34:1a:5e:07:45:70:c8:d5:b1:3f:95: 82:61:11:63:4a:d3:7d:1b:f8:3c:c2:63:02:40:27:c8: 4f:e6:6f:4b:1e:6e:1f:9c:eb:1b:7f:e7:4d:86:6f:16: f2:73:bf:21:fd:4f:27:f3:f5:57:52:e2:9a:53:6f:dd Fingerprint (SHA-256): 95:E4:1F:17:D0:56:81:0E:17:05:70:FD:C1:99:BF:E9:18:7D:78:82:F5:70:D4:A7:E2:3D:57:29:AC:0F:00:6E Fingerprint (SHA1): D3:79:1A:40:12:1C:EA:A0:91:0C:BC:FD:23:D5:CE:09:A2:41:57:05 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5722: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #5723: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132848 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5724: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #5725: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #5726: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132849 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5727: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #5728: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #5729: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5730: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108132850 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5731: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5732: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108132851 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5733: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5734: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #5735: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5736: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5737: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108132852 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-Bridge-108132624.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5738: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5739: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5740: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5741: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108132853 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5742: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5743: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #5744: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #5745: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132849 (0x671f9f1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 19:19:15 2016 Not After : Fri Jan 08 19:19:15 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f2:eb:70:cb:d2:61:b6:2d:70:61:82:81:02:a8:3b:e0: 97:6a:d2:52:f4:8a:f4:ec:34:d1:39:98:e9:2b:fb:65: d4:a6:36:e9:ac:82:bd:d3:9b:59:4e:b9:8a:c7:35:74: b4:b8:a3:bf:db:16:29:43:08:c6:f1:52:dd:6f:8f:85: 70:22:38:e0:9d:e7:f9:8c:5f:d2:05:b6:8b:de:36:27: 6c:4f:5c:b7:f8:50:f1:17:41:d0:15:d4:24:5d:f4:18: 92:f5:fa:e4:27:4e:52:79:5c:d2:f4:0d:d4:0d:fc:59: 0f:df:ae:fe:0c:6b:2d:28:b4:41:e6:c0:07:38:d5:93: d6:8f:60:6b:77:6d:a5:0c:5e:81:a0:72:c0:f3:52:bf: d2:83:83:1b:ff:2d:e9:21:87:59:5d:e5:ce:e2:47:d3: a3:02:59:99:34:35:88:e2:92:00:52:e8:2b:79:a0:d6: 3c:09:22:32:55:a7:ca:58:1e:32:53:3f:d5:47:0f:ce: 84:26:03:c9:97:c2:88:ed:14:95:22:91:1b:66:cc:da: 30:5e:48:b8:d1:bc:51:92:fc:a8:db:1f:20:7b:68:5b: a6:56:e7:7d:7a:20:ea:06:7f:c2:b1:3f:22:09:1e:9a: 32:7b:d4:f8:df:bf:55:af:25:be:23:1e:65:ca:66:93 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2f:30:28:09:fc:35:b2:fc:8c:ac:92:9b:d4:39:a9:20: fc:1f:e1:ea:86:28:c6:c2:8b:9c:2b:96:5a:9a:60:13: 4a:60:b0:5b:15:71:e8:6e:42:53:44:be:b1:6f:47:b0: 8b:ae:67:51:93:ca:ab:b6:23:88:06:37:08:cf:81:c1: 38:11:7f:8e:6e:2b:dc:0c:af:9b:0c:fb:d1:f8:e1:ad: 87:54:f2:21:68:47:42:dd:8b:09:b0:7f:8f:25:ad:53: 0f:1a:10:08:6e:51:ff:d7:00:f2:e1:a9:d5:3a:bd:56: d4:da:c8:a0:6e:cb:b9:35:92:67:bd:ac:39:78:04:bd: 25:e8:d1:32:11:b1:27:38:18:36:e0:93:a7:76:f7:b5: 2d:b2:dd:12:8b:27:96:ae:40:1d:71:a4:07:da:7e:e5: a1:ac:a2:39:25:e2:96:c3:b4:ce:e5:5a:8a:83:b2:bf: 37:9c:16:32:74:51:1b:d2:d1:55:c0:cd:e2:87:0a:9b: ae:96:35:d2:10:44:9d:0b:d5:e0:0b:ae:86:b1:39:68: 32:01:52:28:88:fb:d2:55:be:90:7b:b8:a2:00:f6:e1: 1d:99:e1:ef:b3:72:8a:d2:1a:1a:f8:c3:a8:8b:21:6d: 4f:22:9a:f4:e6:c8:af:2c:22:27:c7:4c:8b:17:99:70 Fingerprint (SHA-256): 71:7F:C8:CA:24:68:A2:C5:CA:7D:66:4D:D1:D0:6A:DF:3E:9D:B3:C7:0C:03:30:16:F9:0F:67:59:67:46:73:6E Fingerprint (SHA1): 8B:08:BE:AC:EA:DD:C0:76:41:F0:CD:2D:2F:2E:7F:36:FD:19:7F:C0 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5746: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132849 (0x671f9f1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 19:19:15 2016 Not After : Fri Jan 08 19:19:15 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f2:eb:70:cb:d2:61:b6:2d:70:61:82:81:02:a8:3b:e0: 97:6a:d2:52:f4:8a:f4:ec:34:d1:39:98:e9:2b:fb:65: d4:a6:36:e9:ac:82:bd:d3:9b:59:4e:b9:8a:c7:35:74: b4:b8:a3:bf:db:16:29:43:08:c6:f1:52:dd:6f:8f:85: 70:22:38:e0:9d:e7:f9:8c:5f:d2:05:b6:8b:de:36:27: 6c:4f:5c:b7:f8:50:f1:17:41:d0:15:d4:24:5d:f4:18: 92:f5:fa:e4:27:4e:52:79:5c:d2:f4:0d:d4:0d:fc:59: 0f:df:ae:fe:0c:6b:2d:28:b4:41:e6:c0:07:38:d5:93: d6:8f:60:6b:77:6d:a5:0c:5e:81:a0:72:c0:f3:52:bf: d2:83:83:1b:ff:2d:e9:21:87:59:5d:e5:ce:e2:47:d3: a3:02:59:99:34:35:88:e2:92:00:52:e8:2b:79:a0:d6: 3c:09:22:32:55:a7:ca:58:1e:32:53:3f:d5:47:0f:ce: 84:26:03:c9:97:c2:88:ed:14:95:22:91:1b:66:cc:da: 30:5e:48:b8:d1:bc:51:92:fc:a8:db:1f:20:7b:68:5b: a6:56:e7:7d:7a:20:ea:06:7f:c2:b1:3f:22:09:1e:9a: 32:7b:d4:f8:df:bf:55:af:25:be:23:1e:65:ca:66:93 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2f:30:28:09:fc:35:b2:fc:8c:ac:92:9b:d4:39:a9:20: fc:1f:e1:ea:86:28:c6:c2:8b:9c:2b:96:5a:9a:60:13: 4a:60:b0:5b:15:71:e8:6e:42:53:44:be:b1:6f:47:b0: 8b:ae:67:51:93:ca:ab:b6:23:88:06:37:08:cf:81:c1: 38:11:7f:8e:6e:2b:dc:0c:af:9b:0c:fb:d1:f8:e1:ad: 87:54:f2:21:68:47:42:dd:8b:09:b0:7f:8f:25:ad:53: 0f:1a:10:08:6e:51:ff:d7:00:f2:e1:a9:d5:3a:bd:56: d4:da:c8:a0:6e:cb:b9:35:92:67:bd:ac:39:78:04:bd: 25:e8:d1:32:11:b1:27:38:18:36:e0:93:a7:76:f7:b5: 2d:b2:dd:12:8b:27:96:ae:40:1d:71:a4:07:da:7e:e5: a1:ac:a2:39:25:e2:96:c3:b4:ce:e5:5a:8a:83:b2:bf: 37:9c:16:32:74:51:1b:d2:d1:55:c0:cd:e2:87:0a:9b: ae:96:35:d2:10:44:9d:0b:d5:e0:0b:ae:86:b1:39:68: 32:01:52:28:88:fb:d2:55:be:90:7b:b8:a2:00:f6:e1: 1d:99:e1:ef:b3:72:8a:d2:1a:1a:f8:c3:a8:8b:21:6d: 4f:22:9a:f4:e6:c8:af:2c:22:27:c7:4c:8b:17:99:70 Fingerprint (SHA-256): 71:7F:C8:CA:24:68:A2:C5:CA:7D:66:4D:D1:D0:6A:DF:3E:9D:B3:C7:0C:03:30:16:F9:0F:67:59:67:46:73:6E Fingerprint (SHA1): 8B:08:BE:AC:EA:DD:C0:76:41:F0:CD:2D:2F:2E:7F:36:FD:19:7F:C0 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5747: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #5748: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132854 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5749: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #5750: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #5751: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132855 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5752: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #5753: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #5754: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5755: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108132856 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5756: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5757: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108132857 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5758: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5759: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #5760: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5761: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5762: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108132858 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-Bridge-108132625.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5763: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5764: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5765: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5766: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108132859 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5767: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5768: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5769: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5770: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 108132860 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-BridgeNavy-108132626.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5771: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5772: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5773: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5774: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108132861 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5775: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5776: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #5777: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #5778: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132855 (0x671f9f7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 19:20:05 2016 Not After : Fri Jan 08 19:20:05 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c9:9d:20:3b:96:65:a7:44:fc:3d:11:26:e0:59:93: af:e0:fe:40:b3:e3:c7:4b:fe:0e:ee:66:43:7e:20:fe: e0:04:b8:e1:66:3f:11:5f:c3:72:88:c3:d8:cd:23:97: de:43:4b:c0:a0:6b:68:2f:54:3b:ad:af:54:17:a9:02: 98:14:b3:c6:54:55:d3:50:f9:a1:2f:20:50:4d:13:a0: 3a:b9:04:28:2a:0c:b0:c2:2d:9f:61:21:24:6c:f4:ab: 5a:fe:d5:a5:77:5b:65:c5:e2:92:51:f0:b8:1e:c8:8d: da:db:01:ad:bc:11:fd:90:ab:cd:46:12:a7:1f:85:2e: 2f:c5:82:22:31:4b:ca:34:09:9f:a4:ee:ed:22:c2:61: c6:b8:10:98:6d:6d:83:be:ed:c7:16:f5:fb:3b:31:df: 75:ad:47:58:e2:d1:bc:e8:cb:bd:f5:b4:45:9e:82:27: c4:42:c6:8d:0d:e7:4d:e5:c0:5e:21:3e:83:fc:97:a5: 30:ce:6c:e0:f5:4f:3a:9d:3b:54:b7:1d:14:04:e2:d7: 34:18:54:7c:4d:d7:56:2a:86:78:fe:26:18:74:7e:bd: 5b:40:b5:57:2a:ac:fb:e1:9a:bc:c7:8b:1d:60:1c:ba: fd:56:2c:02:a1:9b:60:1b:5c:55:95:02:ca:3c:03:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0f:e7:d7:be:e9:86:84:cf:a5:4f:22:07:c9:30:fe:c4: 8b:c6:9c:bd:7f:72:2a:86:79:e0:11:e0:44:61:42:cf: e5:28:c2:af:f1:e3:d0:d1:c9:c1:fd:5c:f0:68:6a:cb: 16:ff:17:4d:2d:99:b3:f2:d2:d0:60:aa:83:4a:b3:cc: 89:96:4e:3f:4d:3f:6c:b9:f0:1f:e6:02:2c:3d:f4:6a: 9e:97:c9:ec:df:ca:f3:a0:84:58:07:f4:b3:4e:f5:9c: a7:ad:a3:d5:1c:a5:fe:7c:6a:e2:82:7a:d8:b7:71:d7: 87:d6:1e:74:df:db:72:27:c1:5a:38:79:6e:48:2e:95: 89:e3:80:97:98:1c:4a:db:94:84:b9:bc:44:ad:8f:35: f6:a9:d1:9e:00:21:a2:2f:e3:ab:71:81:70:41:7f:90: f5:69:d4:22:cf:09:7f:2e:17:73:bc:5e:bd:75:e8:97: 02:a0:a1:be:f0:36:16:61:6a:77:9e:68:8f:00:cf:48: 15:a2:0c:e5:00:6a:cd:a6:97:a2:a5:76:7b:6b:ed:ce: 66:42:6b:00:85:db:e5:1a:8b:33:55:bc:60:55:a1:a6: 63:87:1a:b2:af:e2:62:58:b7:f1:f6:9b:59:b4:c9:87: ca:b0:4a:3f:a0:b3:94:e7:1d:58:8b:05:a5:b9:12:52 Fingerprint (SHA-256): 7C:3B:5A:7A:6C:B0:AC:66:D0:36:7C:15:13:59:39:3F:32:F2:ED:02:65:A3:6A:05:C8:E5:87:CF:19:8E:BE:48 Fingerprint (SHA1): E7:7A:55:22:8C:F9:0F:FA:F6:05:CE:04:6E:69:47:9E:D4:AB:DE:F5 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5779: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132855 (0x671f9f7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 19:20:05 2016 Not After : Fri Jan 08 19:20:05 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c9:9d:20:3b:96:65:a7:44:fc:3d:11:26:e0:59:93: af:e0:fe:40:b3:e3:c7:4b:fe:0e:ee:66:43:7e:20:fe: e0:04:b8:e1:66:3f:11:5f:c3:72:88:c3:d8:cd:23:97: de:43:4b:c0:a0:6b:68:2f:54:3b:ad:af:54:17:a9:02: 98:14:b3:c6:54:55:d3:50:f9:a1:2f:20:50:4d:13:a0: 3a:b9:04:28:2a:0c:b0:c2:2d:9f:61:21:24:6c:f4:ab: 5a:fe:d5:a5:77:5b:65:c5:e2:92:51:f0:b8:1e:c8:8d: da:db:01:ad:bc:11:fd:90:ab:cd:46:12:a7:1f:85:2e: 2f:c5:82:22:31:4b:ca:34:09:9f:a4:ee:ed:22:c2:61: c6:b8:10:98:6d:6d:83:be:ed:c7:16:f5:fb:3b:31:df: 75:ad:47:58:e2:d1:bc:e8:cb:bd:f5:b4:45:9e:82:27: c4:42:c6:8d:0d:e7:4d:e5:c0:5e:21:3e:83:fc:97:a5: 30:ce:6c:e0:f5:4f:3a:9d:3b:54:b7:1d:14:04:e2:d7: 34:18:54:7c:4d:d7:56:2a:86:78:fe:26:18:74:7e:bd: 5b:40:b5:57:2a:ac:fb:e1:9a:bc:c7:8b:1d:60:1c:ba: fd:56:2c:02:a1:9b:60:1b:5c:55:95:02:ca:3c:03:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0f:e7:d7:be:e9:86:84:cf:a5:4f:22:07:c9:30:fe:c4: 8b:c6:9c:bd:7f:72:2a:86:79:e0:11:e0:44:61:42:cf: e5:28:c2:af:f1:e3:d0:d1:c9:c1:fd:5c:f0:68:6a:cb: 16:ff:17:4d:2d:99:b3:f2:d2:d0:60:aa:83:4a:b3:cc: 89:96:4e:3f:4d:3f:6c:b9:f0:1f:e6:02:2c:3d:f4:6a: 9e:97:c9:ec:df:ca:f3:a0:84:58:07:f4:b3:4e:f5:9c: a7:ad:a3:d5:1c:a5:fe:7c:6a:e2:82:7a:d8:b7:71:d7: 87:d6:1e:74:df:db:72:27:c1:5a:38:79:6e:48:2e:95: 89:e3:80:97:98:1c:4a:db:94:84:b9:bc:44:ad:8f:35: f6:a9:d1:9e:00:21:a2:2f:e3:ab:71:81:70:41:7f:90: f5:69:d4:22:cf:09:7f:2e:17:73:bc:5e:bd:75:e8:97: 02:a0:a1:be:f0:36:16:61:6a:77:9e:68:8f:00:cf:48: 15:a2:0c:e5:00:6a:cd:a6:97:a2:a5:76:7b:6b:ed:ce: 66:42:6b:00:85:db:e5:1a:8b:33:55:bc:60:55:a1:a6: 63:87:1a:b2:af:e2:62:58:b7:f1:f6:9b:59:b4:c9:87: ca:b0:4a:3f:a0:b3:94:e7:1d:58:8b:05:a5:b9:12:52 Fingerprint (SHA-256): 7C:3B:5A:7A:6C:B0:AC:66:D0:36:7C:15:13:59:39:3F:32:F2:ED:02:65:A3:6A:05:C8:E5:87:CF:19:8E:BE:48 Fingerprint (SHA1): E7:7A:55:22:8C:F9:0F:FA:F6:05:CE:04:6E:69:47:9E:D4:AB:DE:F5 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5780: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #5781: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132854 (0x671f9f6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 19:20:02 2016 Not After : Fri Jan 08 19:20:02 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:39:cb:94:50:cc:dd:fe:2c:73:70:2b:c7:b2:a1:76: 81:e4:b9:1b:28:f0:19:bb:29:e3:98:69:a1:9a:15:bf: 7f:13:c7:49:47:c8:a2:c0:e3:be:94:2f:6b:2d:9e:a1: ab:b8:03:58:16:7d:0a:9f:f5:a2:20:b0:93:f1:33:ac: 30:17:23:7e:d6:ad:1e:a7:6e:e5:6a:1d:94:85:1f:ee: 8f:86:ee:63:77:db:b3:db:d7:bb:b2:cd:4d:15:47:ec: f1:b1:d6:42:ee:29:c4:49:55:d3:28:27:9b:05:bb:59: 49:15:0e:6d:e6:a7:9a:a6:23:a8:13:2f:1c:6a:79:a3: a4:42:2c:20:c7:59:da:c5:61:53:af:a8:c4:2a:40:0a: f7:00:d5:04:8e:45:c2:ba:7d:11:11:f3:fe:68:78:b1: 68:1a:37:aa:8a:c9:6f:d3:50:29:13:21:ca:d6:c4:7e: 20:3c:e1:de:5c:fb:92:4f:20:24:68:35:5b:21:ab:43: 06:7c:e4:d8:37:25:20:78:f5:aa:a5:67:52:25:25:cf: cb:c2:f2:07:3d:9b:ab:03:d4:b3:aa:b1:12:17:a9:d6: b3:5a:03:88:11:e0:fc:75:e6:4f:3f:68:fb:e4:80:cf: b7:74:59:bb:a4:ed:67:54:8b:e0:29:3b:f3:95:a6:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:3c:c4:a6:ff:da:ae:e2:e4:a8:73:01:01:9f:03:85: 00:0c:9a:48:66:0c:8d:49:16:fa:82:5d:65:7e:a4:b8: 80:ba:4e:09:d1:f5:fa:21:04:61:1f:0f:bf:0f:24:e4: 18:b6:41:00:f5:6c:5d:7b:d7:31:b6:ab:7b:8d:a3:2d: 3b:ee:3e:03:9d:a8:3a:63:64:b8:3c:e3:9f:74:66:ae: da:22:51:f6:fe:63:52:0e:3d:a1:54:9e:8c:44:44:78: f5:d0:96:75:1f:cd:09:ff:06:88:f9:81:9a:01:f0:39: 48:ae:8e:0f:c1:91:a7:4a:dc:0d:23:04:fb:ad:8f:44: e9:70:dc:e2:ac:40:c9:aa:5e:64:ac:08:80:d5:15:ba: 27:58:6b:7d:52:c7:0a:8c:c7:f2:45:d0:9b:59:c1:13: 2b:5c:28:ea:e6:52:b5:58:43:be:6a:f0:0c:25:ed:65: f6:1f:c9:37:9a:ec:c8:e2:04:24:d1:f1:07:39:06:0b: 06:79:19:96:26:50:a3:04:e4:81:e7:bf:91:46:c8:4f: 22:d1:9f:bb:0d:5c:c9:51:38:5b:d9:43:39:87:5f:52: 12:2e:91:e2:e5:46:66:15:4c:3c:30:3a:09:10:d9:70: 3d:c4:9d:52:da:f6:4e:35:91:30:c9:1c:d5:bc:d7:65 Fingerprint (SHA-256): 4E:26:F3:1B:F5:5F:DD:56:90:21:4E:2E:BA:F8:7F:75:12:9C:05:D7:AA:3A:A7:28:B7:9D:B3:50:3B:D6:AE:6A Fingerprint (SHA1): F6:21:EA:78:D8:C1:B3:29:4D:F4:0D:C1:34:14:52:12:25:3D:28:00 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5782: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132855 (0x671f9f7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 19:20:05 2016 Not After : Fri Jan 08 19:20:05 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c9:9d:20:3b:96:65:a7:44:fc:3d:11:26:e0:59:93: af:e0:fe:40:b3:e3:c7:4b:fe:0e:ee:66:43:7e:20:fe: e0:04:b8:e1:66:3f:11:5f:c3:72:88:c3:d8:cd:23:97: de:43:4b:c0:a0:6b:68:2f:54:3b:ad:af:54:17:a9:02: 98:14:b3:c6:54:55:d3:50:f9:a1:2f:20:50:4d:13:a0: 3a:b9:04:28:2a:0c:b0:c2:2d:9f:61:21:24:6c:f4:ab: 5a:fe:d5:a5:77:5b:65:c5:e2:92:51:f0:b8:1e:c8:8d: da:db:01:ad:bc:11:fd:90:ab:cd:46:12:a7:1f:85:2e: 2f:c5:82:22:31:4b:ca:34:09:9f:a4:ee:ed:22:c2:61: c6:b8:10:98:6d:6d:83:be:ed:c7:16:f5:fb:3b:31:df: 75:ad:47:58:e2:d1:bc:e8:cb:bd:f5:b4:45:9e:82:27: c4:42:c6:8d:0d:e7:4d:e5:c0:5e:21:3e:83:fc:97:a5: 30:ce:6c:e0:f5:4f:3a:9d:3b:54:b7:1d:14:04:e2:d7: 34:18:54:7c:4d:d7:56:2a:86:78:fe:26:18:74:7e:bd: 5b:40:b5:57:2a:ac:fb:e1:9a:bc:c7:8b:1d:60:1c:ba: fd:56:2c:02:a1:9b:60:1b:5c:55:95:02:ca:3c:03:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0f:e7:d7:be:e9:86:84:cf:a5:4f:22:07:c9:30:fe:c4: 8b:c6:9c:bd:7f:72:2a:86:79:e0:11:e0:44:61:42:cf: e5:28:c2:af:f1:e3:d0:d1:c9:c1:fd:5c:f0:68:6a:cb: 16:ff:17:4d:2d:99:b3:f2:d2:d0:60:aa:83:4a:b3:cc: 89:96:4e:3f:4d:3f:6c:b9:f0:1f:e6:02:2c:3d:f4:6a: 9e:97:c9:ec:df:ca:f3:a0:84:58:07:f4:b3:4e:f5:9c: a7:ad:a3:d5:1c:a5:fe:7c:6a:e2:82:7a:d8:b7:71:d7: 87:d6:1e:74:df:db:72:27:c1:5a:38:79:6e:48:2e:95: 89:e3:80:97:98:1c:4a:db:94:84:b9:bc:44:ad:8f:35: f6:a9:d1:9e:00:21:a2:2f:e3:ab:71:81:70:41:7f:90: f5:69:d4:22:cf:09:7f:2e:17:73:bc:5e:bd:75:e8:97: 02:a0:a1:be:f0:36:16:61:6a:77:9e:68:8f:00:cf:48: 15:a2:0c:e5:00:6a:cd:a6:97:a2:a5:76:7b:6b:ed:ce: 66:42:6b:00:85:db:e5:1a:8b:33:55:bc:60:55:a1:a6: 63:87:1a:b2:af:e2:62:58:b7:f1:f6:9b:59:b4:c9:87: ca:b0:4a:3f:a0:b3:94:e7:1d:58:8b:05:a5:b9:12:52 Fingerprint (SHA-256): 7C:3B:5A:7A:6C:B0:AC:66:D0:36:7C:15:13:59:39:3F:32:F2:ED:02:65:A3:6A:05:C8:E5:87:CF:19:8E:BE:48 Fingerprint (SHA1): E7:7A:55:22:8C:F9:0F:FA:F6:05:CE:04:6E:69:47:9E:D4:AB:DE:F5 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5783: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132855 (0x671f9f7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 19:20:05 2016 Not After : Fri Jan 08 19:20:05 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c9:9d:20:3b:96:65:a7:44:fc:3d:11:26:e0:59:93: af:e0:fe:40:b3:e3:c7:4b:fe:0e:ee:66:43:7e:20:fe: e0:04:b8:e1:66:3f:11:5f:c3:72:88:c3:d8:cd:23:97: de:43:4b:c0:a0:6b:68:2f:54:3b:ad:af:54:17:a9:02: 98:14:b3:c6:54:55:d3:50:f9:a1:2f:20:50:4d:13:a0: 3a:b9:04:28:2a:0c:b0:c2:2d:9f:61:21:24:6c:f4:ab: 5a:fe:d5:a5:77:5b:65:c5:e2:92:51:f0:b8:1e:c8:8d: da:db:01:ad:bc:11:fd:90:ab:cd:46:12:a7:1f:85:2e: 2f:c5:82:22:31:4b:ca:34:09:9f:a4:ee:ed:22:c2:61: c6:b8:10:98:6d:6d:83:be:ed:c7:16:f5:fb:3b:31:df: 75:ad:47:58:e2:d1:bc:e8:cb:bd:f5:b4:45:9e:82:27: c4:42:c6:8d:0d:e7:4d:e5:c0:5e:21:3e:83:fc:97:a5: 30:ce:6c:e0:f5:4f:3a:9d:3b:54:b7:1d:14:04:e2:d7: 34:18:54:7c:4d:d7:56:2a:86:78:fe:26:18:74:7e:bd: 5b:40:b5:57:2a:ac:fb:e1:9a:bc:c7:8b:1d:60:1c:ba: fd:56:2c:02:a1:9b:60:1b:5c:55:95:02:ca:3c:03:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0f:e7:d7:be:e9:86:84:cf:a5:4f:22:07:c9:30:fe:c4: 8b:c6:9c:bd:7f:72:2a:86:79:e0:11:e0:44:61:42:cf: e5:28:c2:af:f1:e3:d0:d1:c9:c1:fd:5c:f0:68:6a:cb: 16:ff:17:4d:2d:99:b3:f2:d2:d0:60:aa:83:4a:b3:cc: 89:96:4e:3f:4d:3f:6c:b9:f0:1f:e6:02:2c:3d:f4:6a: 9e:97:c9:ec:df:ca:f3:a0:84:58:07:f4:b3:4e:f5:9c: a7:ad:a3:d5:1c:a5:fe:7c:6a:e2:82:7a:d8:b7:71:d7: 87:d6:1e:74:df:db:72:27:c1:5a:38:79:6e:48:2e:95: 89:e3:80:97:98:1c:4a:db:94:84:b9:bc:44:ad:8f:35: f6:a9:d1:9e:00:21:a2:2f:e3:ab:71:81:70:41:7f:90: f5:69:d4:22:cf:09:7f:2e:17:73:bc:5e:bd:75:e8:97: 02:a0:a1:be:f0:36:16:61:6a:77:9e:68:8f:00:cf:48: 15:a2:0c:e5:00:6a:cd:a6:97:a2:a5:76:7b:6b:ed:ce: 66:42:6b:00:85:db:e5:1a:8b:33:55:bc:60:55:a1:a6: 63:87:1a:b2:af:e2:62:58:b7:f1:f6:9b:59:b4:c9:87: ca:b0:4a:3f:a0:b3:94:e7:1d:58:8b:05:a5:b9:12:52 Fingerprint (SHA-256): 7C:3B:5A:7A:6C:B0:AC:66:D0:36:7C:15:13:59:39:3F:32:F2:ED:02:65:A3:6A:05:C8:E5:87:CF:19:8E:BE:48 Fingerprint (SHA1): E7:7A:55:22:8C:F9:0F:FA:F6:05:CE:04:6E:69:47:9E:D4:AB:DE:F5 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5784: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #5785: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132862 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5786: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #5787: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #5788: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132863 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5789: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #5790: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #5791: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5792: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 108132864 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5793: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5794: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #5795: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5796: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 108132865 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5797: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5798: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #5799: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5800: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 108132866 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #5801: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5802: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 108132867 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #5803: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5804: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #5805: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5806: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5807: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108132868 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5808: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5809: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5810: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5811: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 108132869 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5812: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5813: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5814: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5815: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108132870 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5816: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5817: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5818: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5819: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108132871 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5820: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5821: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5822: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132862 (0x671f9fe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 19:21:27 2016 Not After : Fri Jan 08 19:21:27 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:f2:3a:5d:d1:09:1b:91:7a:72:29:d0:2f:5f:cd:05: 5a:d4:ae:e8:1e:df:b4:74:12:81:9d:78:b3:3e:55:9e: 87:dc:1e:6a:e1:22:5a:5a:31:ef:9e:cb:a8:17:09:9b: c9:76:13:a9:ab:71:d7:0a:29:b1:46:a4:46:26:50:9a: 6d:26:6d:11:db:2d:26:27:a8:98:e2:2f:ce:92:a3:77: e2:3b:d0:97:22:e9:b6:95:c1:55:95:d4:b1:24:cd:63: 39:46:94:ab:16:5d:90:2a:66:d2:30:94:6d:42:5b:7a: 28:21:a0:40:3e:44:ba:e7:9c:76:f9:98:3d:b5:f2:3b: 8f:bb:a8:98:8c:4d:3f:8d:6a:c9:c9:85:78:db:c5:af: 61:83:3c:11:21:f7:3a:23:d2:84:cf:7e:3a:61:44:7a: d7:07:1a:4d:92:d4:14:70:a5:bc:93:f8:2b:f9:35:47: 7c:e1:d1:0d:ac:7a:83:3f:67:e9:9b:48:17:ce:68:ae: f7:e3:59:79:cd:13:55:7a:10:e1:af:58:74:70:c6:91: d3:6d:9f:6c:ea:56:2e:92:c7:4f:d1:d4:ba:00:71:92: b6:bd:ce:86:3f:74:a3:21:1a:63:4b:b7:37:94:44:80: 92:d1:30:63:17:bb:a1:e5:91:30:a9:7f:b7:91:97:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a7:3b:71:2f:ad:69:aa:eb:74:f6:71:7f:4b:0a:68:cf: 4f:0c:cf:dc:11:ed:41:60:ea:72:9d:e0:4b:98:bc:72: 92:4d:db:c2:fd:e4:25:0d:a6:32:1d:b0:44:8b:92:4d: 98:74:93:1a:0e:19:a0:b7:e7:a8:bc:ec:2f:2f:13:6d: 09:9d:fe:a1:bf:b3:6c:a6:dd:6f:dd:b4:40:38:11:96: 93:1a:ca:97:cd:52:da:6f:fb:62:be:ae:64:70:a8:da: aa:ae:39:ca:ff:8b:3e:ba:96:87:5c:0a:9e:08:38:37: 4c:b6:32:8e:73:18:b8:ed:c5:e1:99:d3:d7:bc:7a:b3: 58:f6:8e:f2:cf:2f:1c:c2:e8:82:ab:e0:3e:7d:c3:4d: ca:e6:68:a5:6d:17:19:ce:37:67:8a:75:5f:42:91:1e: 76:28:ad:b3:45:95:a0:45:bf:48:48:db:37:e9:0b:e5: 97:4e:55:c4:5f:3f:9e:4e:b9:c1:64:0f:87:7e:97:77: a9:1f:b9:9c:fd:3d:20:8d:bd:f0:01:ef:d4:22:aa:e4: 70:a9:a6:61:df:7f:c1:fd:40:f6:d7:03:70:ae:cf:a7: 09:96:c2:6f:24:e0:17:78:49:0f:0d:c1:bf:7b:8e:b8: 2b:55:ae:b5:6c:f2:5c:eb:07:59:94:60:2c:44:76:82 Fingerprint (SHA-256): 11:F1:67:E0:4C:C9:E0:0C:E4:AC:DC:34:84:EB:06:F3:9A:3C:A5:F1:2E:80:93:9C:79:01:2C:CE:59:50:92:12 Fingerprint (SHA1): 5C:D8:95:AD:FA:06:8D:ED:12:C1:16:94:90:02:64:07:3F:E2:C4:73 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #5823: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5824: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5825: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5826: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5827: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5828: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5829: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5830: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5831: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132863 (0x671f9ff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 19:22:01 2016 Not After : Fri Jan 08 19:22:01 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:02:2b:4f:66:7d:a4:e6:43:02:78:cc:be:4b:6e:f9: 02:37:a3:30:bb:40:2b:4e:a7:97:d5:dc:c6:8d:5c:c2: 3f:24:d2:5f:0b:e8:9e:df:de:bb:42:02:e5:64:dd:d6: 3b:89:99:05:3e:42:19:04:16:5b:b7:71:fa:d2:12:b6: bd:dd:d3:41:3f:0e:37:af:85:db:5e:6e:69:8c:fe:fc: b4:67:f1:fa:ea:15:cc:ee:b9:ce:96:ae:c3:16:c4:b9: 09:d4:04:a4:44:fd:fd:af:1a:e2:ef:80:a6:bb:98:fb: 74:a2:14:26:86:ea:92:93:5d:f4:b5:2f:46:e5:b3:60: 4a:52:97:3d:ae:33:e7:1f:b0:48:67:76:3e:ed:01:a1: f5:8e:84:39:b9:e6:9c:ae:35:92:90:9f:e0:37:d1:4f: e4:15:22:16:c3:aa:aa:0e:75:66:55:b8:d6:dc:fa:7b: 63:af:ec:2c:23:34:59:3c:3e:df:98:3f:37:e2:d7:76: 71:b5:4d:0a:57:e7:29:69:4a:62:8d:83:fe:b2:ba:31: 87:dc:dc:e1:32:bf:60:49:a2:8c:28:a4:83:69:c5:12: 3d:84:95:39:41:2c:9d:c0:89:0d:cd:53:14:63:39:52: 61:09:ea:ec:e3:0b:fc:f9:f7:72:23:ab:23:fd:b6:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:2d:4d:5b:7c:07:d7:4a:97:fe:dc:2e:1a:86:18:23: 38:e7:8b:71:87:55:7a:2b:1a:64:a9:92:bb:ad:1a:e7: 17:dc:ce:d0:7d:ea:c2:a2:de:0e:aa:89:08:22:8d:aa: f3:18:f3:c1:83:1f:f7:df:00:74:15:4c:ae:1f:4b:5f: 4e:a5:16:be:13:8a:3c:52:54:86:01:43:89:5c:f4:1c: 6d:ee:79:45:4e:33:e4:5a:38:eb:2b:90:ec:b9:e0:40: e4:34:70:97:ff:30:70:ea:ea:da:d6:d8:97:0d:c0:18: 73:36:1b:00:39:b6:c2:5a:01:40:d7:dc:c8:86:23:83: 77:05:e1:45:61:f9:12:55:53:b0:4f:fe:40:2a:92:00: 46:01:be:08:54:89:96:91:84:cb:4f:45:bb:3b:c2:d8: 67:cc:a7:c3:06:86:2a:3e:d7:f7:91:bf:84:f0:58:ba: 78:7d:3a:36:6e:7b:4f:36:b8:6d:fd:df:ca:8b:a3:df: 4d:03:d8:df:da:c6:ee:9c:93:b5:43:8f:b5:b8:f2:eb: 6a:67:d8:75:79:ca:86:51:5c:13:52:75:47:1a:a7:e4: 57:cd:cc:d9:f6:67:ca:70:98:ba:49:f1:a3:cb:2a:82: ac:6b:23:84:34:dc:74:ce:ea:1a:2d:40:af:f2:3e:d4 Fingerprint (SHA-256): BA:9A:36:C2:94:16:86:86:46:67:DC:32:E4:F3:F6:6D:77:6B:A8:56:75:10:A8:99:17:13:CD:E5:3D:C3:ED:11 Fingerprint (SHA1): B9:4E:BD:17:EE:FB:D4:84:D6:E7:0E:82:61:65:1A:31:77:C4:71:F9 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #5832: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5833: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5834: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5835: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5836: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5837: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5838: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #5839: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #5840: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #5841: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #5842: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #5843: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #5844: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #5845: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #5846: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #5847: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.114412.1.1 /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=paypal.com,OU=PayPal Production,O="PayPal, Inc.",L =San Jose,ST=California,C=US" Certificate 2 Subject: "CN=DigiCert SHA2 High Assurance Server CA,OU=www.digi cert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #5848: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #5849: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5850: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132872 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5851: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5852: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5853: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5854: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108132873 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5855: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5856: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5857: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5858: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108132874 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5859: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5860: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5861: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5862: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 108132875 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5863: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5864: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5865: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5866: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108132876 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5867: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5868: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #5869: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5870: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 108132877 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5871: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5872: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #5873: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5874: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 108132878 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5875: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5876: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #5877: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5878: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 108132879 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5879: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5880: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #5881: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5882: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 108132880 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5883: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5884: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5885: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132872 (0x671fa08) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 19:23:33 2016 Not After : Fri Jan 08 19:23:33 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 82:2e:2d:84:4f:da:d9:2b:79:80:ee:76:63:ef:81:3e: e3:c5:b5:35:6d:d6:f1:c7:23:23:7c:02:7f:32:ff:1d: 04:a3:b2:59:cd:91:13:72:fa:26:0c:c8:55:77:ea:f9: 85:75:38:7e:20:0f:e1:6a:14:35:d9:ae:5a:b6:00:6a: ac:0b:38:2e:a1:46:76:6c:e7:dc:88:0c:25:18:a2:23: 97:66:fb:2b:2a:b0:25:1b:d7:c5:d9:1e:ad:ef:7d:22: e4:41:29:22:17:8f:7a:4b:14:81:21:02:48:f5:ff:25: cd:9c:9a:a9:be:8b:8c:b7:30:c0:19:94:57:59:a5:68: 4a:0f:5a:53:26:9b:31:43:5d:67:7c:c6:e5:5d:4f:63: 2e:10:fb:b8:f1:4c:5f:ff:6c:e3:d6:62:f3:52:e1:cd: 4a:51:1f:00:11:89:8d:57:51:d2:de:bb:20:0e:8c:84: e0:bc:51:a0:d1:80:b4:f4:fc:b8:e3:83:9f:6e:de:11: 99:5c:47:76:9d:28:90:61:20:f9:37:78:4e:43:7d:d6: ae:42:0f:a7:56:14:17:45:0a:16:2a:d8:c7:e1:ce:1b: 75:e2:61:2c:04:12:48:65:3c:ec:cd:0f:42:84:c2:41: a7:e7:24:c7:bf:05:3c:78:6a:eb:cb:f3:01:fb:00:e0 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1d:00:ad:fb:42:eb:46:c5:b5:16:46:5d:d0: 67:39:0a:29:51:ab:06:95:f9:66:fd:55:ed:d6:72:80: cf:02:1c:15:9a:f0:7b:71:d4:12:70:6e:47:25:67:a5: eb:13:f6:8e:de:e2:b4:ab:41:bd:44:22:89:39:4b Fingerprint (SHA-256): DE:87:FC:4D:CA:09:88:1A:C8:10:7A:FD:2D:93:AB:C8:33:5D:54:32:3A:D3:DA:9C:AF:49:FB:3F:76:A5:B7:5E Fingerprint (SHA1): 62:77:88:0D:40:9C:C6:EE:D4:4D:60:37:F8:5B:3D:78:E0:1D:2C:CF Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5886: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132872 (0x671fa08) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 19:23:33 2016 Not After : Fri Jan 08 19:23:33 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 82:2e:2d:84:4f:da:d9:2b:79:80:ee:76:63:ef:81:3e: e3:c5:b5:35:6d:d6:f1:c7:23:23:7c:02:7f:32:ff:1d: 04:a3:b2:59:cd:91:13:72:fa:26:0c:c8:55:77:ea:f9: 85:75:38:7e:20:0f:e1:6a:14:35:d9:ae:5a:b6:00:6a: ac:0b:38:2e:a1:46:76:6c:e7:dc:88:0c:25:18:a2:23: 97:66:fb:2b:2a:b0:25:1b:d7:c5:d9:1e:ad:ef:7d:22: e4:41:29:22:17:8f:7a:4b:14:81:21:02:48:f5:ff:25: cd:9c:9a:a9:be:8b:8c:b7:30:c0:19:94:57:59:a5:68: 4a:0f:5a:53:26:9b:31:43:5d:67:7c:c6:e5:5d:4f:63: 2e:10:fb:b8:f1:4c:5f:ff:6c:e3:d6:62:f3:52:e1:cd: 4a:51:1f:00:11:89:8d:57:51:d2:de:bb:20:0e:8c:84: e0:bc:51:a0:d1:80:b4:f4:fc:b8:e3:83:9f:6e:de:11: 99:5c:47:76:9d:28:90:61:20:f9:37:78:4e:43:7d:d6: ae:42:0f:a7:56:14:17:45:0a:16:2a:d8:c7:e1:ce:1b: 75:e2:61:2c:04:12:48:65:3c:ec:cd:0f:42:84:c2:41: a7:e7:24:c7:bf:05:3c:78:6a:eb:cb:f3:01:fb:00:e0 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1d:00:ad:fb:42:eb:46:c5:b5:16:46:5d:d0: 67:39:0a:29:51:ab:06:95:f9:66:fd:55:ed:d6:72:80: cf:02:1c:15:9a:f0:7b:71:d4:12:70:6e:47:25:67:a5: eb:13:f6:8e:de:e2:b4:ab:41:bd:44:22:89:39:4b Fingerprint (SHA-256): DE:87:FC:4D:CA:09:88:1A:C8:10:7A:FD:2D:93:AB:C8:33:5D:54:32:3A:D3:DA:9C:AF:49:FB:3F:76:A5:B7:5E Fingerprint (SHA1): 62:77:88:0D:40:9C:C6:EE:D4:4D:60:37:F8:5B:3D:78:E0:1D:2C:CF Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5887: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132872 (0x671fa08) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 19:23:33 2016 Not After : Fri Jan 08 19:23:33 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 82:2e:2d:84:4f:da:d9:2b:79:80:ee:76:63:ef:81:3e: e3:c5:b5:35:6d:d6:f1:c7:23:23:7c:02:7f:32:ff:1d: 04:a3:b2:59:cd:91:13:72:fa:26:0c:c8:55:77:ea:f9: 85:75:38:7e:20:0f:e1:6a:14:35:d9:ae:5a:b6:00:6a: ac:0b:38:2e:a1:46:76:6c:e7:dc:88:0c:25:18:a2:23: 97:66:fb:2b:2a:b0:25:1b:d7:c5:d9:1e:ad:ef:7d:22: e4:41:29:22:17:8f:7a:4b:14:81:21:02:48:f5:ff:25: cd:9c:9a:a9:be:8b:8c:b7:30:c0:19:94:57:59:a5:68: 4a:0f:5a:53:26:9b:31:43:5d:67:7c:c6:e5:5d:4f:63: 2e:10:fb:b8:f1:4c:5f:ff:6c:e3:d6:62:f3:52:e1:cd: 4a:51:1f:00:11:89:8d:57:51:d2:de:bb:20:0e:8c:84: e0:bc:51:a0:d1:80:b4:f4:fc:b8:e3:83:9f:6e:de:11: 99:5c:47:76:9d:28:90:61:20:f9:37:78:4e:43:7d:d6: ae:42:0f:a7:56:14:17:45:0a:16:2a:d8:c7:e1:ce:1b: 75:e2:61:2c:04:12:48:65:3c:ec:cd:0f:42:84:c2:41: a7:e7:24:c7:bf:05:3c:78:6a:eb:cb:f3:01:fb:00:e0 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1d:00:ad:fb:42:eb:46:c5:b5:16:46:5d:d0: 67:39:0a:29:51:ab:06:95:f9:66:fd:55:ed:d6:72:80: cf:02:1c:15:9a:f0:7b:71:d4:12:70:6e:47:25:67:a5: eb:13:f6:8e:de:e2:b4:ab:41:bd:44:22:89:39:4b Fingerprint (SHA-256): DE:87:FC:4D:CA:09:88:1A:C8:10:7A:FD:2D:93:AB:C8:33:5D:54:32:3A:D3:DA:9C:AF:49:FB:3F:76:A5:B7:5E Fingerprint (SHA1): 62:77:88:0D:40:9C:C6:EE:D4:4D:60:37:F8:5B:3D:78:E0:1D:2C:CF Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #5888: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132872 (0x671fa08) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 19:23:33 2016 Not After : Fri Jan 08 19:23:33 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 82:2e:2d:84:4f:da:d9:2b:79:80:ee:76:63:ef:81:3e: e3:c5:b5:35:6d:d6:f1:c7:23:23:7c:02:7f:32:ff:1d: 04:a3:b2:59:cd:91:13:72:fa:26:0c:c8:55:77:ea:f9: 85:75:38:7e:20:0f:e1:6a:14:35:d9:ae:5a:b6:00:6a: ac:0b:38:2e:a1:46:76:6c:e7:dc:88:0c:25:18:a2:23: 97:66:fb:2b:2a:b0:25:1b:d7:c5:d9:1e:ad:ef:7d:22: e4:41:29:22:17:8f:7a:4b:14:81:21:02:48:f5:ff:25: cd:9c:9a:a9:be:8b:8c:b7:30:c0:19:94:57:59:a5:68: 4a:0f:5a:53:26:9b:31:43:5d:67:7c:c6:e5:5d:4f:63: 2e:10:fb:b8:f1:4c:5f:ff:6c:e3:d6:62:f3:52:e1:cd: 4a:51:1f:00:11:89:8d:57:51:d2:de:bb:20:0e:8c:84: e0:bc:51:a0:d1:80:b4:f4:fc:b8:e3:83:9f:6e:de:11: 99:5c:47:76:9d:28:90:61:20:f9:37:78:4e:43:7d:d6: ae:42:0f:a7:56:14:17:45:0a:16:2a:d8:c7:e1:ce:1b: 75:e2:61:2c:04:12:48:65:3c:ec:cd:0f:42:84:c2:41: a7:e7:24:c7:bf:05:3c:78:6a:eb:cb:f3:01:fb:00:e0 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1d:00:ad:fb:42:eb:46:c5:b5:16:46:5d:d0: 67:39:0a:29:51:ab:06:95:f9:66:fd:55:ed:d6:72:80: cf:02:1c:15:9a:f0:7b:71:d4:12:70:6e:47:25:67:a5: eb:13:f6:8e:de:e2:b4:ab:41:bd:44:22:89:39:4b Fingerprint (SHA-256): DE:87:FC:4D:CA:09:88:1A:C8:10:7A:FD:2D:93:AB:C8:33:5D:54:32:3A:D3:DA:9C:AF:49:FB:3F:76:A5:B7:5E Fingerprint (SHA1): 62:77:88:0D:40:9C:C6:EE:D4:4D:60:37:F8:5B:3D:78:E0:1D:2C:CF Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #5889: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5890: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 10 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5891: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5892: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #5893: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5894: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5895: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5896: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5897: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5898: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5899: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5900: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #5901: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5902: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5903: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5904: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #5905: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5906: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5907: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5908: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5909: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5910: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5911: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5912: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #5913: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5914: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5915: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5916: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160108192548Z nextupdate=20170108192548Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Jan 08 19:25:48 2016 Next Update: Sun Jan 08 19:25:48 2017 CRL Extensions: chains.sh: #5917: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108192548Z nextupdate=20170108192548Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 19:25:48 2016 Next Update: Sun Jan 08 19:25:48 2017 CRL Extensions: chains.sh: #5918: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108192549Z nextupdate=20170108192549Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 19:25:49 2016 Next Update: Sun Jan 08 19:25:49 2017 CRL Extensions: chains.sh: #5919: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160108192550Z nextupdate=20170108192550Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Jan 08 19:25:50 2016 Next Update: Sun Jan 08 19:25:50 2017 CRL Extensions: chains.sh: #5920: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108192551Z addcert 14 20160108192551Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 19:25:51 2016 Next Update: Sun Jan 08 19:25:49 2017 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Fri Jan 08 19:25:51 2016 CRL Extensions: chains.sh: #5921: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108192552Z addcert 15 20160108192552Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 19:25:52 2016 Next Update: Sun Jan 08 19:25:48 2017 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Fri Jan 08 19:25:52 2016 CRL Extensions: chains.sh: #5922: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5923: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5924: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #5925: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #5926: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #5927: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #5928: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #5929: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #5930: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #5931: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 19:24:47 2016 Not After : Fri Jan 08 19:24:47 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:a6:60:16:fd:c5:c9:47:be:8e:87:a0:2e:d6:0b:e3: c0:b4:c2:2e:d7:f5:ec:96:cc:87:50:4e:4a:a4:01:da: 74:c5:d7:9b:fa:d6:ba:c8:01:ff:bb:84:8a:a2:46:20: 70:f8:ac:9e:d3:44:d4:a3:2e:12:eb:83:f2:b0:af:5f: ae:f6:7a:f8:c2:10:da:b7:65:b2:71:70:df:c3:b8:c6: 8a:bf:a8:96:eb:cc:e7:e1:24:ea:39:34:a7:83:8a:43: 4c:3f:27:e6:dd:a7:a6:9b:c9:c3:fa:b4:05:f8:30:77: 91:63:2c:eb:de:f2:08:46:94:82:f1:48:97:3d:d9:7d: 1a:60:57:61:b6:6d:bb:02:8c:05:3e:69:a3:82:b1:a8: 99:91:f5:a0:32:47:e7:f4:2d:d0:b4:c7:ce:73:66:33: ab:34:d1:0e:a0:2e:c2:ab:a1:85:27:64:ea:3f:82:00: 4a:d9:64:05:3c:66:b2:d9:21:94:83:72:b4:b1:a7:a7: 81:bc:44:c9:b9:47:af:4a:21:0d:40:02:2e:d3:b8:f6: 6d:e0:f2:75:30:69:cd:35:dc:33:43:12:c9:a4:70:16: 9c:c1:20:32:f8:2e:4b:5a:0c:f6:28:5b:aa:90:f0:0a: 72:11:40:d9:8c:18:98:4c:24:a4:53:8d:f9:2a:fa:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:e6:fd:cf:71:d7:97:8f:fd:5f:1a:fe:d5:bf:ef:83: 60:04:a8:78:b8:34:55:cc:ae:a6:83:d0:6c:12:cf:7d: 21:30:8d:6c:6b:c6:b6:d9:4c:db:ba:59:fd:61:9d:52: dd:9a:88:f2:6f:7d:3c:8f:94:82:56:c5:df:4f:d1:67: 6a:9d:48:30:a9:9b:df:58:94:0e:c5:0d:34:f5:82:01: 78:18:74:b8:b0:33:66:4b:a8:e9:bc:b7:60:a6:a0:98: 0f:60:6c:b9:3c:c0:7f:fc:8a:45:b6:9a:7f:89:9c:78: 5a:20:39:ec:d5:6f:78:80:d9:de:1d:af:b0:0f:e6:fb: 8d:d1:ab:3b:d1:1b:f6:0f:7f:41:4a:3b:f5:66:79:8c: ca:18:fb:a1:42:4b:07:08:12:51:d0:3d:b2:68:14:0c: ee:4c:dd:dc:aa:94:4e:e0:5f:c4:54:b6:8a:70:73:db: 56:68:3e:73:95:25:e8:6d:ab:2e:cc:c5:9a:d5:69:b3: f7:89:46:a9:bd:1b:ff:00:87:00:5a:66:dc:6b:bc:b4: c0:4c:e5:9e:0c:6d:d6:f0:a0:8f:7a:14:ac:db:ad:d9: c2:a1:25:14:9a:7d:56:a0:c9:9c:14:69:fc:8c:a4:ba: 62:c7:bf:13:cb:4f:bb:e1:a5:12:58:8b:2b:ec:45:08 Fingerprint (SHA-256): F0:4F:2F:60:F0:0E:35:F4:96:4E:DD:2E:5F:8F:0A:F5:36:1B:E5:2F:5E:AC:43:C1:25:00:BC:7F:E3:43:3E:1F Fingerprint (SHA1): 2D:3C:1C:EA:12:86:83:5D:09:4A:4B:66:F7:E0:80:F5:2A:C7:FB:C5 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #5932: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #5933: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 19:24:47 2016 Not After : Fri Jan 08 19:24:47 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:a6:60:16:fd:c5:c9:47:be:8e:87:a0:2e:d6:0b:e3: c0:b4:c2:2e:d7:f5:ec:96:cc:87:50:4e:4a:a4:01:da: 74:c5:d7:9b:fa:d6:ba:c8:01:ff:bb:84:8a:a2:46:20: 70:f8:ac:9e:d3:44:d4:a3:2e:12:eb:83:f2:b0:af:5f: ae:f6:7a:f8:c2:10:da:b7:65:b2:71:70:df:c3:b8:c6: 8a:bf:a8:96:eb:cc:e7:e1:24:ea:39:34:a7:83:8a:43: 4c:3f:27:e6:dd:a7:a6:9b:c9:c3:fa:b4:05:f8:30:77: 91:63:2c:eb:de:f2:08:46:94:82:f1:48:97:3d:d9:7d: 1a:60:57:61:b6:6d:bb:02:8c:05:3e:69:a3:82:b1:a8: 99:91:f5:a0:32:47:e7:f4:2d:d0:b4:c7:ce:73:66:33: ab:34:d1:0e:a0:2e:c2:ab:a1:85:27:64:ea:3f:82:00: 4a:d9:64:05:3c:66:b2:d9:21:94:83:72:b4:b1:a7:a7: 81:bc:44:c9:b9:47:af:4a:21:0d:40:02:2e:d3:b8:f6: 6d:e0:f2:75:30:69:cd:35:dc:33:43:12:c9:a4:70:16: 9c:c1:20:32:f8:2e:4b:5a:0c:f6:28:5b:aa:90:f0:0a: 72:11:40:d9:8c:18:98:4c:24:a4:53:8d:f9:2a:fa:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:e6:fd:cf:71:d7:97:8f:fd:5f:1a:fe:d5:bf:ef:83: 60:04:a8:78:b8:34:55:cc:ae:a6:83:d0:6c:12:cf:7d: 21:30:8d:6c:6b:c6:b6:d9:4c:db:ba:59:fd:61:9d:52: dd:9a:88:f2:6f:7d:3c:8f:94:82:56:c5:df:4f:d1:67: 6a:9d:48:30:a9:9b:df:58:94:0e:c5:0d:34:f5:82:01: 78:18:74:b8:b0:33:66:4b:a8:e9:bc:b7:60:a6:a0:98: 0f:60:6c:b9:3c:c0:7f:fc:8a:45:b6:9a:7f:89:9c:78: 5a:20:39:ec:d5:6f:78:80:d9:de:1d:af:b0:0f:e6:fb: 8d:d1:ab:3b:d1:1b:f6:0f:7f:41:4a:3b:f5:66:79:8c: ca:18:fb:a1:42:4b:07:08:12:51:d0:3d:b2:68:14:0c: ee:4c:dd:dc:aa:94:4e:e0:5f:c4:54:b6:8a:70:73:db: 56:68:3e:73:95:25:e8:6d:ab:2e:cc:c5:9a:d5:69:b3: f7:89:46:a9:bd:1b:ff:00:87:00:5a:66:dc:6b:bc:b4: c0:4c:e5:9e:0c:6d:d6:f0:a0:8f:7a:14:ac:db:ad:d9: c2:a1:25:14:9a:7d:56:a0:c9:9c:14:69:fc:8c:a4:ba: 62:c7:bf:13:cb:4f:bb:e1:a5:12:58:8b:2b:ec:45:08 Fingerprint (SHA-256): F0:4F:2F:60:F0:0E:35:F4:96:4E:DD:2E:5F:8F:0A:F5:36:1B:E5:2F:5E:AC:43:C1:25:00:BC:7F:E3:43:3E:1F Fingerprint (SHA1): 2D:3C:1C:EA:12:86:83:5D:09:4A:4B:66:F7:E0:80:F5:2A:C7:FB:C5 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #5934: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #5935: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5936: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132881 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5937: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5938: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #5939: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5940: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 108132882 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5941: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5942: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5943: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9169/localhost-27064-CA0-108132653.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5944: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0Root-108132627.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5945: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5946: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #5947: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0-108132653.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5948: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 108132883 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5949: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5950: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5951: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9169/localhost-27064-CA0-108132653.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5952: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0Root-108132628.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5953: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5954: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #5955: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5956: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 108132884 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5957: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5958: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5959: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0-108132653.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5960: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0Root-108132629.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5961: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5962: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5963: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0-108132653.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5964: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0Root-108132630.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5965: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5966: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160108192743Z nextupdate=20170108192743Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Jan 08 19:27:43 2016 Next Update: Sun Jan 08 19:27:43 2017 CRL Extensions: chains.sh: #5967: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108192743Z nextupdate=20170108192743Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 19:27:43 2016 Next Update: Sun Jan 08 19:27:43 2017 CRL Extensions: chains.sh: #5968: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108192744Z nextupdate=20170108192744Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 19:27:44 2016 Next Update: Sun Jan 08 19:27:44 2017 CRL Extensions: chains.sh: #5969: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160108192745Z nextupdate=20170108192745Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Jan 08 19:27:45 2016 Next Update: Sun Jan 08 19:27:45 2017 CRL Extensions: chains.sh: #5970: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108192746Z addcert 20 20160108192746Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 19:27:46 2016 Next Update: Sun Jan 08 19:27:43 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Jan 08 19:27:46 2016 CRL Extensions: chains.sh: #5971: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108192747Z addcert 40 20160108192747Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 19:27:47 2016 Next Update: Sun Jan 08 19:27:43 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Jan 08 19:27:46 2016 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Fri Jan 08 19:27:47 2016 CRL Extensions: chains.sh: #5972: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5973: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5974: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #5975: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132881 (0x671fa11) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 19:26:11 2016 Not After : Fri Jan 08 19:26:11 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:9e:b6:84:f3:36:ba:b9:23:81:44:49:4f:f4:4c:06: ab:7e:5a:8a:61:cd:f3:8f:e2:52:0f:10:81:ea:71:4b: c8:01:fe:72:9e:45:38:20:c3:e9:ab:8f:b0:aa:7c:a1: 5a:b7:8e:ea:71:fe:22:76:b2:45:fd:40:96:6b:62:65: a8:1e:c2:d5:cf:f6:8a:99:1f:35:25:9f:f6:70:45:7f: eb:e2:4c:5f:5b:a1:79:35:82:29:09:dd:41:44:e0:d5: 33:53:ec:90:4e:46:90:8b:6c:e9:40:53:34:72:e1:43: f5:bc:74:35:c7:33:c7:f7:02:de:3f:a7:07:a8:ec:33: 06:e0:77:7d:3e:2a:41:c4:0d:9b:b1:f5:d9:6b:45:75: b6:43:04:a3:39:1f:2a:95:0c:3f:10:36:26:f2:d9:03: 32:51:ba:31:18:cb:11:42:a1:81:b9:f9:6a:4a:e3:f9: e8:6c:b0:27:b9:d6:a6:d4:f2:d8:86:28:7f:33:8b:6b: 1f:da:8b:73:bd:f7:62:9a:78:10:98:ec:49:9c:47:ff: 8d:32:63:58:c7:08:62:6b:46:9b:7e:28:6b:ec:98:6e: 14:d9:a2:d3:30:66:80:56:bd:2b:f0:c0:87:5f:c8:c7: 8b:65:0b:02:18:ab:a3:e9:6d:56:09:06:d6:ce:7e:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 07:8f:cb:0a:90:cc:e1:0a:35:52:96:1e:cf:90:47:fc: 7a:94:7f:88:75:23:90:61:11:e9:d5:e0:1c:ea:2c:ca: 37:43:5e:a9:05:f6:05:29:0c:32:29:1e:34:a1:88:25: 29:b7:3d:94:60:17:02:0e:e3:c8:d1:bb:bb:41:25:80: 9b:45:f6:e1:33:c3:b1:47:b9:2d:0e:cb:58:a1:b3:5d: 75:11:e5:bc:c6:f8:c6:1b:1a:9d:62:2a:c8:9e:4f:7d: ca:34:2b:47:3d:bb:56:0e:5f:37:e6:f7:2e:54:85:cc: 09:da:e7:3b:4e:0e:5b:64:5b:cf:79:07:30:39:67:bc: fc:4f:17:10:a2:82:df:db:d5:b7:38:e1:0f:a4:bb:b3: 75:15:55:43:e1:f1:98:25:b1:e6:02:11:06:3e:53:ed: 74:c8:39:76:96:b4:85:81:0b:95:66:8e:4f:f0:8e:45: 89:49:70:cf:fd:8d:fe:fd:d1:72:95:3f:fc:be:20:5f: ec:6e:39:ee:6b:a1:d3:e7:70:32:d6:10:c5:bd:2f:0d: 23:2d:19:af:af:22:1c:1a:52:66:67:b0:21:3f:49:60: 30:d9:da:f6:68:f9:70:ea:3e:57:60:e2:c0:01:dc:af: ec:e3:8d:d6:70:40:80:28:73:64:4f:aa:0a:2a:b4:1d Fingerprint (SHA-256): 8E:3B:3F:2F:04:44:D7:21:13:72:A0:4C:9E:97:3C:09:1E:48:0C:4D:50:AD:17:CD:19:55:CE:2B:23:2A:3C:20 Fingerprint (SHA1): 32:8A:61:84:D3:DD:D1:E0:97:93:94:89:2D:07:8D:81:1B:CA:4C:92 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #5976: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #5977: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132881 (0x671fa11) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 19:26:11 2016 Not After : Fri Jan 08 19:26:11 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:9e:b6:84:f3:36:ba:b9:23:81:44:49:4f:f4:4c:06: ab:7e:5a:8a:61:cd:f3:8f:e2:52:0f:10:81:ea:71:4b: c8:01:fe:72:9e:45:38:20:c3:e9:ab:8f:b0:aa:7c:a1: 5a:b7:8e:ea:71:fe:22:76:b2:45:fd:40:96:6b:62:65: a8:1e:c2:d5:cf:f6:8a:99:1f:35:25:9f:f6:70:45:7f: eb:e2:4c:5f:5b:a1:79:35:82:29:09:dd:41:44:e0:d5: 33:53:ec:90:4e:46:90:8b:6c:e9:40:53:34:72:e1:43: f5:bc:74:35:c7:33:c7:f7:02:de:3f:a7:07:a8:ec:33: 06:e0:77:7d:3e:2a:41:c4:0d:9b:b1:f5:d9:6b:45:75: b6:43:04:a3:39:1f:2a:95:0c:3f:10:36:26:f2:d9:03: 32:51:ba:31:18:cb:11:42:a1:81:b9:f9:6a:4a:e3:f9: e8:6c:b0:27:b9:d6:a6:d4:f2:d8:86:28:7f:33:8b:6b: 1f:da:8b:73:bd:f7:62:9a:78:10:98:ec:49:9c:47:ff: 8d:32:63:58:c7:08:62:6b:46:9b:7e:28:6b:ec:98:6e: 14:d9:a2:d3:30:66:80:56:bd:2b:f0:c0:87:5f:c8:c7: 8b:65:0b:02:18:ab:a3:e9:6d:56:09:06:d6:ce:7e:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 07:8f:cb:0a:90:cc:e1:0a:35:52:96:1e:cf:90:47:fc: 7a:94:7f:88:75:23:90:61:11:e9:d5:e0:1c:ea:2c:ca: 37:43:5e:a9:05:f6:05:29:0c:32:29:1e:34:a1:88:25: 29:b7:3d:94:60:17:02:0e:e3:c8:d1:bb:bb:41:25:80: 9b:45:f6:e1:33:c3:b1:47:b9:2d:0e:cb:58:a1:b3:5d: 75:11:e5:bc:c6:f8:c6:1b:1a:9d:62:2a:c8:9e:4f:7d: ca:34:2b:47:3d:bb:56:0e:5f:37:e6:f7:2e:54:85:cc: 09:da:e7:3b:4e:0e:5b:64:5b:cf:79:07:30:39:67:bc: fc:4f:17:10:a2:82:df:db:d5:b7:38:e1:0f:a4:bb:b3: 75:15:55:43:e1:f1:98:25:b1:e6:02:11:06:3e:53:ed: 74:c8:39:76:96:b4:85:81:0b:95:66:8e:4f:f0:8e:45: 89:49:70:cf:fd:8d:fe:fd:d1:72:95:3f:fc:be:20:5f: ec:6e:39:ee:6b:a1:d3:e7:70:32:d6:10:c5:bd:2f:0d: 23:2d:19:af:af:22:1c:1a:52:66:67:b0:21:3f:49:60: 30:d9:da:f6:68:f9:70:ea:3e:57:60:e2:c0:01:dc:af: ec:e3:8d:d6:70:40:80:28:73:64:4f:aa:0a:2a:b4:1d Fingerprint (SHA-256): 8E:3B:3F:2F:04:44:D7:21:13:72:A0:4C:9E:97:3C:09:1E:48:0C:4D:50:AD:17:CD:19:55:CE:2B:23:2A:3C:20 Fingerprint (SHA1): 32:8A:61:84:D3:DD:D1:E0:97:93:94:89:2D:07:8D:81:1B:CA:4C:92 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #5978: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #5979: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #5980: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132885 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5981: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #5982: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5983: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5984: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108132886 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5985: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5986: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5987: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5988: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108132887 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5989: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5990: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5991: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5992: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 108132888 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5993: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5994: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #5995: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -m 108132889 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5996: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #5997: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #5998: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5999: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 108132890 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #6000: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6001: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #6002: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6003: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 108132891 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #6004: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6005: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #6006: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #6007: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #6008: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132885 (0x671fa15) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 19:27:58 2016 Not After : Fri Jan 08 19:27:58 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:76:2a:2d:29:33:eb:0c:48:b7:a4:dd:d2:51:49:a0: 1c:30:9d:79:b3:86:8f:4b:b9:8b:f5:3e:eb:be:28:3b: 09:3c:b6:51:ef:51:f1:f7:2b:69:c1:1f:e7:2b:87:33: d7:a2:19:09:8b:19:67:a4:59:83:e7:7d:73:8e:b9:b3: ce:73:fa:5e:3e:af:44:f1:37:77:15:7a:0f:1f:6b:58: 94:fc:50:5f:44:28:88:04:65:fa:f2:a7:5e:3f:72:3f: c3:a7:11:f2:91:60:03:30:f6:12:1d:61:35:6e:24:60: d0:b3:26:3a:03:94:d2:77:e4:51:5e:01:28:75:8f:db: 3b:ff:f7:b9:f5:21:86:6d:b1:75:c7:dc:a5:c8:09:bb: 43:05:61:09:86:09:b7:a7:34:95:f7:1e:b3:44:1b:71: f7:7c:6a:d5:82:04:e9:9d:6d:b8:45:5c:26:92:6f:6c: e3:cd:36:12:01:7a:fb:7f:b8:bc:ae:04:7d:df:97:3e: cf:5f:15:4b:da:39:bb:9c:4f:34:56:a5:c9:8f:20:1f: ce:c1:c3:91:73:d7:49:b3:4d:76:10:9b:54:b3:00:25: ef:46:a4:9e:79:15:60:81:a3:92:df:2f:2e:41:5e:f9: 12:fb:a2:ea:be:9f:ff:44:62:be:a0:2a:93:af:84:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cf:f3:a9:a5:95:9f:ed:25:ec:4d:f0:8e:36:56:ba:98: 78:40:62:31:a5:dc:33:3d:93:52:16:5f:62:61:b6:0c: de:ff:e2:94:43:aa:52:6f:7c:4e:a3:8b:4a:3b:be:af: aa:60:f9:f8:e5:ae:70:38:41:07:6c:94:05:2c:3c:4f: 5b:3b:03:bb:cd:ee:a6:d1:b2:b9:4d:e4:1f:b6:96:5c: 23:7f:8c:15:d2:02:1e:d1:08:73:7a:b2:a1:c8:b7:d2: a0:6c:c4:98:92:36:43:ed:f4:ad:e6:84:44:a1:6e:2c: ce:f4:2b:f3:64:34:d5:7c:24:37:cc:8d:98:ca:09:2a: cc:b4:ed:eb:40:7a:d4:4b:0a:d0:53:ea:2f:56:3e:5a: 58:93:10:92:01:73:5e:fe:63:51:84:49:ad:6c:a8:44: 19:55:70:6e:11:e1:0c:01:6e:2f:c9:87:17:b1:36:38: 7c:6d:48:db:49:0c:48:b0:67:fc:da:65:49:90:bd:3f: ff:ef:1f:29:17:12:19:9a:e0:49:8f:ce:77:0e:e3:4f: c5:1b:da:40:2e:fc:7e:94:03:a0:f7:a1:ca:c4:e5:b0: e7:70:c8:ab:31:b0:17:a8:81:53:04:dd:0c:d9:37:2a: 54:98:77:f1:a8:9c:ac:9c:ef:82:13:65:32:59:52:fe Fingerprint (SHA-256): 17:92:39:7E:9D:45:C3:BE:64:7D:0D:7B:F2:68:72:E4:1F:22:C7:25:CB:2C:EC:87:31:61:AB:29:EA:40:E2:C1 Fingerprint (SHA1): 65:9A:A7:D8:7D:7C:AC:68:2B:8C:DF:3E:C2:59:E6:C5:A7:97:01:F3 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6009: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132887 (0x671fa17) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 19:28:12 2016 Not After : Fri Jan 08 19:28:12 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:20:45:7d:bf:8c:d9:c1:cd:62:a8:f5:1f:3d:51:ab: ad:02:2d:25:75:6d:6d:f3:0f:b6:54:0c:1a:55:2c:08: 76:96:fd:5c:24:a7:69:cc:b5:71:9d:07:e3:79:78:0d: 8b:a1:48:9c:65:ce:7e:00:40:c6:ce:66:b4:c6:26:94: 7c:db:3c:e8:5d:fe:f1:3d:d4:b1:ea:72:38:e9:2e:61: 83:92:60:49:8f:5a:ff:59:bc:bd:56:78:b8:0f:05:cd: 3f:05:99:b6:86:c3:2a:08:8b:9d:5d:48:61:35:a7:71: 35:b7:32:58:75:0b:54:90:d3:31:0d:a2:2f:36:96:80: 09:11:19:02:60:13:35:c6:7b:08:ea:e7:d2:27:8d:f1: 8e:87:2d:fb:73:40:e0:9c:d0:19:72:cc:03:6e:04:75: bd:e5:c8:66:ad:e4:30:92:03:17:7a:38:30:e5:c5:56: 8d:89:6e:3f:b8:20:08:32:c7:1d:66:84:d0:50:7d:e7: fb:de:6c:70:34:38:57:51:c5:57:55:29:7b:93:88:a2: 26:02:aa:8e:57:ec:7e:0b:7f:d6:ff:20:f4:bf:2e:cc: b4:b8:b0:ce:0b:42:7f:28:d9:8d:e4:26:2d:41:e7:e1: 61:e2:f4:0d:3d:2f:f2:70:bd:bc:9a:15:e6:52:94:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:1b:39:d6:e8:a1:9d:12:e9:ba:17:4e:aa:de:b5:5a: 49:79:3e:7a:93:41:b0:89:37:70:8b:1c:5f:7a:33:a2: 15:2c:d6:32:65:7c:ab:ae:59:6f:e6:c3:24:34:cf:da: d8:8d:09:ef:f1:37:13:8f:39:f9:79:33:6d:52:0d:d6: b7:20:96:2d:9b:eb:8f:f4:ee:d9:80:56:39:cf:05:c2: d9:d1:2f:08:a8:e2:00:08:d6:3a:8a:90:ce:a8:0b:7a: f7:3f:b7:a0:e2:e3:58:2d:a6:e2:6d:fb:58:6f:49:d8: ba:7a:79:6f:5c:c7:10:09:d0:f0:98:b4:99:90:87:29: f3:8e:19:b7:b9:f9:dc:02:f1:bb:18:38:b3:91:18:6a: 7f:54:53:51:b3:40:1a:5a:15:86:1a:ea:fe:20:ab:ee: 48:ba:53:10:1d:22:09:14:09:cd:11:a6:c0:a3:cc:b6: 97:05:c7:97:e8:74:b0:f7:a4:ca:10:4f:75:a5:95:df: 56:09:6b:e3:9c:66:1c:54:4b:06:c1:09:38:66:61:b0: d1:bd:a1:96:c9:53:3a:09:43:dc:08:78:a3:55:7b:1d: eb:c4:6f:fb:c6:b2:18:60:9a:09:e0:ec:f4:f2:6b:95: 07:f2:60:df:e9:44:cc:15:cd:8b:bf:e8:8d:0f:fc:57 Fingerprint (SHA-256): 3D:4A:01:C3:71:00:88:E1:4E:88:72:08:81:DF:51:D2:0C:62:53:80:EF:63:5F:40:20:8A:CE:7E:90:A8:15:E7 Fingerprint (SHA1): 9A:31:85:F0:F8:E6:84:5D:90:AF:F8:3B:DC:FE:91:5D:7A:A5:40:4F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #6010: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132885 (0x671fa15) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 19:27:58 2016 Not After : Fri Jan 08 19:27:58 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:76:2a:2d:29:33:eb:0c:48:b7:a4:dd:d2:51:49:a0: 1c:30:9d:79:b3:86:8f:4b:b9:8b:f5:3e:eb:be:28:3b: 09:3c:b6:51:ef:51:f1:f7:2b:69:c1:1f:e7:2b:87:33: d7:a2:19:09:8b:19:67:a4:59:83:e7:7d:73:8e:b9:b3: ce:73:fa:5e:3e:af:44:f1:37:77:15:7a:0f:1f:6b:58: 94:fc:50:5f:44:28:88:04:65:fa:f2:a7:5e:3f:72:3f: c3:a7:11:f2:91:60:03:30:f6:12:1d:61:35:6e:24:60: d0:b3:26:3a:03:94:d2:77:e4:51:5e:01:28:75:8f:db: 3b:ff:f7:b9:f5:21:86:6d:b1:75:c7:dc:a5:c8:09:bb: 43:05:61:09:86:09:b7:a7:34:95:f7:1e:b3:44:1b:71: f7:7c:6a:d5:82:04:e9:9d:6d:b8:45:5c:26:92:6f:6c: e3:cd:36:12:01:7a:fb:7f:b8:bc:ae:04:7d:df:97:3e: cf:5f:15:4b:da:39:bb:9c:4f:34:56:a5:c9:8f:20:1f: ce:c1:c3:91:73:d7:49:b3:4d:76:10:9b:54:b3:00:25: ef:46:a4:9e:79:15:60:81:a3:92:df:2f:2e:41:5e:f9: 12:fb:a2:ea:be:9f:ff:44:62:be:a0:2a:93:af:84:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cf:f3:a9:a5:95:9f:ed:25:ec:4d:f0:8e:36:56:ba:98: 78:40:62:31:a5:dc:33:3d:93:52:16:5f:62:61:b6:0c: de:ff:e2:94:43:aa:52:6f:7c:4e:a3:8b:4a:3b:be:af: aa:60:f9:f8:e5:ae:70:38:41:07:6c:94:05:2c:3c:4f: 5b:3b:03:bb:cd:ee:a6:d1:b2:b9:4d:e4:1f:b6:96:5c: 23:7f:8c:15:d2:02:1e:d1:08:73:7a:b2:a1:c8:b7:d2: a0:6c:c4:98:92:36:43:ed:f4:ad:e6:84:44:a1:6e:2c: ce:f4:2b:f3:64:34:d5:7c:24:37:cc:8d:98:ca:09:2a: cc:b4:ed:eb:40:7a:d4:4b:0a:d0:53:ea:2f:56:3e:5a: 58:93:10:92:01:73:5e:fe:63:51:84:49:ad:6c:a8:44: 19:55:70:6e:11:e1:0c:01:6e:2f:c9:87:17:b1:36:38: 7c:6d:48:db:49:0c:48:b0:67:fc:da:65:49:90:bd:3f: ff:ef:1f:29:17:12:19:9a:e0:49:8f:ce:77:0e:e3:4f: c5:1b:da:40:2e:fc:7e:94:03:a0:f7:a1:ca:c4:e5:b0: e7:70:c8:ab:31:b0:17:a8:81:53:04:dd:0c:d9:37:2a: 54:98:77:f1:a8:9c:ac:9c:ef:82:13:65:32:59:52:fe Fingerprint (SHA-256): 17:92:39:7E:9D:45:C3:BE:64:7D:0D:7B:F2:68:72:E4:1F:22:C7:25:CB:2C:EC:87:31:61:AB:29:EA:40:E2:C1 Fingerprint (SHA1): 65:9A:A7:D8:7D:7C:AC:68:2B:8C:DF:3E:C2:59:E6:C5:A7:97:01:F3 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6011: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #6012: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132885 (0x671fa15) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 19:27:58 2016 Not After : Fri Jan 08 19:27:58 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:76:2a:2d:29:33:eb:0c:48:b7:a4:dd:d2:51:49:a0: 1c:30:9d:79:b3:86:8f:4b:b9:8b:f5:3e:eb:be:28:3b: 09:3c:b6:51:ef:51:f1:f7:2b:69:c1:1f:e7:2b:87:33: d7:a2:19:09:8b:19:67:a4:59:83:e7:7d:73:8e:b9:b3: ce:73:fa:5e:3e:af:44:f1:37:77:15:7a:0f:1f:6b:58: 94:fc:50:5f:44:28:88:04:65:fa:f2:a7:5e:3f:72:3f: c3:a7:11:f2:91:60:03:30:f6:12:1d:61:35:6e:24:60: d0:b3:26:3a:03:94:d2:77:e4:51:5e:01:28:75:8f:db: 3b:ff:f7:b9:f5:21:86:6d:b1:75:c7:dc:a5:c8:09:bb: 43:05:61:09:86:09:b7:a7:34:95:f7:1e:b3:44:1b:71: f7:7c:6a:d5:82:04:e9:9d:6d:b8:45:5c:26:92:6f:6c: e3:cd:36:12:01:7a:fb:7f:b8:bc:ae:04:7d:df:97:3e: cf:5f:15:4b:da:39:bb:9c:4f:34:56:a5:c9:8f:20:1f: ce:c1:c3:91:73:d7:49:b3:4d:76:10:9b:54:b3:00:25: ef:46:a4:9e:79:15:60:81:a3:92:df:2f:2e:41:5e:f9: 12:fb:a2:ea:be:9f:ff:44:62:be:a0:2a:93:af:84:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cf:f3:a9:a5:95:9f:ed:25:ec:4d:f0:8e:36:56:ba:98: 78:40:62:31:a5:dc:33:3d:93:52:16:5f:62:61:b6:0c: de:ff:e2:94:43:aa:52:6f:7c:4e:a3:8b:4a:3b:be:af: aa:60:f9:f8:e5:ae:70:38:41:07:6c:94:05:2c:3c:4f: 5b:3b:03:bb:cd:ee:a6:d1:b2:b9:4d:e4:1f:b6:96:5c: 23:7f:8c:15:d2:02:1e:d1:08:73:7a:b2:a1:c8:b7:d2: a0:6c:c4:98:92:36:43:ed:f4:ad:e6:84:44:a1:6e:2c: ce:f4:2b:f3:64:34:d5:7c:24:37:cc:8d:98:ca:09:2a: cc:b4:ed:eb:40:7a:d4:4b:0a:d0:53:ea:2f:56:3e:5a: 58:93:10:92:01:73:5e:fe:63:51:84:49:ad:6c:a8:44: 19:55:70:6e:11:e1:0c:01:6e:2f:c9:87:17:b1:36:38: 7c:6d:48:db:49:0c:48:b0:67:fc:da:65:49:90:bd:3f: ff:ef:1f:29:17:12:19:9a:e0:49:8f:ce:77:0e:e3:4f: c5:1b:da:40:2e:fc:7e:94:03:a0:f7:a1:ca:c4:e5:b0: e7:70:c8:ab:31:b0:17:a8:81:53:04:dd:0c:d9:37:2a: 54:98:77:f1:a8:9c:ac:9c:ef:82:13:65:32:59:52:fe Fingerprint (SHA-256): 17:92:39:7E:9D:45:C3:BE:64:7D:0D:7B:F2:68:72:E4:1F:22:C7:25:CB:2C:EC:87:31:61:AB:29:EA:40:E2:C1 Fingerprint (SHA1): 65:9A:A7:D8:7D:7C:AC:68:2B:8C:DF:3E:C2:59:E6:C5:A7:97:01:F3 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6013: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132887 (0x671fa17) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 19:28:12 2016 Not After : Fri Jan 08 19:28:12 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:20:45:7d:bf:8c:d9:c1:cd:62:a8:f5:1f:3d:51:ab: ad:02:2d:25:75:6d:6d:f3:0f:b6:54:0c:1a:55:2c:08: 76:96:fd:5c:24:a7:69:cc:b5:71:9d:07:e3:79:78:0d: 8b:a1:48:9c:65:ce:7e:00:40:c6:ce:66:b4:c6:26:94: 7c:db:3c:e8:5d:fe:f1:3d:d4:b1:ea:72:38:e9:2e:61: 83:92:60:49:8f:5a:ff:59:bc:bd:56:78:b8:0f:05:cd: 3f:05:99:b6:86:c3:2a:08:8b:9d:5d:48:61:35:a7:71: 35:b7:32:58:75:0b:54:90:d3:31:0d:a2:2f:36:96:80: 09:11:19:02:60:13:35:c6:7b:08:ea:e7:d2:27:8d:f1: 8e:87:2d:fb:73:40:e0:9c:d0:19:72:cc:03:6e:04:75: bd:e5:c8:66:ad:e4:30:92:03:17:7a:38:30:e5:c5:56: 8d:89:6e:3f:b8:20:08:32:c7:1d:66:84:d0:50:7d:e7: fb:de:6c:70:34:38:57:51:c5:57:55:29:7b:93:88:a2: 26:02:aa:8e:57:ec:7e:0b:7f:d6:ff:20:f4:bf:2e:cc: b4:b8:b0:ce:0b:42:7f:28:d9:8d:e4:26:2d:41:e7:e1: 61:e2:f4:0d:3d:2f:f2:70:bd:bc:9a:15:e6:52:94:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:1b:39:d6:e8:a1:9d:12:e9:ba:17:4e:aa:de:b5:5a: 49:79:3e:7a:93:41:b0:89:37:70:8b:1c:5f:7a:33:a2: 15:2c:d6:32:65:7c:ab:ae:59:6f:e6:c3:24:34:cf:da: d8:8d:09:ef:f1:37:13:8f:39:f9:79:33:6d:52:0d:d6: b7:20:96:2d:9b:eb:8f:f4:ee:d9:80:56:39:cf:05:c2: d9:d1:2f:08:a8:e2:00:08:d6:3a:8a:90:ce:a8:0b:7a: f7:3f:b7:a0:e2:e3:58:2d:a6:e2:6d:fb:58:6f:49:d8: ba:7a:79:6f:5c:c7:10:09:d0:f0:98:b4:99:90:87:29: f3:8e:19:b7:b9:f9:dc:02:f1:bb:18:38:b3:91:18:6a: 7f:54:53:51:b3:40:1a:5a:15:86:1a:ea:fe:20:ab:ee: 48:ba:53:10:1d:22:09:14:09:cd:11:a6:c0:a3:cc:b6: 97:05:c7:97:e8:74:b0:f7:a4:ca:10:4f:75:a5:95:df: 56:09:6b:e3:9c:66:1c:54:4b:06:c1:09:38:66:61:b0: d1:bd:a1:96:c9:53:3a:09:43:dc:08:78:a3:55:7b:1d: eb:c4:6f:fb:c6:b2:18:60:9a:09:e0:ec:f4:f2:6b:95: 07:f2:60:df:e9:44:cc:15:cd:8b:bf:e8:8d:0f:fc:57 Fingerprint (SHA-256): 3D:4A:01:C3:71:00:88:E1:4E:88:72:08:81:DF:51:D2:0C:62:53:80:EF:63:5F:40:20:8A:CE:7E:90:A8:15:E7 Fingerprint (SHA1): 9A:31:85:F0:F8:E6:84:5D:90:AF:F8:3B:DC:FE:91:5D:7A:A5:40:4F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #6014: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #6015: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #6016: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #6017: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132885 (0x671fa15) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 19:27:58 2016 Not After : Fri Jan 08 19:27:58 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:76:2a:2d:29:33:eb:0c:48:b7:a4:dd:d2:51:49:a0: 1c:30:9d:79:b3:86:8f:4b:b9:8b:f5:3e:eb:be:28:3b: 09:3c:b6:51:ef:51:f1:f7:2b:69:c1:1f:e7:2b:87:33: d7:a2:19:09:8b:19:67:a4:59:83:e7:7d:73:8e:b9:b3: ce:73:fa:5e:3e:af:44:f1:37:77:15:7a:0f:1f:6b:58: 94:fc:50:5f:44:28:88:04:65:fa:f2:a7:5e:3f:72:3f: c3:a7:11:f2:91:60:03:30:f6:12:1d:61:35:6e:24:60: d0:b3:26:3a:03:94:d2:77:e4:51:5e:01:28:75:8f:db: 3b:ff:f7:b9:f5:21:86:6d:b1:75:c7:dc:a5:c8:09:bb: 43:05:61:09:86:09:b7:a7:34:95:f7:1e:b3:44:1b:71: f7:7c:6a:d5:82:04:e9:9d:6d:b8:45:5c:26:92:6f:6c: e3:cd:36:12:01:7a:fb:7f:b8:bc:ae:04:7d:df:97:3e: cf:5f:15:4b:da:39:bb:9c:4f:34:56:a5:c9:8f:20:1f: ce:c1:c3:91:73:d7:49:b3:4d:76:10:9b:54:b3:00:25: ef:46:a4:9e:79:15:60:81:a3:92:df:2f:2e:41:5e:f9: 12:fb:a2:ea:be:9f:ff:44:62:be:a0:2a:93:af:84:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cf:f3:a9:a5:95:9f:ed:25:ec:4d:f0:8e:36:56:ba:98: 78:40:62:31:a5:dc:33:3d:93:52:16:5f:62:61:b6:0c: de:ff:e2:94:43:aa:52:6f:7c:4e:a3:8b:4a:3b:be:af: aa:60:f9:f8:e5:ae:70:38:41:07:6c:94:05:2c:3c:4f: 5b:3b:03:bb:cd:ee:a6:d1:b2:b9:4d:e4:1f:b6:96:5c: 23:7f:8c:15:d2:02:1e:d1:08:73:7a:b2:a1:c8:b7:d2: a0:6c:c4:98:92:36:43:ed:f4:ad:e6:84:44:a1:6e:2c: ce:f4:2b:f3:64:34:d5:7c:24:37:cc:8d:98:ca:09:2a: cc:b4:ed:eb:40:7a:d4:4b:0a:d0:53:ea:2f:56:3e:5a: 58:93:10:92:01:73:5e:fe:63:51:84:49:ad:6c:a8:44: 19:55:70:6e:11:e1:0c:01:6e:2f:c9:87:17:b1:36:38: 7c:6d:48:db:49:0c:48:b0:67:fc:da:65:49:90:bd:3f: ff:ef:1f:29:17:12:19:9a:e0:49:8f:ce:77:0e:e3:4f: c5:1b:da:40:2e:fc:7e:94:03:a0:f7:a1:ca:c4:e5:b0: e7:70:c8:ab:31:b0:17:a8:81:53:04:dd:0c:d9:37:2a: 54:98:77:f1:a8:9c:ac:9c:ef:82:13:65:32:59:52:fe Fingerprint (SHA-256): 17:92:39:7E:9D:45:C3:BE:64:7D:0D:7B:F2:68:72:E4:1F:22:C7:25:CB:2C:EC:87:31:61:AB:29:EA:40:E2:C1 Fingerprint (SHA1): 65:9A:A7:D8:7D:7C:AC:68:2B:8C:DF:3E:C2:59:E6:C5:A7:97:01:F3 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6018: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132889 (0x671fa19) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Jan 08 19:28:32 2016 Not After : Fri Jan 08 19:28:32 2066 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f2:eb:52:eb:ea:fe:98:a1:a4:26:85:bb:32:6e:7c: 49:ec:08:58:e7:f8:f3:a0:a5:3c:52:44:3d:ae:ac:d3: c9:bd:b1:1d:3f:98:ac:a1:2c:45:9a:75:65:b1:e3:77: e3:63:31:ab:f6:20:31:9e:00:37:e1:57:dc:57:7f:fd: f7:d9:76:1c:5c:8e:f5:f7:80:3d:31:9b:bb:42:b0:32: 26:e1:b4:6f:b1:3a:2b:26:b8:10:65:df:6e:9d:41:ec: 87:6d:75:fe:37:b6:60:50:0b:2e:03:84:70:1b:f2:20: fd:36:d7:15:b3:5c:41:7d:f1:4a:a7:87:37:85:82:9b: 73:f0:6d:2b:31:1e:13:72:da:06:70:93:fb:90:9a:b1: 23:c0:f2:68:9c:4c:2b:ef:4a:d4:61:44:23:c4:f0:0c: 0a:6b:9d:63:df:14:45:66:81:f0:7e:a4:d1:fe:10:dd: 5b:85:2d:4b:e6:80:d4:21:3e:97:e0:37:f2:e2:07:56: 9f:8a:75:d6:e8:c4:b5:fd:87:3a:55:55:c6:a5:97:12: ea:08:8c:25:6a:38:bd:78:8c:fe:0e:18:76:92:4c:a3: 51:81:55:f6:f3:3b:31:62:ca:81:6a:2c:7b:4d:ff:15: 50:e5:1c:dd:58:20:13:5c:19:93:64:15:5d:7c:70:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 64:2a:35:ff:08:95:29:4c:94:3d:17:a6:11:8f:e1:d9: e8:33:e1:02:f8:05:74:bc:67:89:b1:b3:94:62:69:08: b7:45:81:7a:ff:9c:06:49:1c:b6:e6:f8:5e:d3:40:5b: 5b:bc:67:b8:26:6b:94:18:ab:54:35:61:1c:e7:d4:85: c1:60:45:f2:9e:30:71:15:9d:d1:5c:80:dc:57:41:19: e3:72:d2:92:13:ba:65:05:71:35:ff:50:d2:79:91:95: 67:82:a0:c4:d0:b2:ba:1f:38:4a:61:62:31:f2:5c:97: 59:a3:31:76:22:01:7c:0c:4f:5c:8c:94:b2:ea:38:22: 61:05:0e:d5:b6:ab:6c:b4:72:6c:45:0f:95:b1:71:57: 84:54:ee:a5:c9:25:94:f6:09:64:33:17:a0:e5:54:c6: d2:3a:b4:53:ea:dc:a0:f6:60:82:df:89:b3:87:82:d9: e0:8a:7a:cc:57:59:d0:4a:f5:77:a8:98:84:52:3d:e5: cf:9c:27:68:cf:c2:91:ad:1f:ca:95:a2:10:f3:5a:f3: 68:af:b6:09:a3:0e:ad:a6:c3:43:46:e4:a0:e3:1d:25: 80:e6:89:55:fe:47:a6:f9:f3:d3:82:c5:5a:81:a9:88: a4:1d:40:41:6b:15:98:41:e6:e0:53:2f:fc:92:a7:5f Fingerprint (SHA-256): 23:A4:F3:8F:B0:DF:50:9C:7F:F2:C1:EA:F7:5C:42:F4:08:52:D2:8F:4E:7F:CF:96:87:E0:C3:34:1C:06:35:12 Fingerprint (SHA1): 42:50:6E:E7:D4:41:A3:65:45:7E:4A:BE:30:AF:68:EB:B4:3F:F9:BB Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #6019: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132885 (0x671fa15) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 19:27:58 2016 Not After : Fri Jan 08 19:27:58 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:76:2a:2d:29:33:eb:0c:48:b7:a4:dd:d2:51:49:a0: 1c:30:9d:79:b3:86:8f:4b:b9:8b:f5:3e:eb:be:28:3b: 09:3c:b6:51:ef:51:f1:f7:2b:69:c1:1f:e7:2b:87:33: d7:a2:19:09:8b:19:67:a4:59:83:e7:7d:73:8e:b9:b3: ce:73:fa:5e:3e:af:44:f1:37:77:15:7a:0f:1f:6b:58: 94:fc:50:5f:44:28:88:04:65:fa:f2:a7:5e:3f:72:3f: c3:a7:11:f2:91:60:03:30:f6:12:1d:61:35:6e:24:60: d0:b3:26:3a:03:94:d2:77:e4:51:5e:01:28:75:8f:db: 3b:ff:f7:b9:f5:21:86:6d:b1:75:c7:dc:a5:c8:09:bb: 43:05:61:09:86:09:b7:a7:34:95:f7:1e:b3:44:1b:71: f7:7c:6a:d5:82:04:e9:9d:6d:b8:45:5c:26:92:6f:6c: e3:cd:36:12:01:7a:fb:7f:b8:bc:ae:04:7d:df:97:3e: cf:5f:15:4b:da:39:bb:9c:4f:34:56:a5:c9:8f:20:1f: ce:c1:c3:91:73:d7:49:b3:4d:76:10:9b:54:b3:00:25: ef:46:a4:9e:79:15:60:81:a3:92:df:2f:2e:41:5e:f9: 12:fb:a2:ea:be:9f:ff:44:62:be:a0:2a:93:af:84:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cf:f3:a9:a5:95:9f:ed:25:ec:4d:f0:8e:36:56:ba:98: 78:40:62:31:a5:dc:33:3d:93:52:16:5f:62:61:b6:0c: de:ff:e2:94:43:aa:52:6f:7c:4e:a3:8b:4a:3b:be:af: aa:60:f9:f8:e5:ae:70:38:41:07:6c:94:05:2c:3c:4f: 5b:3b:03:bb:cd:ee:a6:d1:b2:b9:4d:e4:1f:b6:96:5c: 23:7f:8c:15:d2:02:1e:d1:08:73:7a:b2:a1:c8:b7:d2: a0:6c:c4:98:92:36:43:ed:f4:ad:e6:84:44:a1:6e:2c: ce:f4:2b:f3:64:34:d5:7c:24:37:cc:8d:98:ca:09:2a: cc:b4:ed:eb:40:7a:d4:4b:0a:d0:53:ea:2f:56:3e:5a: 58:93:10:92:01:73:5e:fe:63:51:84:49:ad:6c:a8:44: 19:55:70:6e:11:e1:0c:01:6e:2f:c9:87:17:b1:36:38: 7c:6d:48:db:49:0c:48:b0:67:fc:da:65:49:90:bd:3f: ff:ef:1f:29:17:12:19:9a:e0:49:8f:ce:77:0e:e3:4f: c5:1b:da:40:2e:fc:7e:94:03:a0:f7:a1:ca:c4:e5:b0: e7:70:c8:ab:31:b0:17:a8:81:53:04:dd:0c:d9:37:2a: 54:98:77:f1:a8:9c:ac:9c:ef:82:13:65:32:59:52:fe Fingerprint (SHA-256): 17:92:39:7E:9D:45:C3:BE:64:7D:0D:7B:F2:68:72:E4:1F:22:C7:25:CB:2C:EC:87:31:61:AB:29:EA:40:E2:C1 Fingerprint (SHA1): 65:9A:A7:D8:7D:7C:AC:68:2B:8C:DF:3E:C2:59:E6:C5:A7:97:01:F3 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6020: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #6021: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #6022: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #6023: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #6024: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #6025: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108132890 (0x671fa1a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Jan 08 19:28:45 2016 Not After : Fri Jan 08 19:28:45 2021 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:ca:7f:7f:ce:58:2d:47:96:90:39:a0:f5:94:de:fe: bf:da:21:8b:b0:6a:c3:d8:84:b9:2d:2a:08:3f:e4:b6: b4:92:7e:07:aa:5e:e2:8c:fc:43:96:48:45:55:fb:a5: 4a:4a:c5:1a:52:21:00:9b:24:c6:fa:fc:b8:27:ae:c3: 53:a8:8e:68:c9:f8:21:a4:91:a5:47:90:e1:b3:bf:64: bf:be:11:de:d0:d3:15:04:3f:3b:68:5c:f4:40:47:15: 97:b5:29:94:c4:9e:73:ad:58:66:e6:70:28:61:33:b2: c2:52:bc:5b:cf:9a:7d:95:1f:90:a5:32:d6:c0:90:26: 31:1f:62:d4:23:53:8e:8f:39:b8:b6:5b:37:e0:cb:b0: 26:57:67:10:db:b4:19:c2:4d:8f:15:7b:c6:34:7b:e9: e7:ff:06:a6:33:41:69:59:c9:7f:eb:6f:3c:69:6a:76: d5:31:41:ed:c6:36:f5:65:1b:ae:ad:a6:ac:02:9a:fa: d8:ea:25:c1:d2:63:c1:e8:53:bf:9b:42:75:16:a7:d2: b8:52:3a:1c:2c:dd:ba:93:19:01:26:10:29:c0:19:38: fe:31:05:30:4d:b1:0f:0f:2c:1f:ec:7a:21:d5:a9:c9: dc:6c:c6:8f:bd:ef:7b:ce:4d:a1:a8:c3:69:3b:be:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 34:59:04:6a:34:b6:89:b5:b5:a7:11:29:94:d1:f5:61: ba:b7:59:c8:ee:af:25:0e:f1:9f:a4:c3:50:07:fb:e7: e4:57:b5:9f:2a:9e:94:58:35:0a:1b:25:3c:aa:f9:5b: b5:af:18:d5:d1:63:c3:1d:0f:a8:2b:fa:bc:02:fb:83: 5c:84:e6:de:95:48:27:89:e2:6d:34:3b:9a:68:a1:19: 50:de:e3:ac:19:48:c1:0e:b0:3b:83:b2:4c:d0:8c:a7: 72:23:b6:f8:15:87:e4:66:fd:90:27:87:6a:b2:94:51: 9e:c5:06:06:ba:47:07:a5:51:52:cc:b1:a8:26:46:28: 20:da:ad:61:2b:a1:c4:b9:5e:c4:2d:d6:46:3a:b6:2a: 2f:76:a0:c9:1c:c5:ee:6d:fc:9a:88:aa:11:34:d7:a6: 58:43:d7:c9:64:b0:03:7f:6d:33:83:e6:87:10:1c:f7: f8:22:5a:8e:cc:9c:36:a5:cf:eb:84:b1:d0:a1:72:5c: 56:e7:ba:71:11:a0:d6:e1:75:03:10:03:ec:b5:b5:02: 9d:e5:9f:47:ea:34:e2:63:a1:f9:4b:ea:27:e9:09:72: 83:8c:5b:ce:6a:fc:ba:08:b7:54:01:0a:14:37:62:bc: d3:76:81:d1:0d:b8:ff:98:b4:16:e5:a9:fb:0c:9f:d2 Fingerprint (SHA-256): F8:F3:64:82:48:B7:64:6C:1B:5A:C4:F2:A7:CA:F9:5E:1A:02:FD:4C:DE:D8:C0:A9:DA:E2:CA:B1:35:EF:B6:18 Fingerprint (SHA1): A5:5E:09:5C:4B:23:5C:26:F8:00:B7:BB:07:4E:5A:5F:87:82:10:F4 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #6026: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #6027: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #6028: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #6029: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #6030: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #6031: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #6032: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #6033: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #6034: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #6035: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #6036: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #6037: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #6038: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #6039: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #6040: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #6041: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #6042: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #6043: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #6044: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #6045: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #6046: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #6047: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #6048: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #6049: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED trying to kill httpserv with PID 10691 at Fri Jan 8 14:29:26 EST 2016 kill -USR1 10691 httpserv: normal termination httpserv -b -p 9169 2>/dev/null; httpserv with PID 10691 killed at Fri Jan 8 14:29:26 EST 2016 TIMESTAMP chains END: Fri Jan 8 14:29:26 EST 2016 chains.sh: Testing with PKIX =============================== Running tests for libpkix TIMESTAMP libpkix BEGIN: Fri Jan 8 14:29:27 EST 2016 TIMESTAMP libpkix END: Fri Jan 8 14:29:27 EST 2016 Running tests for cert TIMESTAMP cert BEGIN: Fri Jan 8 14:29:27 EST 2016 cert.sh: Certutil and Crlutil Tests with ECC =============================== cert.sh: #6050: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -f ../tests.pw cert.sh: #6051: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #6052: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6053: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -o root.cert cert.sh: #6054: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA -f ../tests.pw cert.sh: #6055: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #6056: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6057: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #6058: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6059: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #6060: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6061: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #6062: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA -f ../tests.pw cert.sh: #6063: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #6064: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6065: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #6066: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6067: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #6068: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6069: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #6070: Exporting Root Cert - PASSED cert.sh: Creating an DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6071: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #6072: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6073: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #6074: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6075: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #6076: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6077: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #6078: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6079: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #6080: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6081: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #6082: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6083: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #6084: Exporting DSA Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6085: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #6086: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6087: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #6088: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6089: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #6090: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6091: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #6092: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6093: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #6094: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6095: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #6096: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6097: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #6098: Exporting EC Root Cert - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw cert.sh: #6099: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #6100: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6101: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #6102: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6103: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA/clientCA.ca.cert cert.sh: #6104: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6105: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #6106: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6107: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA/clientCA-dsa.ca.cert cert.sh: #6108: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6109: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #6110: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6111: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6112: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #6113: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6114: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA/clientCA-ec.ca.cert cert.sh: #6115: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6116: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #6117: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6118: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA/serverCA-ec.ca.cert cert.sh: #6119: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA/serverCA-dsa.ca.cert cert.sh: #6120: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6121: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6122: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #6123: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6124: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6125: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6126: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6127: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw cert.sh: #6128: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #6129: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6130: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #6131: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6132: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #6133: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6134: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #6135: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6136: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA/serverCA-dsa.ca.cert cert.sh: #6137: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6138: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #6139: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6140: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6141: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #6142: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6143: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA/serverCA-ec.ca.cert cert.sh: #6144: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6145: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #6146: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6147: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6148: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA/clientCA-dsa.ca.cert cert.sh: #6149: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6150: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA/clientCA.ca.cert cert.sh: #6151: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6152: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6153: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6154: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6155: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/clientCA/clientCA-ec.ca.cert cert.sh: #6156: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw cert.sh: #6157: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #6158: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA.ca.cert cert.sh: #6159: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #6160: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA-ec.ca.cert cert.sh: #6161: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6162: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #6163: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6164: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6165: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #6166: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6167: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6168: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #6169: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6170: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6171: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #6172: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6173: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6174: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #6175: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6176: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #6177: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #6178: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA.ca.cert cert.sh: #6179: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #6180: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA-ec.ca.cert cert.sh: #6181: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6182: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #6183: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6184: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6185: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #6186: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6187: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6188: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #6189: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6190: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6191: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #6192: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6193: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6194: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #6195: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6196: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6197: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #6198: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6199: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6200: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #6201: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6202: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6203: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #6204: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6205: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6206: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #6207: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6208: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6209: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #6210: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6211: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #6212: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #6213: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #6214: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating ssl_gtest DB dir cert.sh: Creating database for ssl_gtests cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ssl_gtests --empty-password cert.sh: #6215: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Creating server certs for ssl_gtests cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -S -z ../tests_noise -g 2048 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ssl_gtests -n server -s CN=server -t C,C,C -x -m 1 -w -2 -v 120 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? cert.sh: #6216: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -S -z ../tests_noise -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/ssl_gtests -n ecdsa -s CN=ecdsa -t C,C,C -x -m 1 -w -2 -v 120 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? cert.sh: #6217: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw cert.sh: #6218: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #6219: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA.ca.cert cert.sh: #6220: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #6221: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #6222: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6223: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #6224: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6225: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6226: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #6227: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6228: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6229: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #6230: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6231: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6232: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #6233: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6234: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6235: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #6236: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6237: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw cert.sh: #6238: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #6239: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA.ca.cert cert.sh: #6240: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #6241: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #6242: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6243: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #6244: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6245: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6246: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #6247: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6248: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6249: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #6250: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6251: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6252: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #6253: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6254: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6255: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #6256: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6257: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dave -f ../tests.pw cert.sh: #6258: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #6259: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA.ca.cert cert.sh: #6260: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #6261: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #6262: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6263: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #6264: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6265: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6266: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #6267: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6268: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6269: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #6270: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6271: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6272: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #6273: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6274: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6275: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #6276: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6277: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eve -f ../tests.pw cert.sh: #6278: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #6279: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA.ca.cert cert.sh: #6280: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #6281: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #6282: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6283: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #6284: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6285: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6286: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #6287: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6288: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6289: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #6290: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6291: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6292: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #6293: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6294: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6295: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #6296: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6297: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #6298: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #6299: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #6300: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #6301: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #6302: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #6303: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #6304: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #6305: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw cert.sh: #6306: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #6307: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #6308: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6309: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw cert.sh: #6310: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #6311: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #6312: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6313: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #6314: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6315: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6316: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #6317: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6318: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6319: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #6320: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6321: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw cert.sh: #6322: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #6323: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #6324: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #6325: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #6326: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6327: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #6328: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6329: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6330: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #6331: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6332: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6333: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #6334: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6335: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6336: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #6337: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6338: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6339: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #6340: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6341: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:f5:bd Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 19:34:47 2016 Not After : Fri Apr 08 19:34:47 2016 Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:33:e0:fa:74:f0:45:77:17:15:bd:5a:39:db:51:b1: 1e:e0:7a:f5:f1:a8:88:d8:6c:b0:af:08:92:8e:e1:02: 3b:66:66:22:48:6d:ea:1d:48:20:0c:c5:55:87:6d:a9: 13:1f:42:00:fb:43:72:5e:ca:ab:f9:2c:ab:04:0c:bf: 2e:64:3a:25:2b:33:88:91:80:52:3c:04:0c:0e:33:8b: cb:70:fa:2f:19:3a:52:93:9f:2f:20:2c:0f:52:47:d5: 28:04:38:9b:76:32:79:31:df:e8:9a:44:a5:48:99:db: 7f:fe:b2:03:68:7b:68:f7:84:32:d8:29:a1:96:50:ee: b9:1a:ca:29:e8:61:96:44:a7:e0:8b:9d:a4:1c:40:da: b5:16:ef:e9:59:d5:8a:fb:2d:36:57:95:c4:90:03:2b: dd:22:67:e1:f7:19:8d:1e:1e:cd:56:bf:bb:06:9c:1e: e9:48:f6:14:da:8f:37:75:fb:61:88:1b:75:fc:76:69: 3e:0f:aa:ab:02:7d:53:8f:4e:36:11:7a:d5:0d:cf:48: f3:a5:e3:a3:82:80:d4:58:8a:40:31:4e:be:0f:4f:9b: 10:bf:3e:af:75:50:1e:09:b5:50:0b:24:6e:c0:38:cb: ae:46:43:82:07:8c:35:0c:2d:05:7d:72:e4:6b:1f:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:2f:b5:fd:cc:23:fe:21:41:2b:7f:7b:e8:26:c4:62: 86:b1:cc:ef:cb:d9:92:7e:55:4f:02:9b:2d:99:a3:95: 3f:ca:a0:4c:57:48:3e:e2:50:ba:3b:bf:a0:55:dd:37: 99:85:e1:6c:ea:3d:0d:d4:d5:05:ac:b4:39:f5:d9:94: f4:dd:e6:e5:eb:2b:9d:05:95:39:6a:6b:91:d3:21:95: 5c:7d:b4:86:a8:f0:e1:57:dc:0f:37:22:df:c2:91:6d: e3:42:0f:d8:e1:31:ac:68:14:3c:c5:a7:4f:d5:e4:e4: 2d:16:bb:25:74:60:76:8b:0a:00:7e:5c:1a:f8:a6:53: 57:fb:40:0e:f5:35:2e:17:49:2c:42:5a:af:a1:e2:c6: 43:88:ce:23:bf:d5:d2:96:bc:93:3e:32:83:62:82:84: 4a:c2:eb:01:e5:6e:8c:fc:16:23:90:cd:06:cd:63:5e: a9:88:cf:c8:8a:9b:d7:b6:15:b3:e2:c9:dd:25:4e:37: 36:ba:dc:37:4e:ad:18:1f:37:cd:a5:b1:f3:5d:67:5c: 8b:b7:06:4f:4a:63:e3:11:14:3e:84:09:b5:9c:7c:1e: f8:b8:e7:26:8e:62:de:d9:f8:aa:26:53:02:6a:3d:31: 3f:2d:1a:de:43:6b:d4:d1:4b:70:bb:e2:98:bf:cd:dc Fingerprint (SHA-256): 31:7B:78:7E:23:25:3B:48:80:4D:19:D2:93:AB:8F:DE:7E:CC:83:ED:1F:EF:CC:BF:1F:0B:23:A2:58:AC:4B:62 Fingerprint (SHA1): 64:11:85:41:24:BF:4A:F7:3D:04:D1:F4:89:7F:A5:9D:47:27:AA:F2 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #6342: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:f5:c5 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 19:34:53 2016 Not After : Fri Apr 08 19:34:53 2016 Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:a4:8c:67:73:47:16:ef:b7:5c:43:34:9b:e9:63:10: 46:63:6f:79:c0:75:84:b4:2a:fa:17:96:5c:16:e8:29: ce:4e:8a:09:16:48:b7:9d:c8:fb:ca:15:71:53:38:80: 3a:8e:1e:ba:94:b4:09:01:b4:23:5d:15:14:5f:4c:ad: 68:aa:1d:9b:03:99:b7:46:2f:1e:0f:8f:9c:34:86:a0: eb:31:a0:6f:7b:e5:98:8f:76:51:bc:64:06:7a:14:be: b1:f6:65:a7:c5:7d:50:03:ac:01:2e:15:5b:29:4f:94: 85:67:28:b2:26:8f:6d:f6:e9:d0:bf:02:f5:e2:a0:98: 08:29:6c:e7:43:df:78:77:f1:45:5f:03:d4:b0:52:8d: 3e:f3:15:8c:7c:43:b3:04:ac:cc:c1:c6:af:74:aa:a5: 48:39:59:5a:b5:c8:c7:74:a8:c0:74:ef:75:fc:68:d8: 07:58:8a:e6:40:1d:83:80:ea:7e:05:bd:1c:65:e0:dc: 6a:e6:88:72:b6:65:c5:3b:c0:09:4c:db:3b:6d:e3:bb: 18:15:78:f5:c4:aa:f8:49:da:04:d0:3b:f8:70:fa:c8: 10:1b:93:69:18:c9:0b:ba:b6:94:db:ea:39:ba:80:2d: 9f:d5:c3:62:89:79:2e:45:6a:30:61:a8:44:f1:cc:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:9e:32:f2:09:20:c9:a7:07:3a:4c:b7:fb:95:66:b5: d5:22:6d:77:a8:aa:0e:fb:38:c8:24:e9:7b:27:a9:87: f7:e8:ba:ff:cb:dc:6d:33:ea:4c:14:4b:09:72:b9:97: 40:6b:ba:d8:63:10:4f:cd:26:dc:5c:49:de:26:ac:9b: e3:33:72:e1:e5:36:28:fb:8a:b3:4c:be:c4:fc:1e:48: 78:25:ea:06:ab:35:4d:a6:98:a7:d6:db:af:68:38:e3: 21:2d:f9:1e:1b:74:b7:35:bc:7a:be:e5:55:12:2a:52: 96:70:d0:f2:c2:ca:0e:dd:15:31:2f:6b:9e:09:9f:25: 58:4e:69:08:33:3d:a3:f7:40:fe:f6:bf:39:8a:54:9d: aa:be:be:56:17:c9:d7:27:cc:e8:4f:9c:f4:01:0d:97: 68:eb:1d:89:e6:9b:c8:67:98:17:28:cc:02:09:5d:30: 31:66:55:da:53:bd:c1:30:e1:76:1b:53:10:cc:f5:68: 2d:23:21:bb:6c:4c:70:5a:70:db:61:db:e8:12:42:08: c4:27:c3:ff:cd:fd:35:c2:72:7f:c9:dd:81:fb:11:b2: a6:a4:d7:90:8a:d9:ed:33:74:5f:a6:a0:0c:6b:ef:47: 10:7b:66:24:31:e8:ef:bf:b3:8b:e5:25:78:2b:48:b8 Fingerprint (SHA-256): 35:9A:A0:1D:9D:A1:64:96:A7:C9:99:F8:37:FA:4A:AC:87:1B:0B:54:BD:0F:3D:28:40:67:CB:A3:8A:E6:F3:97 Fingerprint (SHA1): 5F:A6:71:AA:21:D4:F2:53:08:9B:FA:26:02:1D:60:1A:00:46:E7:D2 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #6343: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:f5:d1 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 19:35:11 2016 Not After : Fri Apr 08 19:35:11 2016 Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:cb:b3:b4:99:be:d8:cb:e0:99:64:8a:fe:b6:86:d3: 7f:b3:93:7c:ef:a8:24:29:c2:aa:bb:c2:51:26:26:80: b1:2f:db:a2:8d:b5:bb:42:c4:fa:67:7c:5b:5c:7a:ee: 02:20:86:ed:90:05:53:06:ae:a6:cb:4c:aa:d2:f5:e3: 00:02:b9:50:7d:23:bd:61:f3:13:b1:d2:62:7a:4a:1a: cf:1d:f4:2a:f2:d2:e6:af:ce:b1:e1:14:0e:b3:7f:05: 23:18:7a:a0:d5:95:7e:c9:c9:cf:10:0d:31:21:21:5a: 79:c1:be:d5:c1:2a:30:c6:7d:d3:d0:3a:21:26:40:14: 73:2c:0a:92:fc:b6:f9:70:33:c4:62:41:7d:8c:ef:f3: 62:70:d9:98:44:52:ad:8d:dc:df:45:0f:72:42:0b:8e: 87:f5:9e:8b:e6:d1:b6:dc:cc:c6:09:a1:4a:e1:f2:cc: 75:30:d2:45:5e:f0:d3:28:81:a7:25:4e:c3:3f:70:8c: 24:4c:3a:60:17:80:2e:29:34:64:80:a3:73:76:48:9b: 31:a1:96:f2:95:80:af:41:26:cc:40:a8:78:ce:73:7d: 01:02:5f:70:ee:74:da:f9:51:95:fb:72:89:82:d2:45: cc:11:1c:4b:e9:26:91:f2:82:12:25:98:22:18:dc:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:96:46:0c:23:a1:41:49:ed:55:1e:fb:71:bd:f9:69: 38:9b:7b:9a:ec:3b:75:df:54:d4:f1:b7:af:42:5a:cb: df:52:56:a0:26:6d:12:06:f3:4e:ca:45:b8:4c:81:6d: 39:ff:93:7f:30:7d:b7:f7:d2:86:7c:e9:a9:80:11:27: 40:a9:de:46:43:42:3c:ba:9b:5c:36:af:d8:5d:14:c5: dc:d4:f8:c9:c1:c7:c1:0f:2c:2f:7e:2f:7d:6a:54:2d: 3d:93:f8:20:6a:b2:f5:f7:d6:f1:01:6c:eb:a4:2b:41: 5d:40:76:b0:de:eb:da:f2:1c:37:2d:b6:d6:24:14:e8: d8:fb:9c:ea:eb:14:04:ef:bf:2c:b6:9d:b8:cf:26:c8: a7:40:c9:1c:f5:3d:fb:88:f5:de:21:4c:2f:7f:90:65: 7e:e4:6a:c6:0a:45:c2:3b:db:67:1c:81:7a:14:40:b6: 24:f4:02:1d:97:39:38:70:45:b9:a5:11:7f:60:ea:ba: 51:04:f5:36:94:cd:86:bc:f4:f0:de:94:9d:c9:5d:42: 6f:68:47:40:7f:cb:b7:ef:9a:bf:a9:e8:a0:37:7e:50: ce:82:46:74:a5:35:54:36:c0:97:ad:6e:11:1f:25:a8: ae:b6:1f:f7:03:a2:71:30:14:a8:ac:da:04:1e:2f:39 Fingerprint (SHA-256): 31:66:36:2B:74:C1:FA:0F:74:CF:F7:1C:51:5B:CF:C1:B8:80:08:39:31:0C:28:A5:ED:A5:B9:6C:F5:E2:63:D2 Fingerprint (SHA1): 49:A1:B6:88:8D:8B:8D:20:94:5E:2E:02:49:BD:47:BE:33:61:5B:5A Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #6344: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:f5:f2 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 19:35:32 2016 Not After : Fri Apr 08 19:35:32 2016 Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:f1:90:3e:47:9d:04:bc:28:15:77:c9:04:7e:74:ef: ba:ba:ba:61:7c:40:fe:76:1f:58:56:e9:e6:75:89:81: fa:bb:0c:17:be:b0:81:16:1f:96:50:fc:01:b8:f0:b8: 6d:1b:ea:27:f6:84:3b:4c:a8:1f:8c:c3:95:82:e3:00: e8:91:7c:5c:9c:33:1d:97:cc:73:99:9e:82:07:cc:47: 5b:97:0d:c6:bc:b7:3d:db:9e:ed:59:b8:9b:45:81:ce: d9:96:03:32:17:5d:cb:75:fd:e7:58:33:e4:11:19:44: ae:c7:80:5f:13:77:2c:00:3f:b9:b7:cb:19:9c:eb:0d: 79:a2:5c:fd:3b:e2:2c:bc:f6:1a:50:45:33:f6:4c:c0: 72:fa:a7:7a:9f:e6:1f:1b:fb:67:79:70:5b:b9:93:46: f9:e8:8a:7c:73:f7:09:9d:c1:95:db:79:47:c9:35:f2: fc:2b:a8:e9:26:73:e1:fd:aa:90:7f:34:3f:fd:2f:2d: bf:34:f2:94:63:d9:b8:65:19:49:51:67:91:d7:0c:06: d7:f8:73:f3:0f:75:41:54:21:c0:23:4b:90:3d:0e:53: 58:44:3e:87:28:31:5a:72:26:96:95:dc:13:b6:4b:c8: 48:77:21:93:5a:4e:27:5d:76:19:d7:95:10:4a:ad:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:45:93:af:f9:e7:38:0d:38:25:e9:eb:5b:e8:de:c2: e5:84:a9:96:1e:75:de:90:df:ee:a6:0a:9d:99:22:b7: 08:b5:35:33:5a:22:7e:0b:48:80:33:d2:81:fb:40:5d: 1c:da:95:a7:bc:e6:8e:e2:ff:cf:e3:6c:40:85:f7:62: 5c:9a:d5:67:52:6d:2b:76:e4:11:33:63:f9:f2:66:e7: 0f:ed:5d:cc:87:80:e7:0a:b5:43:a3:9e:79:8b:68:ed: c9:36:14:af:44:e6:55:a3:de:69:e2:b6:29:57:31:aa: eb:7c:d0:8d:ed:a2:cb:5b:c2:6e:59:37:07:47:31:16: 3a:20:a7:16:0f:d3:6e:c4:33:f9:44:3d:b5:60:08:1f: 00:bd:e0:40:c9:f1:91:24:4a:c4:68:9f:32:8f:e4:50: 1d:4d:6a:91:50:64:b7:0b:3d:d8:69:bb:30:91:aa:ef: 79:9b:74:ca:8c:a8:03:d3:90:07:90:92:64:71:23:6f: ab:a3:b8:ae:b0:f0:68:d7:1f:5b:15:6a:b1:1f:41:ee: 9a:ab:05:6e:2e:7e:58:bd:03:f4:83:82:bb:5d:9a:f2: 54:e0:ce:29:98:34:c6:73:01:9d:ca:b7:ea:d4:5e:41: e9:5a:30:49:70:7f:2e:c7:50:09:79:33:fc:b8:cb:d6 Fingerprint (SHA-256): F1:97:C7:D7:DE:27:56:A3:11:63:58:2E:27:D4:52:6D:6D:96:74:F1:AD:DE:E3:E8:46:3F:3A:D7:92:AE:C3:48 Fingerprint (SHA1): 3F:7A:E8:D8:18:EB:B0:3B:B7:A0:2B:54:EB:92:B6:25:B3:B6:46:2F Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #6345: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:f6:1c Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 19:35:40 2016 Not After : Fri Apr 08 19:35:40 2016 Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:2a:f6:41:9b:cf:41:b9:3f:a0:ff:21:26:eb:0d:3a: d6:db:b2:60:9a:9d:41:01:16:56:42:96:5a:ad:05:7e: 75:d5:4c:57:45:f2:1d:a6:0b:a3:1c:00:ab:d2:ac:d7: 92:0b:5b:98:29:dd:89:a9:98:7a:fb:d5:23:92:71:32: 51:e1:79:5e:81:42:3f:c8:00:7d:a5:3c:10:e7:5a:f7: 9c:ef:a9:46:53:59:38:ac:3c:eb:cb:e3:ce:b9:46:07: a2:c0:75:8b:bb:40:1e:16:40:81:f7:92:d3:ba:76:32: 40:22:85:47:20:97:a1:f3:70:69:cd:20:2b:a4:1e:c4: 77:84:2a:05:36:ea:52:e1:49:1a:ab:fd:93:79:ee:75: 38:b7:e9:49:4a:41:ca:25:cc:65:ae:46:8f:2c:12:c6: b1:f1:a8:73:1c:2f:ca:91:5f:c8:19:5c:6b:15:1e:9c: 9f:58:91:25:d7:6a:92:b8:fe:70:b5:50:79:3c:ff:06: 33:94:cd:37:19:e5:9f:2c:20:53:6c:b8:ac:9e:7f:04: 38:4c:ac:4f:67:f8:0b:12:ee:ca:bd:dd:69:bd:69:00: 92:7a:71:d9:2f:1d:c4:06:72:37:a3:1f:1d:dd:fe:8b: 2e:fd:75:5b:c3:9c:63:0c:dc:ee:1b:9a:77:a7:30:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a5:58:1a:4c:59:f1:93:b1:2c:5a:ad:16:a0:77:b4:59: be:ab:20:21:10:57:26:71:ac:f0:04:b5:85:04:fc:ee: 5b:b6:d2:1f:61:24:b9:4a:6f:78:7f:17:4d:68:de:8c: 6b:91:9f:fa:5e:6e:c7:92:92:6c:e6:9a:16:58:29:6b: 57:d2:ea:fd:47:d1:25:21:d3:0f:f7:e7:d1:e4:73:9e: 0c:30:f9:42:a0:52:82:44:e7:da:1c:5f:29:72:4e:14: 2c:2a:1c:88:24:9a:c4:b8:7e:6c:64:0b:c9:ea:31:ae: 2f:93:92:ce:02:fd:48:1f:8e:1a:dc:87:20:11:06:ba: de:cd:b1:75:6e:e6:95:34:3d:57:c5:ac:4a:af:89:b2: a4:dc:fa:89:62:95:d9:50:b1:c1:d7:c7:65:74:1d:1b: 38:7f:bc:5d:6a:e0:7b:cc:85:7b:d3:f4:d2:02:b2:06: 32:2f:53:fb:11:f1:09:3f:d5:c0:e7:d2:18:92:0b:8c: 14:14:91:09:a5:fb:f6:56:cd:03:1e:ac:d6:c3:07:8a: 72:09:82:95:e3:b4:2a:0d:e6:0b:0a:d2:11:f7:09:23: 2d:01:76:84:e2:5b:01:3a:91:18:32:40:ae:c0:b4:4c: 08:a1:7a:31:01:cf:71:a9:11:59:f0:a7:d8:1b:b4:50 Fingerprint (SHA-256): D9:CF:F5:F4:D9:32:FF:63:4E:CB:2B:F2:72:34:D3:E0:72:D0:25:3C:F0:F6:4F:1A:2B:68:C6:44:6D:F7:17:A7 Fingerprint (SHA1): 26:97:38:A0:27:25:AC:21:17:B2:49:C4:EA:A1:76:03:F5:B2:F4:63 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #6346: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:f6:2b Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 19:35:54 2016 Not After : Fri Apr 08 19:35:54 2016 Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:92:5d:79:6b:8d:22:a3:0b:b1:bd:07:00:0a:4d:8c: fb:01:2e:8a:50:a4:b3:7a:b4:72:52:98:d4:db:b6:7a: 67:cd:1a:81:4d:d7:06:73:c5:1c:18:23:31:be:8c:5e: 71:3c:21:4c:09:96:0e:99:c6:bb:38:e1:1c:2e:99:9e: 0c:5c:a7:50:53:e7:91:50:cd:89:f6:38:df:2e:f1:9f: 27:e8:b1:6d:7a:f8:7b:3d:3d:1f:32:d0:b0:87:a6:4c: 5e:57:6c:62:7a:53:55:0a:09:7b:3d:54:40:cd:2a:f5: 34:ff:e2:3f:39:93:0a:2d:da:36:5c:b3:8f:98:cb:f2: 9e:18:32:7e:d0:1a:f6:85:c3:ad:4e:d3:46:12:49:98: 36:85:63:b7:48:3f:47:28:be:f6:5a:c1:bf:6a:b5:4a: 15:5f:7b:62:57:45:92:be:5f:4e:e0:23:e9:a3:22:9c: 21:2f:b6:2d:a6:d3:3c:70:b6:c9:37:d6:6e:c2:3a:c9: 4b:31:aa:62:d4:3d:c5:a1:14:08:fb:6a:31:41:ee:40: 75:5f:b1:28:88:67:74:7f:78:08:98:e6:a1:d6:4b:d8: ad:62:a4:c0:4d:01:87:7c:49:31:10:86:27:e5:8b:04: 06:3c:74:bb:04:bb:fc:8b:49:20:de:c7:c4:59:47:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:85:69:d2:b8:93:37:e7:24:82:e7:dc:b3:18:1f:fe: f9:12:5a:d9:c2:8a:81:2b:36:f8:14:b9:25:66:f9:d2: fc:01:a7:9a:d6:9a:e9:0c:38:f3:10:59:20:24:0a:35: 0b:a8:e9:f8:77:db:5a:ff:50:bc:eb:f0:68:ac:44:01: 48:4a:ea:3e:2f:70:60:4f:00:1a:ba:41:40:c4:d9:60: cc:6c:02:53:4f:cf:bc:3f:42:00:40:59:93:9c:b9:fb: b0:64:04:9c:56:96:15:7c:ef:34:55:ff:c2:b9:df:89: 99:63:18:86:bb:96:8a:a0:d3:82:e1:66:2f:aa:a6:a1: 6a:65:4a:22:81:15:3e:a7:be:07:19:f7:1b:44:01:02: 35:ea:09:1f:8c:7f:be:6d:37:e1:77:a6:16:61:58:ad: 11:5a:18:35:60:42:cf:8b:33:57:b1:6e:81:10:4c:22: b9:47:c5:72:84:05:49:5e:31:ea:ab:8d:6f:10:39:40: 0d:44:38:c5:96:89:b7:a6:d8:e6:1c:b0:75:7b:9a:44: f3:35:08:c1:09:b1:76:8d:36:7a:e4:ee:08:ba:13:25: f5:3d:2a:8f:f3:34:97:fa:84:a5:a3:02:29:10:8d:d3: 9e:6c:bd:97:29:1f:77:66:e0:84:6f:5e:cd:74:b1:82 Fingerprint (SHA-256): 6A:6E:A9:EE:B1:65:C0:1C:BB:26:82:D0:4D:A3:8F:F2:85:96:74:1E:2E:15:E9:BA:06:D9:8A:06:F6:BA:C0:34 Fingerprint (SHA1): 66:5E:54:15:B9:40:83:20:41:DB:A4:95:28:76:29:DB:F7:25:99:AA Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #6347: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:f6:45 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 19:36:01 2016 Not After : Fri Apr 08 19:36:01 2016 Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ed:7b:e6:ff:a6:50:de:af:dc:2a:86:a9:b2:c3:f3:9e: ea:1a:9c:d9:28:b4:fc:97:ed:35:a0:da:60:90:e4:75: 10:5a:e9:e2:42:ad:db:ba:c3:c5:ca:62:20:fc:24:f6: 00:bd:ba:d6:36:a2:bd:38:85:cf:e8:12:36:46:82:28: d5:f6:55:c4:5c:65:33:78:90:1e:86:4d:d9:43:c3:20: b0:b7:8c:44:5b:dc:57:1f:8b:d1:1c:ab:f0:9e:46:05: b9:ea:91:e4:19:d3:72:e6:cb:f5:3a:96:3a:18:64:82: a1:d0:bb:2c:fc:ae:aa:08:6a:c5:f1:e2:f8:4e:54:dc: d5:da:45:0c:4a:94:47:a5:45:69:27:1e:57:18:3c:ce: a0:fc:e4:87:93:59:8c:56:01:a6:89:8f:8f:b1:28:8e: 70:c8:00:6f:cd:99:dd:73:9f:77:06:10:c6:8f:94:23: 00:8e:35:05:89:0c:64:b0:a7:61:73:8c:9f:ab:1e:4f: f8:d0:07:2e:2b:50:4c:46:31:d9:15:fb:e9:d8:a2:ff: 7b:75:24:ea:dc:dc:6b:b1:83:94:44:ed:87:2c:6b:02: 49:8e:db:d3:00:9c:5a:42:67:f8:89:7b:68:7f:2f:2f: 78:00:ab:64:b7:63:77:cb:f7:7e:58:39:1b:86:68:3f Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:f6:08:7a:97:4d:b3:e5:5c:09:73:1c:2e:1e:42:bd: 3f:97:44:5b:df:7c:1f:a8:61:61:7d:7c:36:81:70:45: 1c:9a:81:96:42:f1:03:f6:2c:86:59:d7:50:dd:49:38: b0:a0:e3:07:35:f2:6f:a3:c4:b1:6b:4a:85:09:0b:a5: a3:d7:00:95:3d:82:9c:bc:67:98:6c:ae:ee:2e:23:3f: 08:5d:3a:de:7a:bf:97:22:b8:54:e8:8a:63:1d:d4:14: 78:24:0e:7d:9f:c5:7c:9f:e7:ea:b9:18:e1:db:61:b7: 95:36:f7:70:5f:a2:1d:37:76:60:e5:e7:bd:b2:c7:59: f2:b7:33:17:0e:c2:dd:83:9c:0e:fc:0a:bc:6c:57:c0: 2d:7a:c5:9c:24:32:0c:ab:db:5c:38:df:7f:e6:da:d5: b6:77:0a:04:ef:c4:39:cf:83:69:a9:8b:c8:de:d5:66: 32:12:22:41:68:50:de:56:c4:1a:23:a6:5c:f0:5d:65: 0e:08:ea:14:ec:30:44:2c:cf:d9:ca:35:7b:a8:2d:61: 13:c5:c9:78:d8:73:65:40:1e:d9:ae:a2:1f:e1:c9:a2: 75:c2:f7:68:ec:c9:e4:07:d5:a4:29:d8:97:33:d5:e8: 88:f6:ed:c2:ca:38:7d:4c:c2:e5:b6:9b:4d:b2:4d:1c Fingerprint (SHA-256): 37:95:88:A0:7B:D4:57:50:EA:B6:D9:1F:47:BD:91:E1:F8:69:F8:D4:C0:C9:48:5C:8E:18:7F:0D:39:F3:74:EE Fingerprint (SHA1): BD:61:A3:E1:75:9D:69:67:55:85:11:6F:CA:4C:97:C3:21:8A:CD:97 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #6348: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:f6:52 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 19:36:08 2016 Not After : Fri Apr 08 19:36:08 2016 Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:7b:43:18:75:bd:16:30:84:71:71:24:80:d0:59:7d: 53:dd:78:5d:d2:59:bf:d1:36:76:e4:c9:c5:26:29:04: 61:79:7e:0a:23:e3:29:14:b0:5f:e1:2f:9f:cc:f1:e5: 1c:1d:97:9b:fb:7f:b0:53:9d:cf:cb:dc:d7:66:df:d6: 6e:26:21:d1:bb:86:81:cb:b3:04:79:8a:96:2c:5e:9c: ab:94:0f:0d:4b:a1:8d:6c:20:8a:7f:db:ca:e0:95:13: 3e:98:91:6a:17:f1:aa:a5:db:17:ec:76:84:d6:63:e2: 53:a2:ed:e9:7c:c0:9a:27:9d:ba:1c:d2:c5:41:04:91: d8:f7:ed:2a:34:0a:0a:a0:aa:8b:5b:e6:81:48:31:b9: 97:50:4a:fe:99:95:42:02:c4:fd:c8:0c:6e:f0:c2:4e: 30:c8:5c:93:31:ab:e3:61:b9:1a:12:b3:fd:75:61:00: 5c:4b:2f:59:96:2b:ef:95:70:3f:89:e3:de:bf:ce:dc: ba:19:f4:ee:80:c3:00:96:4b:78:5b:ed:fb:cb:4e:86: 82:d5:a3:70:1b:9b:28:c2:2f:f4:56:51:96:55:52:d1: f0:36:4e:a9:d6:df:16:7c:c3:98:d7:f8:7d:44:85:19: 95:93:5e:71:d3:fc:78:26:3e:fb:e1:a4:83:e2:f9:cb Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:7b:8d:43:de:15:9e:5c:b0:13:04:48:4e:70:02:c2: 30:e6:3a:ae:9a:bc:74:4c:e6:21:a0:5c:f7:8c:50:07: 58:54:de:0a:8c:36:1d:ea:ea:1e:18:9f:e7:02:04:84: ca:37:6a:ea:7f:c5:80:68:9e:f8:d2:3f:d9:1a:f1:18: bb:5c:0f:83:d3:f5:03:92:c1:d4:9a:93:0e:0f:63:b7: 47:69:6e:fd:9c:d7:ca:0d:31:6e:66:6b:9e:9d:d0:d4: 8d:b0:b3:8e:a3:e3:33:66:78:89:66:2c:91:a5:70:d1: 78:ec:6e:90:ae:23:19:3a:26:ed:d7:0a:bc:24:a4:80: 08:f2:f1:21:d2:af:ba:f2:34:f7:a1:06:ff:a0:a5:a2: 5a:b9:2b:03:7a:f3:97:dc:25:b1:c6:24:06:19:e1:6a: ff:d3:3a:d2:89:a3:45:4e:79:70:68:97:0b:78:69:59: 2c:d9:3c:cb:1a:66:db:0b:0d:a4:09:85:ea:ad:4d:1f: d5:47:eb:20:40:f2:75:ca:eb:0b:cd:d5:da:2a:5e:cb: 83:28:22:42:26:a4:82:d2:b5:ad:32:ac:3c:e0:e7:cb: b5:2d:eb:9a:5b:b5:77:2f:9d:b0:f5:5c:d8:19:8a:c7: b8:f1:5f:fb:aa:47:2a:1c:2a:b0:5e:eb:2a:8a:df:6a Fingerprint (SHA-256): B7:CA:E9:B8:87:99:A7:1C:6D:9E:19:78:82:7D:A7:8A:43:4A:C4:BA:4C:99:B6:98:22:D9:1D:68:D6:F9:3D:32 Fingerprint (SHA1): D0:44:E1:16:DF:3A:EB:4F:CB:92:81:EF:67:39:07:B8:B3:0D:23:88 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #6349: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:f6:5f Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 19:36:14 2016 Not After : Fri Apr 08 19:36:14 2016 Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:c5:92:d0:91:d5:88:7e:a1:8f:d0:d4:a4:ce:e2:78: c2:d6:85:b0:e1:70:e9:10:cb:89:6e:74:8b:49:c6:ce: 69:c6:31:4d:1e:83:e8:f0:50:59:91:0e:cc:dd:8f:84: ee:aa:d7:a2:ee:cf:26:4e:f0:a1:1b:f0:66:05:c7:02: f1:60:47:fd:e8:be:66:87:f8:cc:e4:13:45:04:ae:43: cf:87:a9:54:31:11:ce:16:6a:9f:10:c1:18:16:6e:05: 24:30:60:8d:8c:50:42:d5:f2:76:88:ba:fc:b6:f2:05: b9:6e:03:17:97:04:67:7c:7f:5c:06:2e:23:90:9d:e6: 9c:bc:e8:c6:c5:f4:f2:af:af:15:68:c0:ee:3c:98:a4: 73:d1:e4:d0:9b:a8:88:49:1d:54:c7:d4:0f:b1:25:cd: 5b:bc:f6:fa:7d:d4:0d:13:b0:7e:67:ae:27:6f:79:a0: 72:26:8f:08:cf:de:69:bc:aa:95:af:d6:4f:0c:da:36: 54:4d:29:a2:fc:9f:f0:91:10:14:e5:0a:eb:43:b3:9e: 48:22:a2:30:29:fb:ec:15:a0:a1:5d:9a:15:b4:5d:a8: 45:d2:f4:60:ec:44:69:d2:f3:1d:7f:b8:0e:54:8f:cc: 08:07:50:0f:dd:13:3b:b1:7f:b3:9b:d5:29:b9:6a:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 34:9b:5d:59:ad:93:3b:be:94:14:c3:a5:94:41:58:ff: 54:38:50:de:ad:0d:14:e5:fd:f6:36:22:2e:8d:5b:8c: 54:72:fa:e0:b5:55:00:35:e2:91:f3:88:35:54:c3:56: 1e:35:1c:dd:4d:cb:22:80:a1:de:a0:e7:1d:53:42:45: d8:25:87:50:2b:6a:e3:d1:07:05:de:06:4d:9f:d8:d7: f9:1f:10:8a:77:40:02:5c:27:e3:e7:cb:ea:1f:fb:b3: 61:ee:92:f4:04:52:3d:6d:da:0e:d1:6e:15:c3:68:51: bf:5e:5b:e1:02:b4:8a:1a:3a:8b:fe:2e:b7:66:47:90: 60:0b:0f:ec:27:ba:24:ff:5c:f7:84:f8:87:e2:47:2d: 66:67:fd:e3:49:21:81:ed:8d:4f:6d:17:17:f2:2d:fd: 46:73:de:bd:d5:1c:ad:13:27:3f:5c:2d:8f:7c:93:03: 62:3c:d1:50:42:30:cd:1e:82:fc:56:92:f0:d9:c8:8c: 17:13:fd:2d:19:30:cb:7c:72:2e:22:07:43:1b:c5:14: 79:84:51:b5:76:54:3d:cb:24:ee:bd:97:1b:68:9e:e9: e5:d3:c5:28:e4:0f:5b:a7:81:70:94:1c:43:49:63:0f: 59:f8:da:3a:1a:74:4d:78:c9:cf:ba:85:a1:8d:8a:a7 Fingerprint (SHA-256): 33:03:31:0F:53:DE:E8:36:8F:FE:3C:0C:C0:78:C2:6E:38:C1:E7:70:97:C1:79:AF:5C:2D:3A:7C:BB:5C:0F:A2 Fingerprint (SHA1): 65:15:9F:61:55:7E:A6:45:17:C2:5B:AB:98:6A:90:14:20:CE:81:6E Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #6350: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:f6:6b Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Jan 08 19:36:24 2016 Not After : Fri Apr 08 19:36:24 2016 Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:e6:90:68:9a:c7:20:84:0a:16:09:df:97:28:b2:03: 6d:3b:6c:e8:9a:2d:ed:d9:b2:a7:2f:88:3a:44:1b:74: a3:53:98:01:53:1a:e5:29:f9:05:d7:b6:55:56:31:f8: f7:a2:7f:30:60:8a:7a:2d:59:16:07:97:a1:3d:8e:c7: fb:55:52:f1:62:ec:f5:20:48:2b:fd:1a:83:6b:d3:f8: cb:12:8c:7e:1f:5b:0d:c9:62:e3:c0:40:ca:f9:9a:40: ba:df:d2:fc:8c:43:70:fb:6a:03:00:bb:91:84:09:09: 74:f7:cb:06:57:7b:cf:18:43:c5:c6:51:e6:f8:48:87: ae:af:75:a2:8c:4a:83:ae:25:0a:17:2d:f2:fa:e1:4d: b8:22:98:02:11:38:62:6a:68:43:6a:30:e8:f2:2e:38: c2:d4:45:e0:9e:ee:d8:25:e3:1a:11:d2:72:e3:e0:31: d7:da:7a:19:c6:99:e0:1e:50:9a:61:08:7b:1f:5f:cb: 5f:90:64:54:5c:35:38:06:bc:31:0e:f9:9c:69:57:3e: c6:7f:6b:8f:09:08:60:f6:b6:a5:6e:19:66:2e:96:ae: 9d:00:86:bf:b7:2c:ce:ba:66:63:ca:7b:df:d7:3d:28: 13:42:71:80:1f:d9:b5:3f:4e:83:04:5a:b0:d4:01:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:8e:98:96:2e:da:79:6f:a1:d1:df:99:58:55:90:f7: 2d:7f:c2:4a:2a:bc:f7:e0:0e:62:1c:13:f2:6f:fc:af: 88:b8:45:a2:7c:e3:24:da:60:24:9c:cf:1c:27:46:01: c8:e6:85:da:7a:43:c4:55:cf:5b:b1:d7:9b:18:3e:2a: 16:56:dc:ac:2b:87:9e:3e:39:16:3c:c9:c9:0b:b0:4d: 3e:05:c7:31:ca:22:01:ed:18:8f:65:f7:56:18:1b:81: b7:0e:ad:af:55:f5:70:f0:27:08:26:65:9a:8d:84:5f: 51:78:36:54:73:ab:41:9b:10:85:f8:91:c1:66:72:05: b7:6a:01:c8:b0:a2:05:13:d3:2e:84:86:10:07:ba:c2: 29:a7:b5:78:53:2c:61:9e:fc:b8:dc:ba:fa:f5:28:fd: d9:35:e0:f1:8f:5c:07:6a:16:70:61:3f:0a:71:df:cd: 9a:1a:66:40:cf:5d:76:1c:c7:6f:46:d1:ea:34:4c:2c: 39:37:b4:0b:3e:c3:8c:35:d0:18:01:8d:84:9e:21:c1: 75:5f:19:16:58:d5:f9:60:26:7e:ce:ae:2c:89:0f:d5: 52:4e:a6:47:8c:17:75:61:5b:0c:dc:e7:9e:43:2d:11: 02:d8:6e:dc:cf:cb:0d:59:32:b4:a3:ea:90:60:3d:b0 Fingerprint (SHA-256): AB:CB:AB:A7:DA:D6:4D:79:0B:40:96:C2:D7:01:5C:68:CD:19:B2:77:A4:27:31:F7:0D:3A:91:F5:90:14:96:26 Fingerprint (SHA1): 3A:25:6F:F8:6C:18:C1:83:1C:B7:FD:E0:77:93:9A:89:3F:56:96:B6 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #6351: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:f6:7f Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Jan 08 19:36:30 2016 Not After : Fri Apr 08 19:36:30 2016 Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:4e:fb:5b:24:9f:24:f2:61:d5:7e:44:bf:2f:5b:99: bf:2c:1b:3d:b7:de:81:c5:11:4b:d4:dd:a5:15:df:8c: cb:db:ce:c9:8b:8a:1d:90:75:bb:6f:d8:59:9d:42:8e: 30:89:8a:ce:97:d3:a5:43:d7:14:29:a2:41:7a:c8:fb: a0:92:79:b1:d2:b1:cc:25:1e:ee:33:20:15:2f:34:82: ec:fc:c9:ae:b5:b3:c5:f3:9b:52:d0:85:0b:4b:bb:6a: 79:90:2a:1b:8e:73:a6:02:17:9a:14:aa:43:66:50:57: aa:54:e6:d3:b6:8d:6b:62:5b:31:28:9f:bd:4d:0d:50: 46:48:b9:42:ec:c4:86:4c:e4:ac:db:c9:2b:1e:c0:bb: a1:66:a9:d7:62:8e:54:78:92:3d:47:a8:e0:70:60:37: 89:7f:74:e3:6d:58:45:1c:90:44:06:a3:c3:53:e9:42: c0:1e:53:8a:85:f5:bb:65:59:25:fb:1f:3e:26:91:c8: 20:68:7f:1e:d0:23:4d:0b:34:01:b6:2e:0e:98:72:2d: 7d:f8:2e:17:b1:5d:9a:24:16:87:67:fb:55:cf:6b:35: 5f:72:2c:fc:87:d8:e3:6a:a8:e1:91:04:d5:f3:65:bd: 71:43:16:b3:ea:2f:ba:3f:47:f3:cd:66:96:74:fc:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:7c:d3:a5:49:58:8a:62:cd:12:55:a6:14:e8:37:55: 9b:fb:21:a0:6d:e0:b1:52:4d:af:57:ee:ee:3b:7c:07: 9e:2c:91:7f:3a:42:b6:6e:c7:98:56:b6:86:f6:99:a7: 20:dc:b3:ab:b8:f4:91:19:09:1b:ea:04:0a:b8:42:60: d8:9b:35:9e:36:28:a6:c8:14:7e:1d:cb:e8:6c:c9:8a: f2:a2:6e:bb:af:22:9a:cf:73:0e:bd:12:58:7d:6c:a4: 93:18:50:79:8e:d7:26:f3:e3:bb:61:b9:07:f5:c2:74: 8c:6f:c9:91:36:fb:6c:ff:f6:88:14:fa:4e:6c:2b:91: c7:6b:f0:51:8b:b2:d0:26:4d:be:c2:3f:d1:31:11:85: 18:af:ec:16:0c:27:be:3c:d6:64:0a:92:8a:aa:81:ba: ab:b4:ca:77:b0:54:dc:39:a0:f5:fd:8f:ce:e1:95:ca: 98:a1:3a:a4:a4:7b:23:6d:ca:ec:92:82:71:aa:d4:84: c5:48:a4:41:6b:05:24:bc:3a:2d:90:64:1f:12:3c:ec: 67:c2:2a:41:8b:76:33:f6:5c:6d:ee:1b:4e:ed:ee:d1: 23:1e:c5:28:a9:c3:8b:5a:d9:f0:0c:38:89:13:dc:1a: c0:9a:24:3a:37:e9:7c:65:f4:a6:5e:9a:74:94:1c:1e Fingerprint (SHA-256): ED:93:38:D2:98:E8:27:02:E5:12:B6:5F:99:21:4B:A4:0D:5B:AE:64:0A:9F:89:79:A9:14:F8:D9:82:FF:0C:1D Fingerprint (SHA1): AC:4D:5B:7F:80:8D:93:46:A8:F7:6B:C8:19:AE:E7:94:6E:6F:9E:0E Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #6352: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #6353: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #6354: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #6355: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:f6:b2 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Fri Jan 08 19:36:56 2016 Not After : Fri Apr 08 19:36:56 2016 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:7f:17:6f:bb:71:3c:a6:5e:10:70:02:54:49:ac:0a: 1a:6e:ae:e7:cf:d8:39:db:68:cd:75:04:e8:f1:c0:04: 33:ae:7b:33:f6:68:3e:0f:ef:c1:6b:6a:a2:4d:77:5d: f6:c5:64:34:77:e1:03:5d:26:7b:01:57:ec:da:e5:5b: 79:d0:c6:db:a4:fa:13:31:36:74:1c:cd:1c:88:2f:37: f1:c6:e5:b8:77:d6:16:a2:b2:b0:9b:a0:7f:48:ad:a7: 49:58:ee:2b:d0:1d:11:d4:a9:d8:43:4e:f2:b6:be:85: 41:ab:54:5b:c1:e1:1a:91:b0:ee:77:a6:3d:bb:37:21: 44:ca:70:c3:bb:fe:2f:19:d5:7a:0b:c4:70:02:14:69: 6c:ab:df:22:62:00:54:df:87:1e:20:ca:0c:af:d5:22: 1d:c2:c2:45:9c:de:74:08:9e:7f:0f:13:e8:34:b6:b2: e3:10:57:20:73:62:4e:f6:3d:f0:d5:8a:68:46:c5:81: 7e:ea:0f:ce:da:79:d6:18:b0:ef:5a:55:e8:f7:60:c0: 16:82:13:8d:e0:bd:41:1f:ae:c1:d8:7b:b8:f5:f8:ab: a7:ff:4a:b9:51:54:c0:f1:74:a1:38:57:c0:2f:81:46: 7d:e0:2b:b8:ec:dc:71:c2:e4:21:18:fa:c9:6d:72:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:20:a4:09:1b:7f:0a:2f:fd:e4:f8:c3:2a:a8:81:d4: e3:aa:89:41:1b:18:e1:ab:c3:e7:3d:93:37:f1:28:ed: 17:ef:b4:0d:76:90:a7:3f:24:0e:b6:1a:a1:8d:0a:be: 2b:79:2f:a8:77:cb:fe:cb:87:56:6e:cb:91:d3:fb:83: ae:66:b9:08:46:c3:28:3f:5b:26:95:6a:18:a6:cb:ff: ab:3e:3e:7c:0e:67:80:79:e9:5f:97:7f:a8:65:50:1d: 13:47:ac:83:f5:52:f1:72:44:61:4a:a6:63:f6:d9:5d: 77:e5:9d:7f:65:b2:b3:f4:13:eb:34:1e:20:2e:bc:88: ad:70:05:2f:a2:11:06:05:bc:d6:3f:64:21:d5:f7:b7: b6:7c:4d:5f:60:d0:01:2f:77:99:57:00:6a:64:54:34: 2a:4e:fe:81:f7:97:29:40:dc:e2:ee:8a:06:fb:43:bf: bd:51:2d:4e:e2:3c:be:de:5f:03:28:25:68:05:51:b0: fc:91:a1:f8:66:7d:52:8d:7d:c5:30:08:fc:a2:39:35: ee:f8:33:67:1f:f9:48:9c:ce:4c:43:a0:0e:2c:d4:0b: 24:9d:bf:f8:96:41:4b:3d:8f:f6:93:22:d9:40:da:20: 7d:2e:05:07:9b:d0:7a:f2:3e:35:3e:14:59:76:8c:3c Fingerprint (SHA-256): 49:CD:72:8A:5B:F0:E5:55:72:E1:DF:D4:5C:CC:AC:8B:07:9D:ED:CC:93:1C:15:FE:EC:31:06:A8:0D:97:B7:1A Fingerprint (SHA1): 6E:69:41:E8:D5:43:1C:5F:60:AD:5F:F1:8E:93:74:CC:17:4E:C9:14 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #6356: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der cert.sh: #6357: dump extension 2.5.29.17 to file /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #6358: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #6359: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der: error 0: Success cert.sh: #6360: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der: error 0: Success cert.sh: #6361: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der: error 0: Success cert.sh: #6362: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #6363: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1a:f6:f6 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Fri Jan 08 19:37:43 2016 Not After : Fri Apr 08 19:37:43 2016 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:82:54:34:49:9b:c2:c5:68:98:f3:34:3c:62:66:1b: 20:58:70:8f:c7:29:ca:18:f1:c5:6b:3c:9b:ff:d8:98: fd:33:8c:10:f0:e1:dd:2c:3c:ee:86:15:94:e9:42:98: 5e:e4:c4:70:9e:78:6f:f1:23:ea:75:f4:39:85:42:89: 67:a2:6b:ec:19:61:25:10:d0:31:66:92:f7:8e:2e:b6: d4:aa:b8:70:67:24:21:30:5b:72:b8:a9:d4:7d:a3:dc: c5:2a:da:4f:af:60:e7:18:b5:5d:52:e2:7d:29:91:eb: 13:69:46:b0:a8:26:93:63:e7:29:25:78:74:6a:b5:87: 96:72:8a:2e:79:fa:9d:be:95:92:6a:a7:90:55:34:cd: a8:54:63:ee:73:82:a4:87:bb:4a:a7:4c:8e:a5:75:da: 78:c4:54:dd:4f:2d:47:57:36:a5:75:1c:87:42:2a:07: 5f:0a:db:fd:1d:d0:57:d0:fd:14:64:10:81:d5:02:4b: 54:55:34:4d:e0:82:12:18:2c:f2:a5:ac:28:b7:12:7e: 8b:34:da:61:88:25:a6:69:f4:99:f6:70:b8:4d:28:8b: a5:b9:b0:35:1b:42:53:20:13:7d:6f:eb:e8:75:4c:7e: d0:38:43:22:bb:88:f5:68:91:c8:56:96:39:09:88:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8a:17:78:49:14:ec:cd:6a:31:b5:0a:b0:83:d0:10:85: 57:ae:e7:ee:31:a3:a8:20:39:29:e4:c3:4c:59:03:ec: 5e:8b:65:e6:cf:34:df:78:fe:3e:79:a9:c2:ff:71:7a: 4d:30:36:b8:31:72:6d:46:b2:97:af:bc:f0:c2:75:d5: 96:0b:1b:8d:e7:c2:a8:1f:1a:33:b5:4b:7a:c8:d2:3e: eb:ef:66:63:1f:45:8e:cd:5d:83:bc:dd:b2:16:9c:f4: 85:03:54:ce:d3:7f:7f:1e:f5:44:65:3e:a2:ea:ed:a1: 1c:4b:66:18:26:14:89:78:5e:e9:28:7c:84:ef:d1:a8: 02:0f:46:41:1e:63:ad:07:27:a9:af:8b:15:d5:01:86: 71:75:f3:1f:82:67:64:dc:91:5a:81:e7:de:3b:37:68: 3b:fe:b9:0f:d1:d4:af:fe:30:7b:0b:1a:51:df:76:95: 9a:f0:fe:5d:e1:ff:b7:80:3e:bc:85:38:f5:bd:4c:66: 52:ab:f3:dd:34:1e:9e:8d:cb:dc:d8:d2:5a:2b:8a:84: bb:39:8d:f3:42:98:d8:84:fa:3f:c3:17:79:b1:f8:ff: 8d:26:81:db:da:ed:de:19:35:a0:ae:2d:97:b1:a1:9f: a3:34:69:31:b8:24:62:6c:47:cd:32:ea:11:6a:df:3e Fingerprint (SHA-256): 31:8D:9A:15:57:EF:82:2C:62:3C:88:C9:91:68:D9:2B:FC:B2:25:42:CB:28:7E:48:8E:81:BC:0F:22:7D:D8:D7 Fingerprint (SHA1): 8A:31:C3:E6:9A:5A:EE:DF:84:8D:4E:F4:AD:62:38:8C:8C:DF:CC:CC Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #6364: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #6365: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #6366: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dbpass -f ../tests.pw cert.sh: #6367: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #6368: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #6369: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dbpass -o root.cert cert.sh: #6370: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #6371: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6372: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #6373: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw cert.sh: #6374: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #6375: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA.ca.cert cert.sh: #6376: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #6377: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #6378: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6379: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #6380: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6381: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6382: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #6383: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6384: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6385: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #6386: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6387: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6388: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #6389: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6390: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6391: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #6392: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6393: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw cert.sh: #6394: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #6395: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -o root.cert cert.sh: #6396: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #6397: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6398: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #6399: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6400: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #6401: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #6402: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #6403: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #6404: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #6405: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #6406: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #6407: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #6408: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #6409: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #6410: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #6411: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #6412: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #6413: perform selftest - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6414: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #6415: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6416: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6417: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #6418: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6419: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6420: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #6421: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6422: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6423: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #6424: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6425: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6426: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #6427: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6428: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6429: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #6430: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6431: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6432: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #6433: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6434: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6435: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #6436: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6437: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6438: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #6439: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6440: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6441: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #6442: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6443: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6444: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #6445: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6446: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6447: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #6448: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6449: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6450: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #6451: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6452: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6453: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #6454: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6455: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6456: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #6457: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6458: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6459: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #6460: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6461: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6462: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #6463: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6464: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6465: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #6466: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6467: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6468: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #6469: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6470: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6471: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #6472: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6473: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6474: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #6475: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6476: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6477: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #6478: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6479: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6480: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #6481: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6482: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6483: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #6484: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6485: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6486: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #6487: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6488: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6489: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #6490: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6491: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6492: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #6493: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6494: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6495: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #6496: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6497: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6498: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #6499: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6500: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6501: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #6502: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6503: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6504: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #6505: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6506: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6507: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #6508: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6509: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6510: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #6511: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6512: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6513: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #6514: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6515: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6516: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #6517: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6518: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6519: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #6520: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6521: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6522: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #6523: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6524: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6525: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #6526: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6527: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6528: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #6529: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6530: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6531: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #6532: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6533: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6534: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #6535: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6536: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6537: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #6538: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6539: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6540: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #6541: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6542: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6543: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #6544: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6545: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6546: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #6547: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6548: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6549: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #6550: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6551: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6552: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #6553: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6554: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6555: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #6556: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6557: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6558: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #6559: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6560: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6561: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #6562: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6563: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6564: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #6565: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6566: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6567: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #6568: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6569: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6570: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #6571: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6572: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6573: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #6574: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6575: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6576: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #6577: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6578: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6579: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #6580: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6581: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6582: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #6583: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6584: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6585: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #6586: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6587: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6588: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #6589: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6590: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6591: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #6592: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6593: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6594: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #6595: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6596: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6597: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #6598: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6599: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6600: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #6601: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6602: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6603: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #6604: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6605: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6606: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #6607: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6608: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #6609: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #6610: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #6611: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #6612: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #6613: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #6614: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #6615: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #6616: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #6617: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #6618: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #6619: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #6620: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #6621: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #6622: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #6623: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #6624: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #6625: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Fri Jan 8 14:43:25 EST 2016 Running tests for tools TIMESTAMP tools BEGIN: Fri Jan 8 14:43:25 EST 2016 tools.sh: Tools Tests with ECC =============================== tools.sh: Exporting Alice's email cert & key - default ciphers tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6626: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0e:a5:6e:39:06:54:09:9c:37:24:97:b2:f6:13:b7:fb Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6627: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6628: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6629: Exporting Alice's email EC cert & key (pk12util -o) - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6630: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b4:69:de:a2:9b:ac:33:c9:f3:7e:56:d9:c9:d7:fb:7a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Fri Jan 08 19:30:50 2016 Not After : Fri Jan 08 19:30:50 2066 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:00:f7:74:2c:68:8b:62:d6:31:b8:5e:7e:fa:8a:90: 50:42:07:ba:04:ad:e9:79:ce:85:c3:95:45:93:d0:83: 00:a1:3d:38:61:7f:22:bb:82:39:37:84:23:ff:c0:a6: 2c:d5:eb:0d:35:1e:2b:66:b1:d5:a6:33:5d:e3:c7:c5: 46:a8:01:00:e7:bc:5f:0d:fa:77:e9:d5:85:63:f6:7e: a9:ae:ed:8c:b9:f2:60:fb:b2:43:be:4e:36:f2:45:0b: d1:03:e9:4c:17:ee:d7:00:33:d5:54:d1:5e:94:b6:50: 76:70:49:52:fb:b3:05:3e:12:07:01:5a:72:07:f8:2d: 88:db:d6:ca:16 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:86:02:41:6d:ab:84:09:16:e1:97:7b:2a:a5:6e: 11:df:ae:9e:e2:54:e7:49:f8:58:ee:f5:f3:eb:22:05: eb:83:69:33:71:f4:1a:0e:8b:b8:44:1a:1c:b5:2b:3a: 8f:4b:4d:2c:00:9b:d6:93:d8:d6:b6:c4:44:1e:6a:eb: 7e:19:1a:9c:0c:05:02:41:17:9c:fe:de:1e:12:5d:13: ae:76:b9:c1:2b:b4:e5:9f:0b:43:45:37:95:25:03:dc: be:c1:26:b7:d2:ba:d0:8c:d2:da:ec:ac:eb:4c:a9:d8: fd:ea:c7:6c:bd:8b:cf:dd:90:ea:aa:e9:d1:9f:4c:26: f5:4a:cf:d6:6e:aa:67:e5:66 Fingerprint (SHA-256): 16:30:6C:94:F4:82:F2:6D:89:7C:CC:5C:6A:0E:9E:58:5E:69:FF:E6:2C:85:EE:AB:E8:08:27:78:D4:BF:95:38 Fingerprint (SHA1): 6F:2D:E2:D9:FC:7E:2E:B9:C8:FE:79:19:CA:22:40:28:90:C4:A6:1E Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Fri Jan 08 19:33:04 2016 Not After : Fri Jan 08 19:33:04 2021 Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:d7:4c:6f:f0:34:22:38:af:9a:ee:eb:0a:8f:ae:e6: dc:b0:12:86:1f:49:ff:1c:b3:a5:02:09:97:ea:be:b0: bd:6c:bc:00:72:fa:b1:14:a2:d6:36:ae:a1:ef:c7:ac: 0b:f3:9e:10:40:3f:0c:c9:2b:fc:14:07:28:2e:92:09: ac:8b:3b:8b:6d:ba:4e:b8:dc:05:04:96:eb:76:33:f1: 7a:c3:f0:44:02:7b:de:dc:ce:cc:0d:23:af:ac:cd:bf: ad Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:88:02:42:00:de:24:6b:f8:ad:61:bd:56:0a:fd: 28:79:5a:c1:64:f0:31:15:75:c9:9f:e9:14:8c:c1:c5: 99:0d:2c:cc:7b:e4:3e:20:c6:9b:8d:74:59:b5:66:21: fa:0c:66:70:1b:3b:d4:b2:13:b2:ca:4a:80:47:4d:93: c2:11:89:28:55:a9:87:02:42:01:dd:a7:46:3e:31:db: 41:5c:ac:e0:61:1c:7b:bd:cf:71:0c:cf:5a:ca:7e:2d: 05:c5:e0:78:bf:55:1f:71:7a:8b:40:6a:01:48:e0:8b: cb:19:36:4a:31:d5:1c:19:c7:0b:62:90:23:a4:63:8d: f6:ea:6a:92:b5:97:95:52:b9:f4:8a Fingerprint (SHA-256): B5:3B:DF:9D:AC:8F:E6:D9:8C:F3:64:AE:24:79:C5:3F:A2:74:E7:B9:4F:FB:AE:5F:E2:60:9E:48:89:A9:18:87 Fingerprint (SHA1): EC:69:50:EE:BC:D9:8C:3D:80:FE:D0:34:2E:34:0C:4F:8C:38:67:BC Friendly Name: Alice-ec tools.sh: #6631: Listing Alice's pk12 EC file (pk12util -l) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6632: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 50:70:cb:44:0d:52:00:4e:fc:54:5a:8f:6a:70:43:19 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6633: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6634: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6635: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 81:cf:aa:b4:d0:50:bd:77:7a:16:81:03:1b:fb:8a:41 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6636: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6637: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6638: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: d3:84:4d:e7:dc:2b:ed:0c:20:74:5a:1c:8b:c3:c3:6c Iteration Count: 2000 (0x7d0) tools.sh: #6639: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6640: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6641: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: aa:89:64:13:a5:a7:8f:08:ff:c9:05:9a:1e:53:f0:43 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6642: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6643: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6644: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c0:e7:29:da:c8:e2:37:8b:b1:b1:7a:8f:62:81:a2:9c Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6645: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6646: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6647: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e1:9a:22:da:f4:c3:da:6b:a2:f0:e4:1c:79:92:ab:78 Iteration Count: 2000 (0x7d0) tools.sh: #6648: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6649: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6650: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a7:43:c4:25:ec:c8:b8:00:22:1e:75:0d:0c:e7:87:4d Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:b9:3e:34:ae:aa:fe:ad:5c:f2:71:db:c4:b6:36: 84:b0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6651: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6652: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6653: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f0:19:5a:8c:6c:80:a4:b6:d8:36:fb:76:e0:6f:57:07 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:18:95:2b:f6:7e:0c:7b:1f:b3:6e:4e:ec:5d:3e: 72:1f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6654: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6655: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6656: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e6:05:3f:70:9b:0d:65:68:07:a4:ea:50:f6:1f:48:59 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:9a:60:37:5b:fe:e5:56:b4:ff:4a:ab:93:de:17: 8a:ea tools.sh: #6657: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6658: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6659: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 63:b7:c7:1a:80:fa:a2:87:22:3e:63:01:f5:51:af:40 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:59:38:d5:05:22:98:95:99:90:09:ce:c7:c9:c6: a5:92 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6660: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6661: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6662: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0a:ce:7c:5f:10:fa:63:76:50:af:49:46:2a:e3:fd:8a Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:de:92:24:27:0b:46:54:4f:20:8d:a3:32:0e:47: b3:f7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6663: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6664: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6665: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 57:2a:c8:4a:58:52:9b:97:08:e2:18:13:e9:cf:08:47 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:a0:7c:c0:dc:39:b0:b4:2b:43:73:97:0e:1c:3b: c1:ac tools.sh: #6666: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6667: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6668: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 5c:73:ed:f2:ae:d0:03:15:c1:45:12:56:4c:87:92:1a Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:cd:2f:ee:56:17:4f:c0:a0:94:8f:68:49:c5:e7: 31:b9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6669: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6670: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6671: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1c:21:74:ab:1d:74:a6:67:39:5c:e7:49:5b:ed:18:84 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:19:36:df:d4:e4:0d:4f:9e:02:4b:82:7b:33:be: 31:bb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6672: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6673: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6674: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 76:71:0a:75:bc:82:f2:0d:a0:68:d5:39:b2:08:e6:17 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:af:f8:d4:a6:2d:cc:0c:c2:51:b3:e5:b1:73:69: 2d:0e tools.sh: #6675: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6676: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6677: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 65:90:de:ef:7e:71:59:d4:26:d4:42:91:81:58:13:2c Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:8e:bf:1d:b9:89:30:d0:7a:d3:e2:d8:aa:64:96: fb:75 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6678: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6679: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6680: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 55:4a:7a:b4:7b:09:22:67:06:e9:3f:d1:75:2f:de:18 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:84:1b:bc:51:0a:38:b3:9d:32:00:27:10:23:01: 59:43 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6681: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6682: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6683: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 73:30:cd:90:40:df:9d:13:39:4e:32:9c:cb:fc:46:2d Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:92:bd:ac:62:f0:92:8e:95:31:9a:47:98:de:3e: 3a:29 tools.sh: #6684: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6685: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6686: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8a:d3:00:37:f3:ad:57:d0:c3:63:0c:93:ad:fc:49:1d Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:6a:0c:0b:88:1a:df:2a:40:cd:d3:20:5c:72:52: f0:bb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6687: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6688: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6689: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3e:58:dc:ae:77:35:15:fb:5a:51:2f:4f:9f:d2:ed:8f Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:45:8f:2e:07:7e:92:b5:10:24:12:a1:41:71:6a: b7:63 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6690: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6691: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6692: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e4:72:9f:14:d3:e4:57:2a:f5:36:ec:e0:90:42:bf:6d Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:b0:13:f0:88:51:f1:65:e5:17:9f:fb:b9:a6:9a: 0b:81 tools.sh: #6693: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6694: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6695: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 19:9d:3d:85:83:7c:b9:73:79:cd:c9:4c:78:e4:20:87 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:42:cc:36:fd:c3:59:d2:57:ae:86:cb:9c:9f:2e: f0:57 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6696: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6697: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6698: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 92:ba:6c:4f:c0:88:9f:bd:19:80:af:38:b1:f1:f7:fb Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:6c:50:ec:b8:24:e7:f9:8b:d2:97:6d:63:ed:a7: 4a:07 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6699: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6700: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6701: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 04:21:e9:32:d0:69:62:15:2f:76:bf:48:24:ff:db:39 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:e7:0e:f3:f3:2c:ca:18:89:9f:2c:0e:32:f1:fb: 55:5b tools.sh: #6702: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6703: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6704: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: ba:0a:d6:f5:bc:6f:5d:71:93:73:63:e0:07:7d:73:13 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6705: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6706: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6707: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: ca:b5:63:52:2c:d1:2a:b3:09:ca:91:85:f8:30:fa:db Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6708: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6709: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6710: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 62:69:64:52:c9:76:d4:6c:1f:db:6f:b4:e2:03:8a:c0 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6711: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6712: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6713: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 5f:a2:14:04:17:d2:4c:e1:25:4c:d7:5b:b2:e0:bc:4d Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6714: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6715: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6716: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 2c:81:f8:df:b6:5e:7c:16:7b:6a:b8:ca:5b:6f:e3:6a Iteration Count: 2000 (0x7d0) tools.sh: #6717: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6718: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6719: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: c2:7e:07:83:d3:fa:b4:bd:99:89:12:97:06:03:72:1e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6720: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6721: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6722: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: da:e5:0f:91:84:eb:df:2c:f4:5d:67:33:fd:c8:b3:12 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6723: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6724: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6725: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: f1:68:2d:20:4c:50:87:81:60:89:5c:09:4c:69:4f:20 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6726: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6727: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6728: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 3d:b1:78:09:46:3b:4c:d7:c1:0d:33:d3:7c:63:0f:d1 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6729: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6730: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6731: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: ba:97:a7:bd:f6:d3:75:28:e1:9f:17:5b:81:ff:37:45 Iteration Count: 2000 (0x7d0) tools.sh: #6732: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6733: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6734: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 6a:3a:8d:dc:5c:78:0d:72:f0:76:bc:e5:3d:3b:3e:4b Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6735: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6736: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6737: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: c1:25:cb:98:50:a4:f1:d1:5d:92:43:0e:b3:2a:5d:4a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6738: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6739: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6740: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: ce:c7:7b:39:66:44:07:c0:16:bc:9a:57:e5:15:41:54 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6741: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6742: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6743: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 6a:46:f9:e5:84:cb:90:86:6e:4c:d3:61:b9:b9:13:4c Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6744: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6745: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6746: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 8c:29:a9:e1:5d:fc:98:d5:e7:59:4e:43:2e:7e:ca:1e Iteration Count: 2000 (0x7d0) tools.sh: #6747: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6748: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6749: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e2:7a:94:75:2e:00:b6:d7:f6:d9:d6:67:7b:8e:a3:a1 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6750: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6751: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6752: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 54:61:23:7b:17:59:a4:56:08:1d:b6:e6:9f:fc:30:85 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6753: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6754: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6755: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4d:c0:cf:87:a9:08:72:27:77:56:0a:d0:85:0c:0d:f0 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6756: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6757: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6758: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 32:49:22:a5:06:23:a0:32:78:cf:c6:25:f8:3b:78:6f Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6759: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6760: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:null] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6761: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0d:94:ae:37:56:ee:9d:48:8d:7c:18:2d:93:08:d9:c7 Iteration Count: 2000 (0x7d0) tools.sh: #6762: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6763: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6764: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1f:80:79:98:11:77:18:9c:cd:f7:e2:50:aa:87:13:64 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6765: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6766: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6767: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 28:28:33:22:d4:68:82:6c:51:64:a2:56:49:b1:9c:a2 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6768: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6769: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6770: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 33:0a:5e:0e:c7:bf:42:87:30:c4:37:fb:94:75:00:dc Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6771: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6772: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6773: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3d:8b:da:df:f7:38:24:55:6a:cc:72:b4:3a:5c:20:ec Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6774: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6775: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6776: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 52:19:82:59:ff:e7:6f:ed:cf:3c:f8:62:7d:ef:be:84 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6777: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6778: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6779: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 00:29:0c:cd:17:7a:5f:af:40:de:ec:ff:34:e4:85:5f Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6780: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6781: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6782: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: bb:8f:e1:0a:d9:7d:d3:d0:57:3e:ed:8e:53:ad:04:22 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6783: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6784: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6785: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fa:62:39:3c:c0:1f:67:a0:90:53:4e:62:f4:0f:65:c2 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6786: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6787: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6788: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cd:88:86:d3:42:12:8e:e9:b5:6d:35:d3:b4:74:04:66 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6789: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6790: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6791: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5f:9f:77:80:d9:84:a5:39:1b:70:19:06:38:66:43:0c Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:29:34 2016 Not After : Fri Jan 08 19:29:34 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:08:4b:c4:81:d9:73:82:84:f2:b0:31:44:da:0d:d4: 3b:3a:63:4e:c9:39:20:08:9b:40:ed:48:97:d9:6a:71: 6d:a8:04:8c:6d:a5:18:8c:b3:59:93:d0:80:df:37:2d: 08:cc:2b:9b:b2:1f:f0:08:44:1f:d0:e0:c8:05:89:cc: 5e:c9:0e:3b:cf:3a:c5:bf:78:8b:1c:08:51:da:5d:46: a4:ee:f4:9d:bd:60:41:7f:39:9d:1f:be:dd:9a:76:12: b1:38:8a:43:c3:de:2a:d1:e0:25:35:59:71:e6:91:03: 75:26:4c:34:ae:4d:f6:6d:e7:87:5c:8a:6b:0c:ef:01: 69:ec:d0:af:f8:cf:3f:38:c5:47:5c:b5:69:ef:92:85: cd:ad:67:6a:ec:1a:d7:d2:96:69:52:7a:2a:cc:ff:6c: 7c:4f:49:83:67:be:04:29:80:14:64:73:b2:d3:92:14: 05:d6:e4:ae:ce:24:c9:ee:a0:47:6a:f2:2d:e0:5b:ee: 72:08:36:56:29:7d:b4:19:8f:cd:55:33:b9:19:16:68: 42:3d:5c:b6:65:46:55:b0:b5:d7:19:66:c5:e9:41:e2: 6e:7c:0a:09:32:f8:8a:e3:ca:e1:59:96:c0:1e:f9:18: 2b:ca:e9:f1:6c:ed:69:df:b7:c5:2a:2e:58:14:fa:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:32:88:72:05:da:85:00:55:c6:38:b9:32:02:59:a0: 8d:c7:e1:a5:1e:e6:9b:2c:92:dd:f8:05:e0:44:84:0e: c7:bf:07:0b:3f:ba:e3:c0:f0:24:45:6b:52:1e:f4:87: 2c:db:b7:98:c6:89:40:65:46:12:7b:b3:41:b3:80:7f: 90:16:6d:5f:7e:9e:93:30:e1:42:60:78:8b:38:e0:4f: c2:1f:80:1b:d6:81:ac:d1:17:ef:10:ad:17:26:d6:71: 2a:cf:44:1f:70:8e:17:cf:65:ff:2c:ab:e5:af:56:3c: 6d:e6:b0:6f:d7:c1:f8:85:8c:7f:1b:bd:04:ec:45:26: ea:b0:67:73:53:fc:79:47:79:5a:3d:89:ba:66:a8:db: 38:56:d7:b0:a5:1c:81:8a:de:9e:c7:cf:9d:db:22:74: fa:49:46:f8:b8:42:97:c1:e7:53:6b:20:72:cb:fc:4d: eb:c2:08:b1:ee:95:82:44:d5:3d:77:f6:07:3e:2e:a2: eb:d9:a6:71:fb:22:0c:22:29:10:af:4a:33:43:d8:c0: 59:01:2a:d8:bb:22:a2:4e:77:c6:c8:0e:4f:d1:b6:3f: f2:d5:c1:4f:62:b6:4e:90:b3:12:9b:10:1b:dd:c7:51: f3:5a:ad:2b:45:3e:1a:52:06:64:e8:d3:0a:23:a5:44 Fingerprint (SHA-256): 83:3A:90:81:7C:2B:5A:3C:33:81:DE:45:73:37:09:F3:58:74:10:27:5A:39:AD:44:04:B1:0B:D0:47:C0:34:35 Fingerprint (SHA1): 67:26:EA:52:01:62:45:6B:73:94:52:EF:9A:3C:68:61:4D:19:6A:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 19:32:59 2016 Not After : Fri Jan 08 19:32:59 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:35:b1:e8:2e:ef:f9:bb:2d:b1:0f:b4:c1:7f:f1: 2d:8c:0e:a8:95:c9:5a:1d:c7:30:6b:8c:15:ed:dd:ea: e5:bb:ae:64:6d:48:62:b5:70:f6:65:ec:97:e1:52:37: 3a:4f:48:9d:64:88:a0:a3:57:eb:ea:b8:b8:9a:74:08: 3b:e6:8b:22:bf:f4:59:04:ba:c9:96:3e:0e:3e:50:5b: 95:e8:09:8a:9f:9a:57:27:bd:9d:bd:63:22:db:85:ba: 47:de:d7:ba:ab:62:20:cc:9d:9c:95:23:d9:8f:2e:3d: 15:a1:2d:f2:ff:c3:10:94:19:ab:64:b8:3f:26:76:e3: 2f:3c:28:a5:65:9b:2c:bf:dc:5e:dd:d4:e9:66:24:24: 9f:e2:8e:08:97:df:f6:72:98:00:72:b8:b0:e2:b6:34: 31:f2:57:a0:6f:d7:2b:4f:71:92:c1:2a:80:29:19:58: 0c:ba:8d:8c:fd:de:20:fb:44:3d:84:cd:58:34:77:19: 79:08:e4:a6:4e:fa:6d:8a:d2:75:cc:9c:8b:8c:76:44: 25:77:70:40:c1:07:d7:c1:02:55:c5:0f:c4:53:12:00: 2e:a4:48:8e:f8:b3:e8:c8:c5:08:ee:67:48:fe:50:cb: a7:d9:68:6d:00:58:d5:7d:1d:42:4b:ff:b8:06:de:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:bd:50:d9:2e:51:66:db:48:37:ef:96:4c:b4:41:51: 42:65:ba:e4:ab:6e:23:b0:a1:ff:84:dd:a7:56:a0:2f: f5:0b:13:89:79:0d:17:1b:eb:0d:48:17:b7:2a:47:3b: 9f:2f:f6:05:38:59:3b:7f:90:93:5c:85:1c:94:09:16: e3:05:9f:ff:f2:b9:47:49:27:23:e8:c1:5c:cb:82:76: 96:cd:43:89:37:fb:ab:34:9c:89:9b:46:24:b9:f0:c3: c2:77:9c:ff:54:a0:a8:a6:62:e7:95:62:88:93:19:94: 3e:a0:f6:60:3a:9a:d5:f9:2f:57:6b:86:36:fb:45:16: 2e:73:54:0d:d4:ee:91:72:5b:cf:07:51:cc:c6:21:c5: d4:fd:99:bc:a2:21:9d:39:ee:02:4b:2c:8e:99:7b:09: 70:2d:ab:02:9e:39:7d:32:08:4b:92:c0:34:20:fd:25: 02:43:24:b4:cd:e9:d6:08:de:34:d4:4b:14:10:68:0c: c6:5e:8a:aa:b9:03:46:53:07:0e:84:5e:14:0f:fd:08: 02:99:c9:25:1a:17:b8:87:bf:fe:1c:bb:3f:fe:d8:a5: 6f:45:70:68:61:4d:4d:3a:bc:a1:bc:2e:4e:71:42:f8: 67:5f:80:08:1f:ca:4f:b7:b0:6a:9c:c6:09:a2:81:fa Fingerprint (SHA-256): 81:35:4E:97:78:84:3C:61:FE:4B:E0:73:8D:94:EB:6C:79:FC:59:CB:AF:B0:EA:5B:5E:07:4B:68:E6:E3:98:47 Fingerprint (SHA1): 3A:AA:50:D4:3E:9B:2E:A9:F5:04:46:84:1F:72:EC:F2:8B:32:1A:3A Friendly Name: Alice tools.sh: #6792: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6793: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c null pk12util: Algorithm: "null": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #6794: Exporting with [null:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6795: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #6796: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%) tree "../tools/html" signed successfully tools.sh: #6797: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #6798: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #6799: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html --> signjs.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 33%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #6800: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #6801: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #6802: Show who signed xpi (signtool -w) - PASSED TIMESTAMP tools END: Fri Jan 8 14:44:58 EST 2016 Running tests for fips TIMESTAMP fips BEGIN: Fri Jan 8 14:44:58 EST 2016 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. fips.sh: #6803: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #6804: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa fd4e5a1a0476fba3de36b0df023e20f1cb383e38 NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #6805: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #6806: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #6807: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #6808: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #6809: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #6810: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #6811: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #6812: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #6813: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #6814: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #6815: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa fd4e5a1a0476fba3de36b0df023e20f1cb383e38 FIPS_PUB_140_Test_Certificate fips.sh: #6816: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #6817: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #6818: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #6819: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #6820: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa fd4e5a1a0476fba3de36b0df023e20f1cb383e38 FIPS_PUB_140_Test_Certificate fips.sh: #6821: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 106. **** **** ALL TESTS PASSED **** fips.sh: #6822: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 104. **** **** ALL TESTS PASSED **** fips.sh: #6823: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle/libsoftokn3.so -o -8 -b 5 cp /usr/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle Changing byte 0x00032fe4 (208868): from 01 (1) to 21 (33) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/fips/mangle dbtest -r -d ../fips fips.sh: #6824: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Fri Jan 8 14:45:44 EST 2016 Running tests for ssl TIMESTAMP ssl BEGIN: Fri Jan 8 14:45:44 EST 2016 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 14:45:44 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:45:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:45:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6825: Waiting for Server - FAILED kill -0 2736 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2736 found at Fri Jan 8 14:45:50 EST 2016 selfserv_9159 with PID 2736 started at Fri Jan 8 14:45:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6826: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 2736 at Fri Jan 8 14:45:50 EST 2016 kill -USR1 2736 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2736 killed at Fri Jan 8 14:45:51 EST 2016 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 14:45:51 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:45:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:45:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6827: Waiting for Server - FAILED kill -0 2806 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2806 found at Fri Jan 8 14:45:57 EST 2016 selfserv_9159 with PID 2806 started at Fri Jan 8 14:45:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6828: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 2806 at Fri Jan 8 14:45:57 EST 2016 kill -USR1 2806 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2806 killed at Fri Jan 8 14:45:58 EST 2016 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 14:45:58 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:45:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:46:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6829: Waiting for Server - FAILED kill -0 2874 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2874 found at Fri Jan 8 14:46:04 EST 2016 selfserv_9159 with PID 2874 started at Fri Jan 8 14:46:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6830: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 2874 at Fri Jan 8 14:46:04 EST 2016 kill -USR1 2874 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2874 killed at Fri Jan 8 14:46:05 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:46:05 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:46:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:46:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6831: Waiting for Server - FAILED kill -0 2954 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2954 found at Fri Jan 8 14:46:11 EST 2016 selfserv_9159 with PID 2954 started at Fri Jan 8 14:46:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6832: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 2954 at Fri Jan 8 14:46:11 EST 2016 kill -USR1 2954 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2954 killed at Fri Jan 8 14:46:12 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:46:12 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:46:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:46:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6833: Waiting for Server - FAILED kill -0 3023 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3023 found at Fri Jan 8 14:46:18 EST 2016 selfserv_9159 with PID 3023 started at Fri Jan 8 14:46:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6834: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 3023 at Fri Jan 8 14:46:18 EST 2016 kill -USR1 3023 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3023 killed at Fri Jan 8 14:46:18 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:46:18 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:46:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:46:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6835: Waiting for Server - FAILED kill -0 3091 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3091 found at Fri Jan 8 14:46:24 EST 2016 selfserv_9159 with PID 3091 started at Fri Jan 8 14:46:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6836: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 3091 at Fri Jan 8 14:46:25 EST 2016 kill -USR1 3091 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3091 killed at Fri Jan 8 14:46:25 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:46:25 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:46:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:46:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6837: Waiting for Server - FAILED kill -0 3171 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3171 found at Fri Jan 8 14:46:31 EST 2016 selfserv_9159 with PID 3171 started at Fri Jan 8 14:46:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6838: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 3171 at Fri Jan 8 14:46:32 EST 2016 kill -USR1 3171 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3171 killed at Fri Jan 8 14:46:32 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:46:32 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:46:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:46:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6839: Waiting for Server - FAILED kill -0 3240 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3240 found at Fri Jan 8 14:46:38 EST 2016 selfserv_9159 with PID 3240 started at Fri Jan 8 14:46:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6840: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 3240 at Fri Jan 8 14:46:39 EST 2016 kill -USR1 3240 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3240 killed at Fri Jan 8 14:46:39 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:46:39 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:46:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:46:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6841: Waiting for Server - FAILED kill -0 3308 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3308 found at Fri Jan 8 14:46:45 EST 2016 selfserv_9159 with PID 3308 started at Fri Jan 8 14:46:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6842: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 3308 at Fri Jan 8 14:46:46 EST 2016 kill -USR1 3308 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3308 killed at Fri Jan 8 14:46:46 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 14:46:46 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:46:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:46:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6843: Waiting for Server - FAILED kill -0 3388 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3388 found at Fri Jan 8 14:46:52 EST 2016 selfserv_9159 with PID 3388 started at Fri Jan 8 14:46:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6844: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 3388 at Fri Jan 8 14:46:53 EST 2016 kill -USR1 3388 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3388 killed at Fri Jan 8 14:46:53 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 14:46:53 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:46:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:46:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6845: Waiting for Server - FAILED kill -0 3457 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3457 found at Fri Jan 8 14:46:59 EST 2016 selfserv_9159 with PID 3457 started at Fri Jan 8 14:46:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6846: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 3457 at Fri Jan 8 14:46:59 EST 2016 kill -USR1 3457 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3457 killed at Fri Jan 8 14:47:00 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 14:47:00 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:47:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:47:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6847: Waiting for Server - FAILED kill -0 3525 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3525 found at Fri Jan 8 14:47:06 EST 2016 selfserv_9159 with PID 3525 started at Fri Jan 8 14:47:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6848: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 3525 at Fri Jan 8 14:47:06 EST 2016 kill -USR1 3525 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3525 killed at Fri Jan 8 14:47:07 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:47:07 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:47:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:47:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6849: Waiting for Server - FAILED kill -0 3605 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3605 found at Fri Jan 8 14:47:13 EST 2016 selfserv_9159 with PID 3605 started at Fri Jan 8 14:47:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6850: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 3605 at Fri Jan 8 14:47:13 EST 2016 kill -USR1 3605 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3605 killed at Fri Jan 8 14:47:14 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:47:14 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:47:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:47:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6851: Waiting for Server - FAILED kill -0 3674 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3674 found at Fri Jan 8 14:47:20 EST 2016 selfserv_9159 with PID 3674 started at Fri Jan 8 14:47:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6852: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 3674 at Fri Jan 8 14:47:20 EST 2016 kill -USR1 3674 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3674 killed at Fri Jan 8 14:47:21 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:47:21 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:47:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:47:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6853: Waiting for Server - FAILED kill -0 3742 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3742 found at Fri Jan 8 14:47:27 EST 2016 selfserv_9159 with PID 3742 started at Fri Jan 8 14:47:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6854: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 3742 at Fri Jan 8 14:47:27 EST 2016 kill -USR1 3742 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3742 killed at Fri Jan 8 14:47:28 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:47:28 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:47:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:47:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6855: Waiting for Server - FAILED kill -0 3822 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3822 found at Fri Jan 8 14:47:34 EST 2016 selfserv_9159 with PID 3822 started at Fri Jan 8 14:47:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6856: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 3822 at Fri Jan 8 14:47:34 EST 2016 kill -USR1 3822 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3822 killed at Fri Jan 8 14:47:34 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:47:35 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:47:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:47:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6857: Waiting for Server - FAILED kill -0 3892 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3892 found at Fri Jan 8 14:47:40 EST 2016 selfserv_9159 with PID 3892 started at Fri Jan 8 14:47:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6858: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 3892 at Fri Jan 8 14:47:41 EST 2016 kill -USR1 3892 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3892 killed at Fri Jan 8 14:47:41 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:47:41 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:47:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:47:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6859: Waiting for Server - FAILED kill -0 3960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3960 found at Fri Jan 8 14:47:47 EST 2016 selfserv_9159 with PID 3960 started at Fri Jan 8 14:47:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6860: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 3960 at Fri Jan 8 14:47:48 EST 2016 kill -USR1 3960 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3960 killed at Fri Jan 8 14:47:48 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 14:47:48 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:47:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:47:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6861: Waiting for Server - FAILED kill -0 4041 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4041 found at Fri Jan 8 14:47:54 EST 2016 selfserv_9159 with PID 4041 started at Fri Jan 8 14:47:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6862: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4041 at Fri Jan 8 14:47:55 EST 2016 kill -USR1 4041 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4041 killed at Fri Jan 8 14:47:55 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 14:47:55 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:47:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:48:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6863: Waiting for Server - FAILED kill -0 4110 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4110 found at Fri Jan 8 14:48:01 EST 2016 selfserv_9159 with PID 4110 started at Fri Jan 8 14:48:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6864: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4110 at Fri Jan 8 14:48:02 EST 2016 kill -USR1 4110 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4110 killed at Fri Jan 8 14:48:02 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 14:48:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:48:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:48:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6865: Waiting for Server - FAILED kill -0 4178 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4178 found at Fri Jan 8 14:48:08 EST 2016 selfserv_9159 with PID 4178 started at Fri Jan 8 14:48:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6866: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4178 at Fri Jan 8 14:48:09 EST 2016 kill -USR1 4178 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4178 killed at Fri Jan 8 14:48:09 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:48:09 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:48:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:48:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6867: Waiting for Server - FAILED kill -0 4258 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4258 found at Fri Jan 8 14:48:15 EST 2016 selfserv_9159 with PID 4258 started at Fri Jan 8 14:48:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6868: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4258 at Fri Jan 8 14:48:15 EST 2016 kill -USR1 4258 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4258 killed at Fri Jan 8 14:48:16 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:48:16 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:48:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:48:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6869: Waiting for Server - FAILED kill -0 4327 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4327 found at Fri Jan 8 14:48:22 EST 2016 selfserv_9159 with PID 4327 started at Fri Jan 8 14:48:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6870: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4327 at Fri Jan 8 14:48:22 EST 2016 kill -USR1 4327 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4327 killed at Fri Jan 8 14:48:23 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:48:23 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:48:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:48:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6871: Waiting for Server - FAILED kill -0 4396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4396 found at Fri Jan 8 14:48:29 EST 2016 selfserv_9159 with PID 4396 started at Fri Jan 8 14:48:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6872: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4396 at Fri Jan 8 14:48:29 EST 2016 kill -USR1 4396 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4396 killed at Fri Jan 8 14:48:30 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:48:30 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:48:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:48:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6873: Waiting for Server - FAILED kill -0 4476 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4476 found at Fri Jan 8 14:48:36 EST 2016 selfserv_9159 with PID 4476 started at Fri Jan 8 14:48:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6874: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 4476 at Fri Jan 8 14:48:36 EST 2016 kill -USR1 4476 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4476 killed at Fri Jan 8 14:48:37 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:48:37 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:48:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:48:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6875: Waiting for Server - FAILED kill -0 4545 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4545 found at Fri Jan 8 14:48:43 EST 2016 selfserv_9159 with PID 4545 started at Fri Jan 8 14:48:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6876: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4545 at Fri Jan 8 14:48:43 EST 2016 kill -USR1 4545 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4545 killed at Fri Jan 8 14:48:43 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:48:44 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:48:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:48:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6877: Waiting for Server - FAILED kill -0 4614 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4614 found at Fri Jan 8 14:48:49 EST 2016 selfserv_9159 with PID 4614 started at Fri Jan 8 14:48:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6878: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 4614 at Fri Jan 8 14:48:50 EST 2016 kill -USR1 4614 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4614 killed at Fri Jan 8 14:48:50 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 14:48:50 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:48:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:48:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6879: Waiting for Server - FAILED kill -0 4694 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4694 found at Fri Jan 8 14:48:56 EST 2016 selfserv_9159 with PID 4694 started at Fri Jan 8 14:48:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6880: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 4694 at Fri Jan 8 14:48:57 EST 2016 kill -USR1 4694 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4694 killed at Fri Jan 8 14:48:57 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 14:48:57 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:48:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:49:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6881: Waiting for Server - FAILED kill -0 4763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4763 found at Fri Jan 8 14:49:03 EST 2016 selfserv_9159 with PID 4763 started at Fri Jan 8 14:49:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6882: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 4763 at Fri Jan 8 14:49:04 EST 2016 kill -USR1 4763 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4763 killed at Fri Jan 8 14:49:04 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 14:49:04 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:49:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:49:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6883: Waiting for Server - FAILED kill -0 4831 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4831 found at Fri Jan 8 14:49:10 EST 2016 selfserv_9159 with PID 4831 started at Fri Jan 8 14:49:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6884: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 4831 at Fri Jan 8 14:49:11 EST 2016 kill -USR1 4831 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4831 killed at Fri Jan 8 14:49:11 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:49:11 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:49:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:49:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6885: Waiting for Server - FAILED kill -0 4911 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4911 found at Fri Jan 8 14:49:17 EST 2016 selfserv_9159 with PID 4911 started at Fri Jan 8 14:49:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6886: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 4911 at Fri Jan 8 14:49:18 EST 2016 kill -USR1 4911 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4911 killed at Fri Jan 8 14:49:18 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:49:18 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:49:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:49:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6887: Waiting for Server - FAILED kill -0 4980 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4980 found at Fri Jan 8 14:49:24 EST 2016 selfserv_9159 with PID 4980 started at Fri Jan 8 14:49:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6888: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 4980 at Fri Jan 8 14:49:25 EST 2016 kill -USR1 4980 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4980 killed at Fri Jan 8 14:49:25 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:49:25 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:49:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:49:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6889: Waiting for Server - FAILED kill -0 5048 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5048 found at Fri Jan 8 14:49:31 EST 2016 selfserv_9159 with PID 5048 started at Fri Jan 8 14:49:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6890: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 5048 at Fri Jan 8 14:49:31 EST 2016 kill -USR1 5048 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5048 killed at Fri Jan 8 14:49:32 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:49:32 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:49:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:49:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6891: Waiting for Server - FAILED kill -0 5128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5128 found at Fri Jan 8 14:49:38 EST 2016 selfserv_9159 with PID 5128 started at Fri Jan 8 14:49:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6892: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 5128 at Fri Jan 8 14:49:38 EST 2016 kill -USR1 5128 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5128 killed at Fri Jan 8 14:49:39 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:49:39 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:49:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:49:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6893: Waiting for Server - FAILED kill -0 5197 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5197 found at Fri Jan 8 14:49:45 EST 2016 selfserv_9159 with PID 5197 started at Fri Jan 8 14:49:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6894: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 5197 at Fri Jan 8 14:49:45 EST 2016 kill -USR1 5197 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5197 killed at Fri Jan 8 14:49:46 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:49:46 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:49:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:49:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6895: Waiting for Server - FAILED kill -0 5265 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5265 found at Fri Jan 8 14:49:52 EST 2016 selfserv_9159 with PID 5265 started at Fri Jan 8 14:49:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6896: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 5265 at Fri Jan 8 14:49:52 EST 2016 kill -USR1 5265 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5265 killed at Fri Jan 8 14:49:53 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 14:49:53 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:49:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:49:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6897: Waiting for Server - FAILED kill -0 5345 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5345 found at Fri Jan 8 14:49:59 EST 2016 selfserv_9159 with PID 5345 started at Fri Jan 8 14:49:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6898: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 5345 at Fri Jan 8 14:49:59 EST 2016 kill -USR1 5345 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5345 killed at Fri Jan 8 14:49:59 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 14:50:00 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:50:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:50:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6899: Waiting for Server - FAILED kill -0 5414 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5414 found at Fri Jan 8 14:50:05 EST 2016 selfserv_9159 with PID 5414 started at Fri Jan 8 14:50:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6900: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 5414 at Fri Jan 8 14:50:06 EST 2016 kill -USR1 5414 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5414 killed at Fri Jan 8 14:50:06 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 14:50:06 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:50:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:50:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6901: Waiting for Server - FAILED kill -0 5482 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5482 found at Fri Jan 8 14:50:12 EST 2016 selfserv_9159 with PID 5482 started at Fri Jan 8 14:50:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6902: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 5482 at Fri Jan 8 14:50:13 EST 2016 kill -USR1 5482 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5482 killed at Fri Jan 8 14:50:13 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:50:13 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:50:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:50:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6903: Waiting for Server - FAILED kill -0 5562 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5562 found at Fri Jan 8 14:50:19 EST 2016 selfserv_9159 with PID 5562 started at Fri Jan 8 14:50:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6904: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 5562 at Fri Jan 8 14:50:20 EST 2016 kill -USR1 5562 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5562 killed at Fri Jan 8 14:50:20 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:50:20 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:50:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:50:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6905: Waiting for Server - FAILED kill -0 5631 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5631 found at Fri Jan 8 14:50:26 EST 2016 selfserv_9159 with PID 5631 started at Fri Jan 8 14:50:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6906: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 5631 at Fri Jan 8 14:50:27 EST 2016 kill -USR1 5631 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5631 killed at Fri Jan 8 14:50:27 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:50:27 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:50:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:50:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6907: Waiting for Server - FAILED kill -0 5699 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5699 found at Fri Jan 8 14:50:33 EST 2016 selfserv_9159 with PID 5699 started at Fri Jan 8 14:50:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6908: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 5699 at Fri Jan 8 14:50:34 EST 2016 kill -USR1 5699 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5699 killed at Fri Jan 8 14:50:34 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:50:34 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:50:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:50:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6909: Waiting for Server - FAILED kill -0 5779 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5779 found at Fri Jan 8 14:50:40 EST 2016 selfserv_9159 with PID 5779 started at Fri Jan 8 14:50:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6910: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 5779 at Fri Jan 8 14:50:40 EST 2016 kill -USR1 5779 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5779 killed at Fri Jan 8 14:50:41 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:50:41 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:50:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:50:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6911: Waiting for Server - FAILED kill -0 5848 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5848 found at Fri Jan 8 14:50:47 EST 2016 selfserv_9159 with PID 5848 started at Fri Jan 8 14:50:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6912: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 5848 at Fri Jan 8 14:50:47 EST 2016 kill -USR1 5848 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5848 killed at Fri Jan 8 14:50:48 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:50:48 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:50:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:50:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6913: Waiting for Server - FAILED kill -0 5916 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5916 found at Fri Jan 8 14:50:54 EST 2016 selfserv_9159 with PID 5916 started at Fri Jan 8 14:50:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6914: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 5916 at Fri Jan 8 14:50:54 EST 2016 kill -USR1 5916 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5916 killed at Fri Jan 8 14:50:55 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 14:50:55 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:50:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:51:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6915: Waiting for Server - FAILED kill -0 5996 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5996 found at Fri Jan 8 14:51:01 EST 2016 selfserv_9159 with PID 5996 started at Fri Jan 8 14:51:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6916: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 5996 at Fri Jan 8 14:51:01 EST 2016 kill -USR1 5996 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5996 killed at Fri Jan 8 14:51:02 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 14:51:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:51:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:51:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6917: Waiting for Server - FAILED kill -0 6065 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6065 found at Fri Jan 8 14:51:08 EST 2016 selfserv_9159 with PID 6065 started at Fri Jan 8 14:51:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6918: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 6065 at Fri Jan 8 14:51:08 EST 2016 kill -USR1 6065 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6065 killed at Fri Jan 8 14:51:08 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 14:51:09 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:51:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:51:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6919: Waiting for Server - FAILED kill -0 6133 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6133 found at Fri Jan 8 14:51:14 EST 2016 selfserv_9159 with PID 6133 started at Fri Jan 8 14:51:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6920: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 6133 at Fri Jan 8 14:51:15 EST 2016 kill -USR1 6133 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6133 killed at Fri Jan 8 14:51:15 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:51:15 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:51:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:51:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6921: Waiting for Server - FAILED kill -0 6213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6213 found at Fri Jan 8 14:51:21 EST 2016 selfserv_9159 with PID 6213 started at Fri Jan 8 14:51:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6922: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 6213 at Fri Jan 8 14:51:22 EST 2016 kill -USR1 6213 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6213 killed at Fri Jan 8 14:51:22 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:51:22 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:51:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:51:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6923: Waiting for Server - FAILED kill -0 6282 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6282 found at Fri Jan 8 14:51:28 EST 2016 selfserv_9159 with PID 6282 started at Fri Jan 8 14:51:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6924: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 6282 at Fri Jan 8 14:51:29 EST 2016 kill -USR1 6282 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6282 killed at Fri Jan 8 14:51:29 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:51:29 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:51:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:51:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6925: Waiting for Server - FAILED kill -0 6350 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6350 found at Fri Jan 8 14:51:35 EST 2016 selfserv_9159 with PID 6350 started at Fri Jan 8 14:51:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6926: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 6350 at Fri Jan 8 14:51:36 EST 2016 kill -USR1 6350 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6350 killed at Fri Jan 8 14:51:36 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:51:36 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:51:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:51:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6927: Waiting for Server - FAILED kill -0 6431 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6431 found at Fri Jan 8 14:51:42 EST 2016 selfserv_9159 with PID 6431 started at Fri Jan 8 14:51:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6928: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 6431 at Fri Jan 8 14:51:43 EST 2016 kill -USR1 6431 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6431 killed at Fri Jan 8 14:51:43 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:51:43 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:51:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:51:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6929: Waiting for Server - FAILED kill -0 6500 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6500 found at Fri Jan 8 14:51:49 EST 2016 selfserv_9159 with PID 6500 started at Fri Jan 8 14:51:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6930: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 6500 at Fri Jan 8 14:51:49 EST 2016 kill -USR1 6500 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6500 killed at Fri Jan 8 14:51:50 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:51:50 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:51:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:51:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6931: Waiting for Server - FAILED kill -0 6568 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6568 found at Fri Jan 8 14:51:56 EST 2016 selfserv_9159 with PID 6568 started at Fri Jan 8 14:51:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6932: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 6568 at Fri Jan 8 14:51:56 EST 2016 kill -USR1 6568 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6568 killed at Fri Jan 8 14:51:57 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 14:51:57 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:51:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:52:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6933: Waiting for Server - FAILED kill -0 6648 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6648 found at Fri Jan 8 14:52:03 EST 2016 selfserv_9159 with PID 6648 started at Fri Jan 8 14:52:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6934: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 6648 at Fri Jan 8 14:52:03 EST 2016 kill -USR1 6648 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6648 killed at Fri Jan 8 14:52:04 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 14:52:04 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:52:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:52:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6935: Waiting for Server - FAILED kill -0 6717 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6717 found at Fri Jan 8 14:52:10 EST 2016 selfserv_9159 with PID 6717 started at Fri Jan 8 14:52:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6936: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 6717 at Fri Jan 8 14:52:10 EST 2016 kill -USR1 6717 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6717 killed at Fri Jan 8 14:52:11 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 14:52:11 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:52:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:52:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6937: Waiting for Server - FAILED kill -0 6785 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6785 found at Fri Jan 8 14:52:17 EST 2016 selfserv_9159 with PID 6785 started at Fri Jan 8 14:52:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6938: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 6785 at Fri Jan 8 14:52:17 EST 2016 kill -USR1 6785 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6785 killed at Fri Jan 8 14:52:18 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:52:18 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:52:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:52:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6939: Waiting for Server - FAILED kill -0 6865 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6865 found at Fri Jan 8 14:52:24 EST 2016 selfserv_9159 with PID 6865 started at Fri Jan 8 14:52:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6940: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 6865 at Fri Jan 8 14:52:24 EST 2016 kill -USR1 6865 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6865 killed at Fri Jan 8 14:52:24 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:52:25 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:52:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:52:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6941: Waiting for Server - FAILED kill -0 6934 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6934 found at Fri Jan 8 14:52:30 EST 2016 selfserv_9159 with PID 6934 started at Fri Jan 8 14:52:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6942: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 6934 at Fri Jan 8 14:52:31 EST 2016 kill -USR1 6934 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6934 killed at Fri Jan 8 14:52:31 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:52:31 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:52:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:52:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6943: Waiting for Server - FAILED kill -0 7002 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7002 found at Fri Jan 8 14:52:37 EST 2016 selfserv_9159 with PID 7002 started at Fri Jan 8 14:52:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6944: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 7002 at Fri Jan 8 14:52:38 EST 2016 kill -USR1 7002 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7002 killed at Fri Jan 8 14:52:38 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:52:38 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:52:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:52:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6945: Waiting for Server - FAILED kill -0 7083 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7083 found at Fri Jan 8 14:52:44 EST 2016 selfserv_9159 with PID 7083 started at Fri Jan 8 14:52:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6946: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 7083 at Fri Jan 8 14:52:45 EST 2016 kill -USR1 7083 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7083 killed at Fri Jan 8 14:52:45 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:52:45 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:52:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:52:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6947: Waiting for Server - FAILED kill -0 7151 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7151 found at Fri Jan 8 14:52:51 EST 2016 selfserv_9159 with PID 7151 started at Fri Jan 8 14:52:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6948: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 7151 at Fri Jan 8 14:52:52 EST 2016 kill -USR1 7151 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7151 killed at Fri Jan 8 14:52:52 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:52:52 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:52:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:52:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6949: Waiting for Server - FAILED kill -0 7219 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7219 found at Fri Jan 8 14:52:58 EST 2016 selfserv_9159 with PID 7219 started at Fri Jan 8 14:52:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6950: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 7219 at Fri Jan 8 14:52:59 EST 2016 kill -USR1 7219 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7219 killed at Fri Jan 8 14:52:59 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 14:52:59 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:52:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:53:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6951: Waiting for Server - FAILED kill -0 7300 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7300 found at Fri Jan 8 14:53:05 EST 2016 selfserv_9159 with PID 7300 started at Fri Jan 8 14:53:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6952: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 7300 at Fri Jan 8 14:53:05 EST 2016 kill -USR1 7300 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7300 killed at Fri Jan 8 14:53:06 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 14:53:06 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:53:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:53:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6953: Waiting for Server - FAILED kill -0 7368 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7368 found at Fri Jan 8 14:53:12 EST 2016 selfserv_9159 with PID 7368 started at Fri Jan 8 14:53:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6954: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 7368 at Fri Jan 8 14:53:12 EST 2016 kill -USR1 7368 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7368 killed at Fri Jan 8 14:53:13 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 14:53:13 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:53:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:53:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6955: Waiting for Server - FAILED kill -0 7436 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7436 found at Fri Jan 8 14:53:19 EST 2016 selfserv_9159 with PID 7436 started at Fri Jan 8 14:53:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6956: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 7436 at Fri Jan 8 14:53:19 EST 2016 kill -USR1 7436 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7436 killed at Fri Jan 8 14:53:20 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:53:20 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:53:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:53:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6957: Waiting for Server - FAILED kill -0 7517 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7517 found at Fri Jan 8 14:53:26 EST 2016 selfserv_9159 with PID 7517 started at Fri Jan 8 14:53:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6958: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 7517 at Fri Jan 8 14:53:26 EST 2016 kill -USR1 7517 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7517 killed at Fri Jan 8 14:53:27 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:53:27 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:53:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:53:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6959: Waiting for Server - FAILED kill -0 7585 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7585 found at Fri Jan 8 14:53:33 EST 2016 selfserv_9159 with PID 7585 started at Fri Jan 8 14:53:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6960: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 7585 at Fri Jan 8 14:53:33 EST 2016 kill -USR1 7585 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7585 killed at Fri Jan 8 14:53:33 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:53:34 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:53:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:53:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6961: Waiting for Server - FAILED kill -0 7653 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7653 found at Fri Jan 8 14:53:39 EST 2016 selfserv_9159 with PID 7653 started at Fri Jan 8 14:53:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6962: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 7653 at Fri Jan 8 14:53:40 EST 2016 kill -USR1 7653 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7653 killed at Fri Jan 8 14:53:40 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:53:40 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:53:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:53:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6963: Waiting for Server - FAILED kill -0 7734 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7734 found at Fri Jan 8 14:53:46 EST 2016 selfserv_9159 with PID 7734 started at Fri Jan 8 14:53:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6964: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 7734 at Fri Jan 8 14:53:47 EST 2016 kill -USR1 7734 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7734 killed at Fri Jan 8 14:53:47 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:53:47 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:53:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:53:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6965: Waiting for Server - FAILED kill -0 7802 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7802 found at Fri Jan 8 14:53:53 EST 2016 selfserv_9159 with PID 7802 started at Fri Jan 8 14:53:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6966: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 7802 at Fri Jan 8 14:53:54 EST 2016 kill -USR1 7802 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7802 killed at Fri Jan 8 14:53:54 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:53:54 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:53:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:54:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6967: Waiting for Server - FAILED kill -0 7870 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7870 found at Fri Jan 8 14:54:00 EST 2016 selfserv_9159 with PID 7870 started at Fri Jan 8 14:54:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6968: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 7870 at Fri Jan 8 14:54:01 EST 2016 kill -USR1 7870 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7870 killed at Fri Jan 8 14:54:01 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 14:54:01 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:54:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:54:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6969: Waiting for Server - FAILED kill -0 7951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7951 found at Fri Jan 8 14:54:07 EST 2016 selfserv_9159 with PID 7951 started at Fri Jan 8 14:54:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6970: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 7951 at Fri Jan 8 14:54:08 EST 2016 kill -USR1 7951 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7951 killed at Fri Jan 8 14:54:08 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 14:54:08 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:54:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:54:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6971: Waiting for Server - FAILED kill -0 8019 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8019 found at Fri Jan 8 14:54:14 EST 2016 selfserv_9159 with PID 8019 started at Fri Jan 8 14:54:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6972: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 8019 at Fri Jan 8 14:54:14 EST 2016 kill -USR1 8019 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8019 killed at Fri Jan 8 14:54:15 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 14:54:15 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:54:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:54:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6973: Waiting for Server - FAILED kill -0 8087 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8087 found at Fri Jan 8 14:54:21 EST 2016 selfserv_9159 with PID 8087 started at Fri Jan 8 14:54:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6974: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 8087 at Fri Jan 8 14:54:21 EST 2016 kill -USR1 8087 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8087 killed at Fri Jan 8 14:54:22 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:54:22 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:54:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:54:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6975: Waiting for Server - FAILED kill -0 8168 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8168 found at Fri Jan 8 14:54:28 EST 2016 selfserv_9159 with PID 8168 started at Fri Jan 8 14:54:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6976: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 8168 at Fri Jan 8 14:54:28 EST 2016 kill -USR1 8168 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8168 killed at Fri Jan 8 14:54:29 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:54:29 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:54:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:54:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6977: Waiting for Server - FAILED kill -0 8236 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8236 found at Fri Jan 8 14:54:35 EST 2016 selfserv_9159 with PID 8236 started at Fri Jan 8 14:54:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6978: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 8236 at Fri Jan 8 14:54:35 EST 2016 kill -USR1 8236 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8236 killed at Fri Jan 8 14:54:36 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:54:36 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:54:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:54:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6979: Waiting for Server - FAILED kill -0 8304 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8304 found at Fri Jan 8 14:54:42 EST 2016 selfserv_9159 with PID 8304 started at Fri Jan 8 14:54:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6980: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 8304 at Fri Jan 8 14:54:42 EST 2016 kill -USR1 8304 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8304 killed at Fri Jan 8 14:54:42 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:54:43 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:54:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:54:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6981: Waiting for Server - FAILED kill -0 8385 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8385 found at Fri Jan 8 14:54:49 EST 2016 selfserv_9159 with PID 8385 started at Fri Jan 8 14:54:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6982: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 8385 at Fri Jan 8 14:54:49 EST 2016 kill -USR1 8385 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8385 killed at Fri Jan 8 14:54:49 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:54:50 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:54:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:54:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6983: Waiting for Server - FAILED kill -0 8454 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8454 found at Fri Jan 8 14:54:55 EST 2016 selfserv_9159 with PID 8454 started at Fri Jan 8 14:54:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6984: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 8454 at Fri Jan 8 14:54:56 EST 2016 kill -USR1 8454 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8454 killed at Fri Jan 8 14:54:56 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:54:56 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:54:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:55:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6985: Waiting for Server - FAILED kill -0 8522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8522 found at Fri Jan 8 14:55:02 EST 2016 selfserv_9159 with PID 8522 started at Fri Jan 8 14:55:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6986: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 8522 at Fri Jan 8 14:55:03 EST 2016 kill -USR1 8522 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8522 killed at Fri Jan 8 14:55:03 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 14:55:03 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:55:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:55:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6987: Waiting for Server - FAILED kill -0 8603 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8603 found at Fri Jan 8 14:55:09 EST 2016 selfserv_9159 with PID 8603 started at Fri Jan 8 14:55:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6988: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 8603 at Fri Jan 8 14:55:10 EST 2016 kill -USR1 8603 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8603 killed at Fri Jan 8 14:55:10 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 14:55:10 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:55:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:55:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6989: Waiting for Server - FAILED kill -0 8671 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8671 found at Fri Jan 8 14:55:16 EST 2016 selfserv_9159 with PID 8671 started at Fri Jan 8 14:55:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6990: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 8671 at Fri Jan 8 14:55:17 EST 2016 kill -USR1 8671 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8671 killed at Fri Jan 8 14:55:17 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 14:55:17 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:55:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:55:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6991: Waiting for Server - FAILED kill -0 8739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8739 found at Fri Jan 8 14:55:23 EST 2016 selfserv_9159 with PID 8739 started at Fri Jan 8 14:55:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6992: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 8739 at Fri Jan 8 14:55:24 EST 2016 kill -USR1 8739 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8739 killed at Fri Jan 8 14:55:24 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:55:24 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:55:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:55:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6993: Waiting for Server - FAILED kill -0 8820 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8820 found at Fri Jan 8 14:55:30 EST 2016 selfserv_9159 with PID 8820 started at Fri Jan 8 14:55:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6994: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 8820 at Fri Jan 8 14:55:30 EST 2016 kill -USR1 8820 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8820 killed at Fri Jan 8 14:55:31 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:55:31 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:55:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:55:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6995: Waiting for Server - FAILED kill -0 8888 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8888 found at Fri Jan 8 14:55:37 EST 2016 selfserv_9159 with PID 8888 started at Fri Jan 8 14:55:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6996: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 8888 at Fri Jan 8 14:55:37 EST 2016 kill -USR1 8888 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8888 killed at Fri Jan 8 14:55:38 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:55:38 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:55:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:55:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6997: Waiting for Server - FAILED kill -0 8956 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8956 found at Fri Jan 8 14:55:44 EST 2016 selfserv_9159 with PID 8956 started at Fri Jan 8 14:55:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6998: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 8956 at Fri Jan 8 14:55:44 EST 2016 kill -USR1 8956 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8956 killed at Fri Jan 8 14:55:45 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:55:45 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:55:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:55:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #6999: Waiting for Server - FAILED kill -0 9037 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9037 found at Fri Jan 8 14:55:51 EST 2016 selfserv_9159 with PID 9037 started at Fri Jan 8 14:55:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7000: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 9037 at Fri Jan 8 14:55:51 EST 2016 kill -USR1 9037 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9037 killed at Fri Jan 8 14:55:52 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:55:52 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:55:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:55:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7001: Waiting for Server - FAILED kill -0 9105 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9105 found at Fri Jan 8 14:55:58 EST 2016 selfserv_9159 with PID 9105 started at Fri Jan 8 14:55:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7002: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 9105 at Fri Jan 8 14:55:58 EST 2016 kill -USR1 9105 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9105 killed at Fri Jan 8 14:55:58 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:55:59 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:55:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:56:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7003: Waiting for Server - FAILED kill -0 9173 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9173 found at Fri Jan 8 14:56:04 EST 2016 selfserv_9159 with PID 9173 started at Fri Jan 8 14:56:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7004: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 9173 at Fri Jan 8 14:56:05 EST 2016 kill -USR1 9173 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9173 killed at Fri Jan 8 14:56:05 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:56:06 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:56:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:56:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7005: Waiting for Server - FAILED kill -0 9263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9263 found at Fri Jan 8 14:56:11 EST 2016 selfserv_9159 with PID 9263 started at Fri Jan 8 14:56:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7006: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 9263 at Fri Jan 8 14:56:12 EST 2016 kill -USR1 9263 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9263 killed at Fri Jan 8 14:56:12 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:56:12 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:56:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:56:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7007: Waiting for Server - FAILED kill -0 9331 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9331 found at Fri Jan 8 14:56:18 EST 2016 selfserv_9159 with PID 9331 started at Fri Jan 8 14:56:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7008: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 9331 at Fri Jan 8 14:56:19 EST 2016 kill -USR1 9331 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9331 killed at Fri Jan 8 14:56:19 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:56:19 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:56:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:56:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7009: Waiting for Server - FAILED kill -0 9402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9402 found at Fri Jan 8 14:56:25 EST 2016 selfserv_9159 with PID 9402 started at Fri Jan 8 14:56:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7010: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 9402 at Fri Jan 8 14:56:26 EST 2016 kill -USR1 9402 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9402 killed at Fri Jan 8 14:56:26 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:56:26 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:56:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:56:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7011: Waiting for Server - FAILED kill -0 9483 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9483 found at Fri Jan 8 14:56:32 EST 2016 selfserv_9159 with PID 9483 started at Fri Jan 8 14:56:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7012: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 9483 at Fri Jan 8 14:56:33 EST 2016 kill -USR1 9483 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9483 killed at Fri Jan 8 14:56:33 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:56:33 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:56:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:56:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7013: Waiting for Server - FAILED kill -0 9551 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9551 found at Fri Jan 8 14:56:39 EST 2016 selfserv_9159 with PID 9551 started at Fri Jan 8 14:56:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7014: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 9551 at Fri Jan 8 14:56:40 EST 2016 kill -USR1 9551 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9551 killed at Fri Jan 8 14:56:40 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:56:40 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:56:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:56:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7015: Waiting for Server - FAILED kill -0 9619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9619 found at Fri Jan 8 14:56:46 EST 2016 selfserv_9159 with PID 9619 started at Fri Jan 8 14:56:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7016: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 9619 at Fri Jan 8 14:56:46 EST 2016 kill -USR1 9619 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9619 killed at Fri Jan 8 14:56:47 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:56:47 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:56:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:56:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7017: Waiting for Server - FAILED kill -0 9700 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9700 found at Fri Jan 8 14:56:53 EST 2016 selfserv_9159 with PID 9700 started at Fri Jan 8 14:56:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7018: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 9700 at Fri Jan 8 14:56:53 EST 2016 kill -USR1 9700 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9700 killed at Fri Jan 8 14:56:54 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:56:54 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:56:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:56:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7019: Waiting for Server - FAILED kill -0 9768 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9768 found at Fri Jan 8 14:57:00 EST 2016 selfserv_9159 with PID 9768 started at Fri Jan 8 14:57:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7020: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 9768 at Fri Jan 8 14:57:00 EST 2016 kill -USR1 9768 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9768 killed at Fri Jan 8 14:57:01 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:57:01 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:57:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:57:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7021: Waiting for Server - FAILED kill -0 9836 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9836 found at Fri Jan 8 14:57:07 EST 2016 selfserv_9159 with PID 9836 started at Fri Jan 8 14:57:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7022: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 9836 at Fri Jan 8 14:57:07 EST 2016 kill -USR1 9836 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9836 killed at Fri Jan 8 14:57:08 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:57:08 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:57:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:57:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7023: Waiting for Server - FAILED kill -0 9917 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9917 found at Fri Jan 8 14:57:14 EST 2016 selfserv_9159 with PID 9917 started at Fri Jan 8 14:57:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7024: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 9917 at Fri Jan 8 14:57:14 EST 2016 kill -USR1 9917 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9917 killed at Fri Jan 8 14:57:14 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:57:15 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:57:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:57:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7025: Waiting for Server - FAILED kill -0 9985 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9985 found at Fri Jan 8 14:57:20 EST 2016 selfserv_9159 with PID 9985 started at Fri Jan 8 14:57:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7026: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 9985 at Fri Jan 8 14:57:21 EST 2016 kill -USR1 9985 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9985 killed at Fri Jan 8 14:57:21 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:57:21 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:57:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:57:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7027: Waiting for Server - FAILED kill -0 10053 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10053 found at Fri Jan 8 14:57:27 EST 2016 selfserv_9159 with PID 10053 started at Fri Jan 8 14:57:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7028: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 10053 at Fri Jan 8 14:57:28 EST 2016 kill -USR1 10053 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10053 killed at Fri Jan 8 14:57:28 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:57:28 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:57:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:57:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7029: Waiting for Server - FAILED kill -0 10134 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10134 found at Fri Jan 8 14:57:34 EST 2016 selfserv_9159 with PID 10134 started at Fri Jan 8 14:57:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7030: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 10134 at Fri Jan 8 14:57:35 EST 2016 kill -USR1 10134 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10134 killed at Fri Jan 8 14:57:35 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:57:35 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:57:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:57:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7031: Waiting for Server - FAILED kill -0 10202 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10202 found at Fri Jan 8 14:57:41 EST 2016 selfserv_9159 with PID 10202 started at Fri Jan 8 14:57:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7032: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 10202 at Fri Jan 8 14:57:42 EST 2016 kill -USR1 10202 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10202 killed at Fri Jan 8 14:57:42 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:57:42 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:57:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:57:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7033: Waiting for Server - FAILED kill -0 10270 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10270 found at Fri Jan 8 14:57:48 EST 2016 selfserv_9159 with PID 10270 started at Fri Jan 8 14:57:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7034: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 10270 at Fri Jan 8 14:57:49 EST 2016 kill -USR1 10270 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10270 killed at Fri Jan 8 14:57:49 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:57:49 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:57:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:57:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7035: Waiting for Server - FAILED kill -0 10352 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10352 found at Fri Jan 8 14:57:55 EST 2016 selfserv_9159 with PID 10352 started at Fri Jan 8 14:57:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7036: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 10352 at Fri Jan 8 14:57:56 EST 2016 kill -USR1 10352 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10352 killed at Fri Jan 8 14:57:56 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:57:56 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:57:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:58:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7037: Waiting for Server - FAILED kill -0 10420 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10420 found at Fri Jan 8 14:58:02 EST 2016 selfserv_9159 with PID 10420 started at Fri Jan 8 14:58:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7038: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 10420 at Fri Jan 8 14:58:02 EST 2016 kill -USR1 10420 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10420 killed at Fri Jan 8 14:58:03 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:58:03 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:58:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:58:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7039: Waiting for Server - FAILED kill -0 10488 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10488 found at Fri Jan 8 14:58:09 EST 2016 selfserv_9159 with PID 10488 started at Fri Jan 8 14:58:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7040: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 10488 at Fri Jan 8 14:58:09 EST 2016 kill -USR1 10488 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10488 killed at Fri Jan 8 14:58:10 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:58:10 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:58:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:58:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7041: Waiting for Server - FAILED kill -0 10569 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10569 found at Fri Jan 8 14:58:16 EST 2016 selfserv_9159 with PID 10569 started at Fri Jan 8 14:58:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7042: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 10569 at Fri Jan 8 14:58:16 EST 2016 kill -USR1 10569 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10569 killed at Fri Jan 8 14:58:17 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:58:17 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:58:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:58:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7043: Waiting for Server - FAILED kill -0 10637 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10637 found at Fri Jan 8 14:58:23 EST 2016 selfserv_9159 with PID 10637 started at Fri Jan 8 14:58:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7044: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 10637 at Fri Jan 8 14:58:23 EST 2016 kill -USR1 10637 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10637 killed at Fri Jan 8 14:58:24 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:58:24 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:58:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:58:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7045: Waiting for Server - FAILED kill -0 10705 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10705 found at Fri Jan 8 14:58:30 EST 2016 selfserv_9159 with PID 10705 started at Fri Jan 8 14:58:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7046: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 10705 at Fri Jan 8 14:58:30 EST 2016 kill -USR1 10705 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10705 killed at Fri Jan 8 14:58:30 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:58:31 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:58:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:58:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7047: Waiting for Server - FAILED kill -0 10786 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10786 found at Fri Jan 8 14:58:36 EST 2016 selfserv_9159 with PID 10786 started at Fri Jan 8 14:58:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7048: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 10786 at Fri Jan 8 14:58:37 EST 2016 kill -USR1 10786 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10786 killed at Fri Jan 8 14:58:37 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:58:37 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:58:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:58:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7049: Waiting for Server - FAILED kill -0 10854 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10854 found at Fri Jan 8 14:58:43 EST 2016 selfserv_9159 with PID 10854 started at Fri Jan 8 14:58:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7050: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 10854 at Fri Jan 8 14:58:44 EST 2016 kill -USR1 10854 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10854 killed at Fri Jan 8 14:58:44 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:58:44 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:58:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:58:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7051: Waiting for Server - FAILED kill -0 10922 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10922 found at Fri Jan 8 14:58:50 EST 2016 selfserv_9159 with PID 10922 started at Fri Jan 8 14:58:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7052: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 10922 at Fri Jan 8 14:58:51 EST 2016 kill -USR1 10922 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10922 killed at Fri Jan 8 14:58:51 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:58:51 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:58:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:58:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7053: Waiting for Server - FAILED kill -0 11003 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11003 found at Fri Jan 8 14:58:57 EST 2016 selfserv_9159 with PID 11003 started at Fri Jan 8 14:58:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7054: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11003 at Fri Jan 8 14:58:58 EST 2016 kill -USR1 11003 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11003 killed at Fri Jan 8 14:58:58 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:58:58 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:58:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:59:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7055: Waiting for Server - FAILED kill -0 11071 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11071 found at Fri Jan 8 14:59:04 EST 2016 selfserv_9159 with PID 11071 started at Fri Jan 8 14:59:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7056: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11071 at Fri Jan 8 14:59:05 EST 2016 kill -USR1 11071 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11071 killed at Fri Jan 8 14:59:05 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:59:05 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:59:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:59:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7057: Waiting for Server - FAILED kill -0 11139 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11139 found at Fri Jan 8 14:59:11 EST 2016 selfserv_9159 with PID 11139 started at Fri Jan 8 14:59:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7058: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11139 at Fri Jan 8 14:59:11 EST 2016 kill -USR1 11139 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11139 killed at Fri Jan 8 14:59:12 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:59:12 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:59:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:59:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7059: Waiting for Server - FAILED kill -0 11220 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11220 found at Fri Jan 8 14:59:18 EST 2016 selfserv_9159 with PID 11220 started at Fri Jan 8 14:59:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7060: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 11220 at Fri Jan 8 14:59:18 EST 2016 kill -USR1 11220 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11220 killed at Fri Jan 8 14:59:19 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:59:19 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:59:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:59:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7061: Waiting for Server - FAILED kill -0 11288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11288 found at Fri Jan 8 14:59:25 EST 2016 selfserv_9159 with PID 11288 started at Fri Jan 8 14:59:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7062: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11288 at Fri Jan 8 14:59:25 EST 2016 kill -USR1 11288 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11288 killed at Fri Jan 8 14:59:26 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:59:26 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:59:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:59:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7063: Waiting for Server - FAILED kill -0 11356 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11356 found at Fri Jan 8 14:59:32 EST 2016 selfserv_9159 with PID 11356 started at Fri Jan 8 14:59:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7064: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 11356 at Fri Jan 8 14:59:32 EST 2016 kill -USR1 11356 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11356 killed at Fri Jan 8 14:59:33 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:59:33 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:59:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:59:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7065: Waiting for Server - FAILED kill -0 11437 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11437 found at Fri Jan 8 14:59:39 EST 2016 selfserv_9159 with PID 11437 started at Fri Jan 8 14:59:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7066: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 11437 at Fri Jan 8 14:59:39 EST 2016 kill -USR1 11437 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11437 killed at Fri Jan 8 14:59:40 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:59:40 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:59:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:59:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7067: Waiting for Server - FAILED kill -0 11505 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11505 found at Fri Jan 8 14:59:46 EST 2016 selfserv_9159 with PID 11505 started at Fri Jan 8 14:59:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7068: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 11505 at Fri Jan 8 14:59:46 EST 2016 kill -USR1 11505 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11505 killed at Fri Jan 8 14:59:46 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 14:59:47 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:59:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:59:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7069: Waiting for Server - FAILED kill -0 11573 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11573 found at Fri Jan 8 14:59:52 EST 2016 selfserv_9159 with PID 11573 started at Fri Jan 8 14:59:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7070: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 11573 at Fri Jan 8 14:59:53 EST 2016 kill -USR1 11573 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11573 killed at Fri Jan 8 14:59:53 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 14:59:53 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 14:59:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 14:59:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7071: Waiting for Server - FAILED kill -0 11654 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11654 found at Fri Jan 8 14:59:59 EST 2016 selfserv_9159 with PID 11654 started at Fri Jan 8 14:59:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7072: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 11654 at Fri Jan 8 15:00:00 EST 2016 kill -USR1 11654 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11654 killed at Fri Jan 8 15:00:00 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:00:00 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:00:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:00:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7073: Waiting for Server - FAILED kill -0 11722 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11722 found at Fri Jan 8 15:00:06 EST 2016 selfserv_9159 with PID 11722 started at Fri Jan 8 15:00:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7074: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11722 at Fri Jan 8 15:00:07 EST 2016 kill -USR1 11722 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11722 killed at Fri Jan 8 15:00:07 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:00:07 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:00:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:00:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7075: Waiting for Server - FAILED kill -0 11793 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11793 found at Fri Jan 8 15:00:13 EST 2016 selfserv_9159 with PID 11793 started at Fri Jan 8 15:00:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7076: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 11793 at Fri Jan 8 15:00:14 EST 2016 kill -USR1 11793 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11793 killed at Fri Jan 8 15:00:14 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:00:14 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:00:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:00:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7077: Waiting for Server - FAILED kill -0 11874 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11874 found at Fri Jan 8 15:00:20 EST 2016 selfserv_9159 with PID 11874 started at Fri Jan 8 15:00:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7078: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11874 at Fri Jan 8 15:00:21 EST 2016 kill -USR1 11874 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11874 killed at Fri Jan 8 15:00:21 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:00:21 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:00:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:00:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7079: Waiting for Server - FAILED kill -0 11942 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11942 found at Fri Jan 8 15:00:27 EST 2016 selfserv_9159 with PID 11942 started at Fri Jan 8 15:00:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7080: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11942 at Fri Jan 8 15:00:27 EST 2016 kill -USR1 11942 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11942 killed at Fri Jan 8 15:00:28 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:00:28 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:00:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:00:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7081: Waiting for Server - FAILED kill -0 12010 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12010 found at Fri Jan 8 15:00:34 EST 2016 selfserv_9159 with PID 12010 started at Fri Jan 8 15:00:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7082: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 12010 at Fri Jan 8 15:00:34 EST 2016 kill -USR1 12010 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12010 killed at Fri Jan 8 15:00:35 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:00:35 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:00:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:00:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7083: Waiting for Server - FAILED kill -0 12091 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12091 found at Fri Jan 8 15:00:41 EST 2016 selfserv_9159 with PID 12091 started at Fri Jan 8 15:00:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7084: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 12091 at Fri Jan 8 15:00:41 EST 2016 kill -USR1 12091 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12091 killed at Fri Jan 8 15:00:42 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:00:42 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:00:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:00:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7085: Waiting for Server - FAILED kill -0 12159 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12159 found at Fri Jan 8 15:00:48 EST 2016 selfserv_9159 with PID 12159 started at Fri Jan 8 15:00:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7086: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 12159 at Fri Jan 8 15:00:48 EST 2016 kill -USR1 12159 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12159 killed at Fri Jan 8 15:00:49 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:00:49 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:00:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:00:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7087: Waiting for Server - FAILED kill -0 12227 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12227 found at Fri Jan 8 15:00:55 EST 2016 selfserv_9159 with PID 12227 started at Fri Jan 8 15:00:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7088: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 12227 at Fri Jan 8 15:00:55 EST 2016 kill -USR1 12227 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12227 killed at Fri Jan 8 15:00:56 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:00:56 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:00:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:01:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7089: Waiting for Server - FAILED kill -0 12308 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12308 found at Fri Jan 8 15:01:02 EST 2016 selfserv_9159 with PID 12308 started at Fri Jan 8 15:01:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7090: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 12308 at Fri Jan 8 15:01:02 EST 2016 kill -USR1 12308 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12308 killed at Fri Jan 8 15:01:02 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:01:03 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:01:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:01:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7091: Waiting for Server - FAILED kill -0 12390 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12390 found at Fri Jan 8 15:01:08 EST 2016 selfserv_9159 with PID 12390 started at Fri Jan 8 15:01:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7092: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 12390 at Fri Jan 8 15:01:09 EST 2016 kill -USR1 12390 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12390 killed at Fri Jan 8 15:01:09 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:01:09 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:01:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:01:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7093: Waiting for Server - FAILED kill -0 12458 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12458 found at Fri Jan 8 15:01:15 EST 2016 selfserv_9159 with PID 12458 started at Fri Jan 8 15:01:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7094: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 12458 at Fri Jan 8 15:01:16 EST 2016 kill -USR1 12458 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12458 killed at Fri Jan 8 15:01:16 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:01:16 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:01:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:01:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7095: Waiting for Server - FAILED kill -0 12539 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12539 found at Fri Jan 8 15:01:22 EST 2016 selfserv_9159 with PID 12539 started at Fri Jan 8 15:01:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7096: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 12539 at Fri Jan 8 15:01:23 EST 2016 kill -USR1 12539 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12539 killed at Fri Jan 8 15:01:23 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:01:23 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:01:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:01:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7097: Waiting for Server - FAILED kill -0 12607 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12607 found at Fri Jan 8 15:01:29 EST 2016 selfserv_9159 with PID 12607 started at Fri Jan 8 15:01:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7098: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 12607 at Fri Jan 8 15:01:30 EST 2016 kill -USR1 12607 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12607 killed at Fri Jan 8 15:01:30 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:01:30 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:01:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:01:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7099: Waiting for Server - FAILED kill -0 12675 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12675 found at Fri Jan 8 15:01:36 EST 2016 selfserv_9159 with PID 12675 started at Fri Jan 8 15:01:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7100: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 12675 at Fri Jan 8 15:01:37 EST 2016 kill -USR1 12675 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12675 killed at Fri Jan 8 15:01:37 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:01:37 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:01:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:01:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7101: Waiting for Server - FAILED kill -0 12756 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12756 found at Fri Jan 8 15:01:43 EST 2016 selfserv_9159 with PID 12756 started at Fri Jan 8 15:01:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7102: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 12756 at Fri Jan 8 15:01:43 EST 2016 kill -USR1 12756 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12756 killed at Fri Jan 8 15:01:44 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:01:44 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:01:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:01:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7103: Waiting for Server - FAILED kill -0 12824 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12824 found at Fri Jan 8 15:01:50 EST 2016 selfserv_9159 with PID 12824 started at Fri Jan 8 15:01:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7104: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 12824 at Fri Jan 8 15:01:50 EST 2016 kill -USR1 12824 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12824 killed at Fri Jan 8 15:01:51 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:01:51 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:01:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:01:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7105: Waiting for Server - FAILED kill -0 12892 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12892 found at Fri Jan 8 15:01:57 EST 2016 selfserv_9159 with PID 12892 started at Fri Jan 8 15:01:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7106: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 12892 at Fri Jan 8 15:01:57 EST 2016 kill -USR1 12892 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12892 killed at Fri Jan 8 15:01:58 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:01:58 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:01:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:02:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7107: Waiting for Server - FAILED kill -0 12973 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12973 found at Fri Jan 8 15:02:04 EST 2016 selfserv_9159 with PID 12973 started at Fri Jan 8 15:02:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7108: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 12973 at Fri Jan 8 15:02:04 EST 2016 kill -USR1 12973 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12973 killed at Fri Jan 8 15:02:05 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:02:05 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:02:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:02:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7109: Waiting for Server - FAILED kill -0 13041 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13041 found at Fri Jan 8 15:02:11 EST 2016 selfserv_9159 with PID 13041 started at Fri Jan 8 15:02:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7110: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 13041 at Fri Jan 8 15:02:11 EST 2016 kill -USR1 13041 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13041 killed at Fri Jan 8 15:02:12 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:02:12 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:02:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:02:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7111: Waiting for Server - FAILED kill -0 13109 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13109 found at Fri Jan 8 15:02:18 EST 2016 selfserv_9159 with PID 13109 started at Fri Jan 8 15:02:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7112: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 13109 at Fri Jan 8 15:02:18 EST 2016 kill -USR1 13109 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13109 killed at Fri Jan 8 15:02:18 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:02:19 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:02:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:02:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7113: Waiting for Server - FAILED kill -0 13190 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13190 found at Fri Jan 8 15:02:24 EST 2016 selfserv_9159 with PID 13190 started at Fri Jan 8 15:02:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7114: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 13190 at Fri Jan 8 15:02:25 EST 2016 kill -USR1 13190 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13190 killed at Fri Jan 8 15:02:25 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:02:25 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:02:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:02:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7115: Waiting for Server - FAILED kill -0 13258 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13258 found at Fri Jan 8 15:02:31 EST 2016 selfserv_9159 with PID 13258 started at Fri Jan 8 15:02:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7116: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 13258 at Fri Jan 8 15:02:32 EST 2016 kill -USR1 13258 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13258 killed at Fri Jan 8 15:02:32 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:02:32 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:02:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:02:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7117: Waiting for Server - FAILED kill -0 13326 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13326 found at Fri Jan 8 15:02:38 EST 2016 selfserv_9159 with PID 13326 started at Fri Jan 8 15:02:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7118: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 13326 at Fri Jan 8 15:02:39 EST 2016 kill -USR1 13326 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13326 killed at Fri Jan 8 15:02:39 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:02:39 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:02:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:02:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7119: Waiting for Server - FAILED kill -0 13407 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13407 found at Fri Jan 8 15:02:45 EST 2016 selfserv_9159 with PID 13407 started at Fri Jan 8 15:02:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7120: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 13407 at Fri Jan 8 15:02:46 EST 2016 kill -USR1 13407 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13407 killed at Fri Jan 8 15:02:46 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:02:46 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:02:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:02:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7121: Waiting for Server - FAILED kill -0 13475 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13475 found at Fri Jan 8 15:02:52 EST 2016 selfserv_9159 with PID 13475 started at Fri Jan 8 15:02:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7122: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 13475 at Fri Jan 8 15:02:53 EST 2016 kill -USR1 13475 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13475 killed at Fri Jan 8 15:02:53 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:02:53 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:02:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:02:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7123: Waiting for Server - FAILED kill -0 13543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13543 found at Fri Jan 8 15:02:59 EST 2016 selfserv_9159 with PID 13543 started at Fri Jan 8 15:02:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7124: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 13543 at Fri Jan 8 15:02:59 EST 2016 kill -USR1 13543 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13543 killed at Fri Jan 8 15:03:00 EST 2016 ssl.sh: Cache CRL SSL Client Tests - with ECC =============================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/authin.tl.tmp 0 selfserv_9159 starting at Fri Jan 8 15:03:00 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:03:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:03:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7125: Waiting for Server - FAILED kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:06 EST 2016 selfserv_9159 with PID 13619 started at Fri Jan 8 15:03:06 EST 2016 Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:06 EST 2016 ssl.sh: #7126: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:07 EST 2016 ssl.sh: #7127: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:07 EST 2016 ssl.sh: #7128: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:08 EST 2016 ssl.sh: #7129: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:09 EST 2016 ssl.sh: #7130: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:09 EST 2016 ssl.sh: #7131: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:10 EST 2016 ssl.sh: #7132: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:10 EST 2016 ssl.sh: #7133: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:11 EST 2016 ssl.sh: #7134: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:11 EST 2016 ssl.sh: #7135: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:12 EST 2016 ssl.sh: #7136: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:13 EST 2016 ssl.sh: #7137: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:13 EST 2016 ssl.sh: #7138: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:14 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7139: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:14 EST 2016 ssl.sh: #7140: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:15 EST 2016 ssl.sh: #7141: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:15 EST 2016 ssl.sh: #7142: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:16 EST 2016 ssl.sh: #7143: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:16 EST 2016 ssl.sh: #7144: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:17 EST 2016 ssl.sh: #7145: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:17 EST 2016 ssl.sh: #7146: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:18 EST 2016 ssl.sh: #7147: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:19 EST 2016 ssl.sh: #7148: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:19 EST 2016 ssl.sh: #7149: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:20 EST 2016 ssl.sh: #7150: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:20 EST 2016 ssl.sh: #7151: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:21 EST 2016 ssl.sh: #7152: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:21 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7153: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:22 EST 2016 ssl.sh: #7154: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:22 EST 2016 ssl.sh: #7155: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:23 EST 2016 ssl.sh: #7156: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:23 EST 2016 ssl.sh: #7157: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:24 EST 2016 ssl.sh: #7158: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:25 EST 2016 ssl.sh: #7159: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:25 EST 2016 ssl.sh: #7160: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:26 EST 2016 ssl.sh: #7161: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:26 EST 2016 ssl.sh: #7162: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:27 EST 2016 ssl.sh: #7163: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:27 EST 2016 ssl.sh: #7164: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:28 EST 2016 ssl.sh: #7165: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13619 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13619 found at Fri Jan 8 15:03:29 EST 2016 ssl.sh: #7166: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 13619 at Fri Jan 8 15:03:29 EST 2016 kill -USR1 13619 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13619 killed at Fri Jan 8 15:03:29 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:03:29 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:03:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:03:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7167: Waiting for Server - FAILED kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:35 EST 2016 selfserv_9159 with PID 15054 started at Fri Jan 8 15:03:35 EST 2016 Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:36 EST 2016 ssl.sh: #7168: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:36 EST 2016 ssl.sh: #7169: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:37 EST 2016 ssl.sh: #7170: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:37 EST 2016 ssl.sh: #7171: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:38 EST 2016 ssl.sh: #7172: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:38 EST 2016 ssl.sh: #7173: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:39 EST 2016 ssl.sh: #7174: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:39 EST 2016 ssl.sh: #7175: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:40 EST 2016 ssl.sh: #7176: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:40 EST 2016 ssl.sh: #7177: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:41 EST 2016 ssl.sh: #7178: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:42 EST 2016 ssl.sh: #7179: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:42 EST 2016 ssl.sh: #7180: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:43 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7181: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:43 EST 2016 ssl.sh: #7182: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:44 EST 2016 ssl.sh: #7183: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:44 EST 2016 ssl.sh: #7184: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:45 EST 2016 ssl.sh: #7185: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:45 EST 2016 ssl.sh: #7186: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:46 EST 2016 ssl.sh: #7187: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:47 EST 2016 ssl.sh: #7188: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:47 EST 2016 ssl.sh: #7189: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:48 EST 2016 ssl.sh: #7190: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:48 EST 2016 ssl.sh: #7191: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:49 EST 2016 ssl.sh: #7192: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:49 EST 2016 ssl.sh: #7193: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:50 EST 2016 ssl.sh: #7194: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:50 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7195: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:51 EST 2016 ssl.sh: #7196: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:52 EST 2016 ssl.sh: #7197: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:52 EST 2016 ssl.sh: #7198: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:53 EST 2016 ssl.sh: #7199: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:53 EST 2016 ssl.sh: #7200: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:54 EST 2016 ssl.sh: #7201: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:54 EST 2016 ssl.sh: #7202: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:55 EST 2016 ssl.sh: #7203: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:55 EST 2016 ssl.sh: #7204: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:56 EST 2016 ssl.sh: #7205: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:57 EST 2016 ssl.sh: #7206: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:57 EST 2016 ssl.sh: #7207: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15054 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15054 found at Fri Jan 8 15:03:58 EST 2016 ssl.sh: #7208: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 15054 at Fri Jan 8 15:03:58 EST 2016 kill -USR1 15054 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15054 killed at Fri Jan 8 15:03:58 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:03:58 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:03:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:04:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7209: Waiting for Server - FAILED kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:04 EST 2016 selfserv_9159 with PID 16491 started at Fri Jan 8 15:04:04 EST 2016 Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:05 EST 2016 ssl.sh: #7210: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:05 EST 2016 ssl.sh: #7211: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:06 EST 2016 ssl.sh: #7212: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:06 EST 2016 ssl.sh: #7213: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:07 EST 2016 ssl.sh: #7214: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:07 EST 2016 ssl.sh: #7215: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:08 EST 2016 ssl.sh: #7216: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:09 EST 2016 ssl.sh: #7217: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:09 EST 2016 ssl.sh: #7218: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:10 EST 2016 ssl.sh: #7219: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:10 EST 2016 ssl.sh: #7220: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:11 EST 2016 ssl.sh: #7221: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:11 EST 2016 ssl.sh: #7222: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:12 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7223: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:12 EST 2016 ssl.sh: #7224: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:13 EST 2016 ssl.sh: #7225: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:13 EST 2016 ssl.sh: #7226: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:14 EST 2016 ssl.sh: #7227: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:15 EST 2016 ssl.sh: #7228: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:15 EST 2016 ssl.sh: #7229: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:16 EST 2016 ssl.sh: #7230: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:16 EST 2016 ssl.sh: #7231: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:17 EST 2016 ssl.sh: #7232: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:17 EST 2016 ssl.sh: #7233: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:18 EST 2016 ssl.sh: #7234: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:19 EST 2016 ssl.sh: #7235: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:19 EST 2016 ssl.sh: #7236: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:20 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7237: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:20 EST 2016 ssl.sh: #7238: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:21 EST 2016 ssl.sh: #7239: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:21 EST 2016 ssl.sh: #7240: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:22 EST 2016 ssl.sh: #7241: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:22 EST 2016 ssl.sh: #7242: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:23 EST 2016 ssl.sh: #7243: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:23 EST 2016 ssl.sh: #7244: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:24 EST 2016 ssl.sh: #7245: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:25 EST 2016 ssl.sh: #7246: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:25 EST 2016 ssl.sh: #7247: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:26 EST 2016 ssl.sh: #7248: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:26 EST 2016 ssl.sh: #7249: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16491 found at Fri Jan 8 15:04:27 EST 2016 ssl.sh: #7250: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 16491 at Fri Jan 8 15:04:27 EST 2016 kill -USR1 16491 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16491 killed at Fri Jan 8 15:04:27 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:04:27 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:04:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:04:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7251: Waiting for Server - FAILED kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:33 EST 2016 selfserv_9159 with PID 17927 started at Fri Jan 8 15:04:33 EST 2016 Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:34 EST 2016 ssl.sh: #7252: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:34 EST 2016 ssl.sh: #7253: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:35 EST 2016 ssl.sh: #7254: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:35 EST 2016 ssl.sh: #7255: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:36 EST 2016 ssl.sh: #7256: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:37 EST 2016 ssl.sh: #7257: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:37 EST 2016 ssl.sh: #7258: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:38 EST 2016 ssl.sh: #7259: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:38 EST 2016 ssl.sh: #7260: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:39 EST 2016 ssl.sh: #7261: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:39 EST 2016 ssl.sh: #7262: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:40 EST 2016 ssl.sh: #7263: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:41 EST 2016 ssl.sh: #7264: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:41 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7265: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:42 EST 2016 ssl.sh: #7266: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:42 EST 2016 ssl.sh: #7267: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:43 EST 2016 ssl.sh: #7268: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:43 EST 2016 ssl.sh: #7269: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:44 EST 2016 ssl.sh: #7270: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:44 EST 2016 ssl.sh: #7271: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:45 EST 2016 ssl.sh: #7272: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:45 EST 2016 ssl.sh: #7273: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:46 EST 2016 ssl.sh: #7274: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:47 EST 2016 ssl.sh: #7275: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:47 EST 2016 ssl.sh: #7276: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:48 EST 2016 ssl.sh: #7277: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:48 EST 2016 ssl.sh: #7278: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:49 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7279: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:49 EST 2016 ssl.sh: #7280: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:50 EST 2016 ssl.sh: #7281: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:50 EST 2016 ssl.sh: #7282: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:51 EST 2016 ssl.sh: #7283: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:52 EST 2016 ssl.sh: #7284: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:52 EST 2016 ssl.sh: #7285: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:53 EST 2016 ssl.sh: #7286: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:53 EST 2016 ssl.sh: #7287: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:54 EST 2016 ssl.sh: #7288: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:54 EST 2016 ssl.sh: #7289: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:55 EST 2016 ssl.sh: #7290: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:55 EST 2016 ssl.sh: #7291: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17927 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17927 found at Fri Jan 8 15:04:56 EST 2016 ssl.sh: #7292: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 17927 at Fri Jan 8 15:04:56 EST 2016 kill -USR1 17927 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17927 killed at Fri Jan 8 15:04:57 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:04:57 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:04:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:05:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7293: Waiting for Server - FAILED kill -0 19364 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19364 found at Fri Jan 8 15:05:02 EST 2016 selfserv_9159 with PID 19364 started at Fri Jan 8 15:05:03 EST 2016 trying to kill selfserv_9159 with PID 19364 at Fri Jan 8 15:05:03 EST 2016 kill -USR1 19364 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19364 killed at Fri Jan 8 15:05:03 EST 2016 selfserv_9159 starting at Fri Jan 8 15:05:03 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:05:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:05:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7294: Waiting for Server - FAILED kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:09 EST 2016 selfserv_9159 with PID 19419 started at Fri Jan 8 15:05:09 EST 2016 Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:09 EST 2016 ssl.sh: #7295: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:10 EST 2016 ssl.sh: #7296: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:11 EST 2016 ssl.sh: #7297: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:11 EST 2016 ssl.sh: #7298: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:12 EST 2016 ssl.sh: #7299: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:12 EST 2016 ssl.sh: #7300: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:13 EST 2016 ssl.sh: #7301: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:13 EST 2016 ssl.sh: #7302: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:14 EST 2016 ssl.sh: #7303: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:14 EST 2016 ssl.sh: #7304: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:15 EST 2016 ssl.sh: #7305: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:16 EST 2016 ssl.sh: #7306: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:16 EST 2016 ssl.sh: #7307: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:17 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7308: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:17 EST 2016 ssl.sh: #7309: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:18 EST 2016 ssl.sh: #7310: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:18 EST 2016 ssl.sh: #7311: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:19 EST 2016 ssl.sh: #7312: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:19 EST 2016 ssl.sh: #7313: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:20 EST 2016 ssl.sh: #7314: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:20 EST 2016 ssl.sh: #7315: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:21 EST 2016 ssl.sh: #7316: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:22 EST 2016 ssl.sh: #7317: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:22 EST 2016 ssl.sh: #7318: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:23 EST 2016 ssl.sh: #7319: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:23 EST 2016 ssl.sh: #7320: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:24 EST 2016 ssl.sh: #7321: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:24 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7322: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:25 EST 2016 ssl.sh: #7323: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:25 EST 2016 ssl.sh: #7324: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:26 EST 2016 ssl.sh: #7325: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:27 EST 2016 ssl.sh: #7326: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:27 EST 2016 ssl.sh: #7327: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:28 EST 2016 ssl.sh: #7328: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:28 EST 2016 ssl.sh: #7329: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:29 EST 2016 ssl.sh: #7330: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:29 EST 2016 ssl.sh: #7331: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:30 EST 2016 ssl.sh: #7332: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:30 EST 2016 ssl.sh: #7333: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:31 EST 2016 ssl.sh: #7334: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19419 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19419 found at Fri Jan 8 15:05:32 EST 2016 ssl.sh: #7335: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 19419 at Fri Jan 8 15:05:32 EST 2016 kill -USR1 19419 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19419 killed at Fri Jan 8 15:05:32 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:05:32 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:05:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:05:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7336: Waiting for Server - FAILED kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:38 EST 2016 selfserv_9159 with PID 20857 started at Fri Jan 8 15:05:38 EST 2016 Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:39 EST 2016 ssl.sh: #7337: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:39 EST 2016 ssl.sh: #7338: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:40 EST 2016 ssl.sh: #7339: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:40 EST 2016 ssl.sh: #7340: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:41 EST 2016 ssl.sh: #7341: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:41 EST 2016 ssl.sh: #7342: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:42 EST 2016 ssl.sh: #7343: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:42 EST 2016 ssl.sh: #7344: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:43 EST 2016 ssl.sh: #7345: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:44 EST 2016 ssl.sh: #7346: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:44 EST 2016 ssl.sh: #7347: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:45 EST 2016 ssl.sh: #7348: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:45 EST 2016 ssl.sh: #7349: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:46 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7350: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:46 EST 2016 ssl.sh: #7351: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:47 EST 2016 ssl.sh: #7352: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:47 EST 2016 ssl.sh: #7353: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:48 EST 2016 ssl.sh: #7354: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:49 EST 2016 ssl.sh: #7355: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:49 EST 2016 ssl.sh: #7356: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:50 EST 2016 ssl.sh: #7357: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:50 EST 2016 ssl.sh: #7358: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:51 EST 2016 ssl.sh: #7359: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:51 EST 2016 ssl.sh: #7360: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:52 EST 2016 ssl.sh: #7361: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:52 EST 2016 ssl.sh: #7362: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:53 EST 2016 ssl.sh: #7363: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:54 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7364: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:54 EST 2016 ssl.sh: #7365: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:55 EST 2016 ssl.sh: #7366: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:55 EST 2016 ssl.sh: #7367: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:56 EST 2016 ssl.sh: #7368: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:56 EST 2016 ssl.sh: #7369: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:57 EST 2016 ssl.sh: #7370: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:57 EST 2016 ssl.sh: #7371: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:58 EST 2016 ssl.sh: #7372: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:58 EST 2016 ssl.sh: #7373: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:05:59 EST 2016 ssl.sh: #7374: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:06:00 EST 2016 ssl.sh: #7375: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:06:00 EST 2016 ssl.sh: #7376: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20857 found at Fri Jan 8 15:06:01 EST 2016 ssl.sh: #7377: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 20857 at Fri Jan 8 15:06:01 EST 2016 kill -USR1 20857 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20857 killed at Fri Jan 8 15:06:01 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:06:01 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:06:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:06:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7378: Waiting for Server - FAILED kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:07 EST 2016 selfserv_9159 with PID 22293 started at Fri Jan 8 15:06:07 EST 2016 Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:08 EST 2016 ssl.sh: #7379: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:08 EST 2016 ssl.sh: #7380: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:09 EST 2016 ssl.sh: #7381: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:09 EST 2016 ssl.sh: #7382: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:10 EST 2016 ssl.sh: #7383: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:10 EST 2016 ssl.sh: #7384: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:11 EST 2016 ssl.sh: #7385: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:12 EST 2016 ssl.sh: #7386: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:12 EST 2016 ssl.sh: #7387: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:13 EST 2016 ssl.sh: #7388: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:13 EST 2016 ssl.sh: #7389: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:14 EST 2016 ssl.sh: #7390: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:14 EST 2016 ssl.sh: #7391: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:15 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7392: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:16 EST 2016 ssl.sh: #7393: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:16 EST 2016 ssl.sh: #7394: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:17 EST 2016 ssl.sh: #7395: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:17 EST 2016 ssl.sh: #7396: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:18 EST 2016 ssl.sh: #7397: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:18 EST 2016 ssl.sh: #7398: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:19 EST 2016 ssl.sh: #7399: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:19 EST 2016 ssl.sh: #7400: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:20 EST 2016 ssl.sh: #7401: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:21 EST 2016 ssl.sh: #7402: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:21 EST 2016 ssl.sh: #7403: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:22 EST 2016 ssl.sh: #7404: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:22 EST 2016 ssl.sh: #7405: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:23 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7406: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:23 EST 2016 ssl.sh: #7407: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:24 EST 2016 ssl.sh: #7408: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:24 EST 2016 ssl.sh: #7409: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:25 EST 2016 ssl.sh: #7410: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:25 EST 2016 ssl.sh: #7411: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:26 EST 2016 ssl.sh: #7412: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:27 EST 2016 ssl.sh: #7413: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:27 EST 2016 ssl.sh: #7414: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:28 EST 2016 ssl.sh: #7415: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:28 EST 2016 ssl.sh: #7416: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:29 EST 2016 ssl.sh: #7417: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:29 EST 2016 ssl.sh: #7418: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22293 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22293 found at Fri Jan 8 15:06:30 EST 2016 ssl.sh: #7419: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 22293 at Fri Jan 8 15:06:30 EST 2016 kill -USR1 22293 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22293 killed at Fri Jan 8 15:06:30 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:06:31 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:06:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:06:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7420: Waiting for Server - FAILED kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:36 EST 2016 selfserv_9159 with PID 23728 started at Fri Jan 8 15:06:36 EST 2016 Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:37 EST 2016 ssl.sh: #7421: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:37 EST 2016 ssl.sh: #7422: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:38 EST 2016 ssl.sh: #7423: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:39 EST 2016 ssl.sh: #7424: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:39 EST 2016 ssl.sh: #7425: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:40 EST 2016 ssl.sh: #7426: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:40 EST 2016 ssl.sh: #7427: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:41 EST 2016 ssl.sh: #7428: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:41 EST 2016 ssl.sh: #7429: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:42 EST 2016 ssl.sh: #7430: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:42 EST 2016 ssl.sh: #7431: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:43 EST 2016 ssl.sh: #7432: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:44 EST 2016 ssl.sh: #7433: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:44 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7434: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:45 EST 2016 ssl.sh: #7435: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:45 EST 2016 ssl.sh: #7436: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:46 EST 2016 ssl.sh: #7437: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:46 EST 2016 ssl.sh: #7438: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:47 EST 2016 ssl.sh: #7439: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:47 EST 2016 ssl.sh: #7440: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:48 EST 2016 ssl.sh: #7441: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:49 EST 2016 ssl.sh: #7442: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:49 EST 2016 ssl.sh: #7443: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:50 EST 2016 ssl.sh: #7444: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:50 EST 2016 ssl.sh: #7445: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:51 EST 2016 ssl.sh: #7446: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:51 EST 2016 ssl.sh: #7447: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:52 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7448: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:52 EST 2016 ssl.sh: #7449: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:53 EST 2016 ssl.sh: #7450: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:53 EST 2016 ssl.sh: #7451: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:54 EST 2016 ssl.sh: #7452: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:55 EST 2016 ssl.sh: #7453: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:55 EST 2016 ssl.sh: #7454: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:56 EST 2016 ssl.sh: #7455: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:56 EST 2016 ssl.sh: #7456: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:57 EST 2016 ssl.sh: #7457: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:57 EST 2016 ssl.sh: #7458: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:58 EST 2016 ssl.sh: #7459: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:59 EST 2016 ssl.sh: #7460: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23728 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23728 found at Fri Jan 8 15:06:59 EST 2016 ssl.sh: #7461: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 23728 at Fri Jan 8 15:06:59 EST 2016 kill -USR1 23728 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23728 killed at Fri Jan 8 15:07:00 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:07:00 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:07:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:07:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7462: Waiting for Server - FAILED kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:06 EST 2016 selfserv_9159 with PID 25169 started at Fri Jan 8 15:07:06 EST 2016 Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:06 EST 2016 ssl.sh: #7463: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:07 EST 2016 ssl.sh: #7464: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:07 EST 2016 ssl.sh: #7465: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:08 EST 2016 ssl.sh: #7466: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:08 EST 2016 ssl.sh: #7467: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:09 EST 2016 ssl.sh: #7468: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:09 EST 2016 ssl.sh: #7469: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:10 EST 2016 ssl.sh: #7470: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:11 EST 2016 ssl.sh: #7471: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:11 EST 2016 ssl.sh: #7472: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:12 EST 2016 ssl.sh: #7473: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:12 EST 2016 ssl.sh: #7474: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:13 EST 2016 ssl.sh: #7475: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:13 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7476: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:14 EST 2016 ssl.sh: #7477: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:14 EST 2016 ssl.sh: #7478: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:15 EST 2016 ssl.sh: #7479: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:15 EST 2016 ssl.sh: #7480: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:16 EST 2016 ssl.sh: #7481: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:17 EST 2016 ssl.sh: #7482: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:17 EST 2016 ssl.sh: #7483: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:18 EST 2016 ssl.sh: #7484: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:18 EST 2016 ssl.sh: #7485: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:19 EST 2016 ssl.sh: #7486: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:19 EST 2016 ssl.sh: #7487: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:20 EST 2016 ssl.sh: #7488: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:21 EST 2016 ssl.sh: #7489: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:21 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7490: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:22 EST 2016 ssl.sh: #7491: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:22 EST 2016 ssl.sh: #7492: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:23 EST 2016 ssl.sh: #7493: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:23 EST 2016 ssl.sh: #7494: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:24 EST 2016 ssl.sh: #7495: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:24 EST 2016 ssl.sh: #7496: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:25 EST 2016 ssl.sh: #7497: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:25 EST 2016 ssl.sh: #7498: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:26 EST 2016 ssl.sh: #7499: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:27 EST 2016 ssl.sh: #7500: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:27 EST 2016 ssl.sh: #7501: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:28 EST 2016 ssl.sh: #7502: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25169 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25169 found at Fri Jan 8 15:07:28 EST 2016 ssl.sh: #7503: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 25169 at Fri Jan 8 15:07:28 EST 2016 kill -USR1 25169 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25169 killed at Fri Jan 8 15:07:29 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:07:29 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:07:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:07:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7504: Waiting for Server - FAILED kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:35 EST 2016 selfserv_9159 with PID 26606 started at Fri Jan 8 15:07:35 EST 2016 Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:35 EST 2016 ssl.sh: #7505: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:36 EST 2016 ssl.sh: #7506: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:36 EST 2016 ssl.sh: #7507: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:37 EST 2016 ssl.sh: #7508: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:37 EST 2016 ssl.sh: #7509: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:38 EST 2016 ssl.sh: #7510: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:39 EST 2016 ssl.sh: #7511: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:39 EST 2016 ssl.sh: #7512: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:40 EST 2016 ssl.sh: #7513: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:40 EST 2016 ssl.sh: #7514: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:41 EST 2016 ssl.sh: #7515: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:41 EST 2016 ssl.sh: #7516: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:42 EST 2016 ssl.sh: #7517: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:43 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7518: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:43 EST 2016 ssl.sh: #7519: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:44 EST 2016 ssl.sh: #7520: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:44 EST 2016 ssl.sh: #7521: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:45 EST 2016 ssl.sh: #7522: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:45 EST 2016 ssl.sh: #7523: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:46 EST 2016 ssl.sh: #7524: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:46 EST 2016 ssl.sh: #7525: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:47 EST 2016 ssl.sh: #7526: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:47 EST 2016 ssl.sh: #7527: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:48 EST 2016 ssl.sh: #7528: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:49 EST 2016 ssl.sh: #7529: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:49 EST 2016 ssl.sh: #7530: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:50 EST 2016 ssl.sh: #7531: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:50 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7532: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:51 EST 2016 ssl.sh: #7533: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:51 EST 2016 ssl.sh: #7534: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:52 EST 2016 ssl.sh: #7535: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:52 EST 2016 ssl.sh: #7536: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:53 EST 2016 ssl.sh: #7537: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:54 EST 2016 ssl.sh: #7538: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:54 EST 2016 ssl.sh: #7539: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:55 EST 2016 ssl.sh: #7540: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:55 EST 2016 ssl.sh: #7541: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:56 EST 2016 ssl.sh: #7542: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:56 EST 2016 ssl.sh: #7543: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:57 EST 2016 ssl.sh: #7544: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26606 found at Fri Jan 8 15:07:58 EST 2016 ssl.sh: #7545: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 26606 at Fri Jan 8 15:07:58 EST 2016 kill -USR1 26606 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26606 killed at Fri Jan 8 15:07:58 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:07:58 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:07:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:08:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7546: Waiting for Server - FAILED kill -0 28045 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28045 found at Fri Jan 8 15:08:04 EST 2016 selfserv_9159 with PID 28045 started at Fri Jan 8 15:08:04 EST 2016 trying to kill selfserv_9159 with PID 28045 at Fri Jan 8 15:08:04 EST 2016 kill -USR1 28045 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28045 killed at Fri Jan 8 15:08:04 EST 2016 selfserv_9159 starting at Fri Jan 8 15:08:04 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:08:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:08:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7547: Waiting for Server - FAILED kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:10 EST 2016 selfserv_9159 with PID 28100 started at Fri Jan 8 15:08:10 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:11 EST 2016 ssl.sh: #7548: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:11 EST 2016 ssl.sh: #7549: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:12 EST 2016 ssl.sh: #7550: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:13 EST 2016 ssl.sh: #7551: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:13 EST 2016 ssl.sh: #7552: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:14 EST 2016 ssl.sh: #7553: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:14 EST 2016 ssl.sh: #7554: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:15 EST 2016 ssl.sh: #7555: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:15 EST 2016 ssl.sh: #7556: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:16 EST 2016 ssl.sh: #7557: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:16 EST 2016 ssl.sh: #7558: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:17 EST 2016 ssl.sh: #7559: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:18 EST 2016 ssl.sh: #7560: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:18 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7561: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:19 EST 2016 ssl.sh: #7562: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:19 EST 2016 ssl.sh: #7563: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:20 EST 2016 ssl.sh: #7564: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:20 EST 2016 ssl.sh: #7565: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:21 EST 2016 ssl.sh: #7566: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:21 EST 2016 ssl.sh: #7567: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:22 EST 2016 ssl.sh: #7568: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:23 EST 2016 ssl.sh: #7569: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:23 EST 2016 ssl.sh: #7570: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:24 EST 2016 ssl.sh: #7571: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:24 EST 2016 ssl.sh: #7572: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:25 EST 2016 ssl.sh: #7573: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:25 EST 2016 ssl.sh: #7574: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:26 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7575: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:26 EST 2016 ssl.sh: #7576: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:27 EST 2016 ssl.sh: #7577: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:28 EST 2016 ssl.sh: #7578: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:28 EST 2016 ssl.sh: #7579: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:29 EST 2016 ssl.sh: #7580: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:29 EST 2016 ssl.sh: #7581: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:30 EST 2016 ssl.sh: #7582: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:30 EST 2016 ssl.sh: #7583: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:31 EST 2016 ssl.sh: #7584: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:31 EST 2016 ssl.sh: #7585: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:32 EST 2016 ssl.sh: #7586: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:33 EST 2016 ssl.sh: #7587: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28100 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28100 found at Fri Jan 8 15:08:33 EST 2016 ssl.sh: #7588: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 28100 at Fri Jan 8 15:08:33 EST 2016 kill -USR1 28100 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28100 killed at Fri Jan 8 15:08:34 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:08:34 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:08:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:08:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7589: Waiting for Server - FAILED kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:40 EST 2016 selfserv_9159 with PID 29535 started at Fri Jan 8 15:08:40 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:40 EST 2016 ssl.sh: #7590: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:41 EST 2016 ssl.sh: #7591: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:41 EST 2016 ssl.sh: #7592: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:42 EST 2016 ssl.sh: #7593: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:42 EST 2016 ssl.sh: #7594: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:43 EST 2016 ssl.sh: #7595: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:43 EST 2016 ssl.sh: #7596: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:44 EST 2016 ssl.sh: #7597: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:45 EST 2016 ssl.sh: #7598: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:45 EST 2016 ssl.sh: #7599: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:46 EST 2016 ssl.sh: #7600: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:46 EST 2016 ssl.sh: #7601: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:47 EST 2016 ssl.sh: #7602: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:47 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7603: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:48 EST 2016 ssl.sh: #7604: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:48 EST 2016 ssl.sh: #7605: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:49 EST 2016 ssl.sh: #7606: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:50 EST 2016 ssl.sh: #7607: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:50 EST 2016 ssl.sh: #7608: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:51 EST 2016 ssl.sh: #7609: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:51 EST 2016 ssl.sh: #7610: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:52 EST 2016 ssl.sh: #7611: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:52 EST 2016 ssl.sh: #7612: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:53 EST 2016 ssl.sh: #7613: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:54 EST 2016 ssl.sh: #7614: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:54 EST 2016 ssl.sh: #7615: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:55 EST 2016 ssl.sh: #7616: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:55 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7617: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:56 EST 2016 ssl.sh: #7618: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:56 EST 2016 ssl.sh: #7619: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:57 EST 2016 ssl.sh: #7620: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:57 EST 2016 ssl.sh: #7621: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:58 EST 2016 ssl.sh: #7622: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:58 EST 2016 ssl.sh: #7623: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:08:59 EST 2016 ssl.sh: #7624: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:09:00 EST 2016 ssl.sh: #7625: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:09:00 EST 2016 ssl.sh: #7626: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:09:01 EST 2016 ssl.sh: #7627: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:09:01 EST 2016 ssl.sh: #7628: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:09:02 EST 2016 ssl.sh: #7629: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29535 found at Fri Jan 8 15:09:02 EST 2016 ssl.sh: #7630: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 29535 at Fri Jan 8 15:09:03 EST 2016 kill -USR1 29535 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 29535 killed at Fri Jan 8 15:09:03 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:09:03 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:09:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:09:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7631: Waiting for Server - FAILED kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:09 EST 2016 selfserv_9159 with PID 30970 started at Fri Jan 8 15:09:09 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:09 EST 2016 ssl.sh: #7632: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:10 EST 2016 ssl.sh: #7633: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:11 EST 2016 ssl.sh: #7634: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:11 EST 2016 ssl.sh: #7635: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:12 EST 2016 ssl.sh: #7636: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:12 EST 2016 ssl.sh: #7637: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:13 EST 2016 ssl.sh: #7638: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:13 EST 2016 ssl.sh: #7639: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:14 EST 2016 ssl.sh: #7640: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:14 EST 2016 ssl.sh: #7641: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:15 EST 2016 ssl.sh: #7642: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:16 EST 2016 ssl.sh: #7643: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:16 EST 2016 ssl.sh: #7644: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:17 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7645: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:17 EST 2016 ssl.sh: #7646: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:18 EST 2016 ssl.sh: #7647: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:18 EST 2016 ssl.sh: #7648: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:19 EST 2016 ssl.sh: #7649: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:19 EST 2016 ssl.sh: #7650: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:20 EST 2016 ssl.sh: #7651: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:20 EST 2016 ssl.sh: #7652: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:21 EST 2016 ssl.sh: #7653: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:22 EST 2016 ssl.sh: #7654: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:22 EST 2016 ssl.sh: #7655: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:23 EST 2016 ssl.sh: #7656: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:23 EST 2016 ssl.sh: #7657: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:24 EST 2016 ssl.sh: #7658: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:24 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7659: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:25 EST 2016 ssl.sh: #7660: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:25 EST 2016 ssl.sh: #7661: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:26 EST 2016 ssl.sh: #7662: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:27 EST 2016 ssl.sh: #7663: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:27 EST 2016 ssl.sh: #7664: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:28 EST 2016 ssl.sh: #7665: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:28 EST 2016 ssl.sh: #7666: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:29 EST 2016 ssl.sh: #7667: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:29 EST 2016 ssl.sh: #7668: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:30 EST 2016 ssl.sh: #7669: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:31 EST 2016 ssl.sh: #7670: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:31 EST 2016 ssl.sh: #7671: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30970 found at Fri Jan 8 15:09:32 EST 2016 ssl.sh: #7672: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 30970 at Fri Jan 8 15:09:32 EST 2016 kill -USR1 30970 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 30970 killed at Fri Jan 8 15:09:32 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:09:32 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:09:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:09:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7673: Waiting for Server - FAILED kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:38 EST 2016 selfserv_9159 with PID 32406 started at Fri Jan 8 15:09:38 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:39 EST 2016 ssl.sh: #7674: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:39 EST 2016 ssl.sh: #7675: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:40 EST 2016 ssl.sh: #7676: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:40 EST 2016 ssl.sh: #7677: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:41 EST 2016 ssl.sh: #7678: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:41 EST 2016 ssl.sh: #7679: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:42 EST 2016 ssl.sh: #7680: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:43 EST 2016 ssl.sh: #7681: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:43 EST 2016 ssl.sh: #7682: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:44 EST 2016 ssl.sh: #7683: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:44 EST 2016 ssl.sh: #7684: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:45 EST 2016 ssl.sh: #7685: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:45 EST 2016 ssl.sh: #7686: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:46 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7687: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:46 EST 2016 ssl.sh: #7688: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:47 EST 2016 ssl.sh: #7689: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:48 EST 2016 ssl.sh: #7690: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:48 EST 2016 ssl.sh: #7691: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:49 EST 2016 ssl.sh: #7692: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:49 EST 2016 ssl.sh: #7693: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:50 EST 2016 ssl.sh: #7694: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:50 EST 2016 ssl.sh: #7695: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:51 EST 2016 ssl.sh: #7696: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:51 EST 2016 ssl.sh: #7697: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:52 EST 2016 ssl.sh: #7698: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:53 EST 2016 ssl.sh: #7699: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:53 EST 2016 ssl.sh: #7700: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:54 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7701: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:54 EST 2016 ssl.sh: #7702: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:55 EST 2016 ssl.sh: #7703: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:55 EST 2016 ssl.sh: #7704: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:56 EST 2016 ssl.sh: #7705: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:56 EST 2016 ssl.sh: #7706: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:57 EST 2016 ssl.sh: #7707: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:58 EST 2016 ssl.sh: #7708: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:58 EST 2016 ssl.sh: #7709: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:59 EST 2016 ssl.sh: #7710: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:09:59 EST 2016 ssl.sh: #7711: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:10:00 EST 2016 ssl.sh: #7712: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:10:00 EST 2016 ssl.sh: #7713: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32406 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32406 found at Fri Jan 8 15:10:01 EST 2016 ssl.sh: #7714: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 32406 at Fri Jan 8 15:10:01 EST 2016 kill -USR1 32406 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 32406 killed at Fri Jan 8 15:10:01 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:10:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:10:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:10:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7715: Waiting for Server - FAILED kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:07 EST 2016 selfserv_9159 with PID 1402 started at Fri Jan 8 15:10:07 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:08 EST 2016 ssl.sh: #7716: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:08 EST 2016 ssl.sh: #7717: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:09 EST 2016 ssl.sh: #7718: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:10 EST 2016 ssl.sh: #7719: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:10 EST 2016 ssl.sh: #7720: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:11 EST 2016 ssl.sh: #7721: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:11 EST 2016 ssl.sh: #7722: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:12 EST 2016 ssl.sh: #7723: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:12 EST 2016 ssl.sh: #7724: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:13 EST 2016 ssl.sh: #7725: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:14 EST 2016 ssl.sh: #7726: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:14 EST 2016 ssl.sh: #7727: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:15 EST 2016 ssl.sh: #7728: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:15 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7729: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:16 EST 2016 ssl.sh: #7730: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:16 EST 2016 ssl.sh: #7731: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:17 EST 2016 ssl.sh: #7732: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:17 EST 2016 ssl.sh: #7733: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:18 EST 2016 ssl.sh: #7734: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:18 EST 2016 ssl.sh: #7735: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:19 EST 2016 ssl.sh: #7736: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:20 EST 2016 ssl.sh: #7737: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:20 EST 2016 ssl.sh: #7738: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:21 EST 2016 ssl.sh: #7739: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:21 EST 2016 ssl.sh: #7740: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:22 EST 2016 ssl.sh: #7741: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:22 EST 2016 ssl.sh: #7742: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:23 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7743: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:24 EST 2016 ssl.sh: #7744: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:24 EST 2016 ssl.sh: #7745: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:25 EST 2016 ssl.sh: #7746: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:25 EST 2016 ssl.sh: #7747: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:26 EST 2016 ssl.sh: #7748: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:26 EST 2016 ssl.sh: #7749: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:27 EST 2016 ssl.sh: #7750: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:27 EST 2016 ssl.sh: #7751: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:28 EST 2016 ssl.sh: #7752: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:29 EST 2016 ssl.sh: #7753: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:29 EST 2016 ssl.sh: #7754: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:30 EST 2016 ssl.sh: #7755: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1402 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1402 found at Fri Jan 8 15:10:30 EST 2016 ssl.sh: #7756: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 1402 at Fri Jan 8 15:10:30 EST 2016 kill -USR1 1402 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1402 killed at Fri Jan 8 15:10:31 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:10:31 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:10:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:10:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7757: Waiting for Server - FAILED kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:37 EST 2016 selfserv_9159 with PID 2841 started at Fri Jan 8 15:10:37 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:37 EST 2016 ssl.sh: #7758: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:38 EST 2016 ssl.sh: #7759: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:38 EST 2016 ssl.sh: #7760: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:39 EST 2016 ssl.sh: #7761: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:39 EST 2016 ssl.sh: #7762: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:40 EST 2016 ssl.sh: #7763: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:41 EST 2016 ssl.sh: #7764: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:41 EST 2016 ssl.sh: #7765: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:42 EST 2016 ssl.sh: #7766: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:42 EST 2016 ssl.sh: #7767: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:43 EST 2016 ssl.sh: #7768: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:43 EST 2016 ssl.sh: #7769: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:44 EST 2016 ssl.sh: #7770: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:44 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7771: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:45 EST 2016 ssl.sh: #7772: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:46 EST 2016 ssl.sh: #7773: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:46 EST 2016 ssl.sh: #7774: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:47 EST 2016 ssl.sh: #7775: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:47 EST 2016 ssl.sh: #7776: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:48 EST 2016 ssl.sh: #7777: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:48 EST 2016 ssl.sh: #7778: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:49 EST 2016 ssl.sh: #7779: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:49 EST 2016 ssl.sh: #7780: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:50 EST 2016 ssl.sh: #7781: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:51 EST 2016 ssl.sh: #7782: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:51 EST 2016 ssl.sh: #7783: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:52 EST 2016 ssl.sh: #7784: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:52 EST 2016 ================= CRL Reloaded ============= ssl.sh: #7785: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:53 EST 2016 ssl.sh: #7786: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:53 EST 2016 ssl.sh: #7787: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:54 EST 2016 ssl.sh: #7788: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:54 EST 2016 ssl.sh: #7789: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:55 EST 2016 ssl.sh: #7790: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:56 EST 2016 ssl.sh: #7791: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:56 EST 2016 ssl.sh: #7792: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:57 EST 2016 ssl.sh: #7793: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:57 EST 2016 ssl.sh: #7794: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:58 EST 2016 ssl.sh: #7795: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:58 EST 2016 ssl.sh: #7796: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:10:59 EST 2016 ssl.sh: #7797: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2841 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2841 found at Fri Jan 8 15:11:00 EST 2016 ssl.sh: #7798: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 2841 at Fri Jan 8 15:11:00 EST 2016 kill -USR1 2841 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2841 killed at Fri Jan 8 15:11:00 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:11:00 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:11:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:11:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7799: Waiting for Server - FAILED kill -0 4278 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4278 found at Fri Jan 8 15:11:06 EST 2016 selfserv_9159 with PID 4278 started at Fri Jan 8 15:11:06 EST 2016 trying to kill selfserv_9159 with PID 4278 at Fri Jan 8 15:11:06 EST 2016 kill -USR1 4278 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4278 killed at Fri Jan 8 15:11:06 EST 2016 ssl.sh: SSL Cipher Coverage - server bypass/client bypass - with ECC =============================== selfserv_9159 starting at Fri Jan 8 15:11:07 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:11:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:11:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #7800: Waiting for Server - FAILED kill -0 4338 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:12 EST 2016 selfserv_9159 with PID 4338 started at Fri Jan 8 15:11:12 EST 2016 ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7801: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7802: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7803: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7804: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7805: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7806: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7807: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7808: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7809: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7810: SSL3_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7811: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7812: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7813: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7814: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7815: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7816: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7817: TLS_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7818: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7819: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7820: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7821: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7822: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7823: TLS_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7824: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7825: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7826: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7827: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7828: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7829: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7830: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7831: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7832: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7833: TLS11_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7834: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7835: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7836: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7837: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7838: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7839: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7840: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7841: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7842: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7843: TLS12_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7844: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7845: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7846: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7847: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7848: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7849: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7850: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7851: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7852: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7853: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7854: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7855: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7856: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7857: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7858: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7859: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7860: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7861: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7862: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7863: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7864: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7865: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7866: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7867: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 4338 >/dev/null 2>/dev/null selfserv_9159 with PID 4338 found at Fri Jan 8 15:11:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7868: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 4338 at Fri Jan 8 15:11:49 EST 2016 kill -USR1 4338 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4338 killed at Fri Jan 8 15:11:49 EST 2016 ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 15:11:49 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:11:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:11:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7869: Waiting for Server - FAILED kill -0 6441 >/dev/null 2>/dev/null selfserv_9159 with PID 6441 found at Fri Jan 8 15:11:55 EST 2016 selfserv_9159 with PID 6441 started at Fri Jan 8 15:11:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7870: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 6441 >/dev/null 2>/dev/null selfserv_9159 with PID 6441 found at Fri Jan 8 15:11:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7871: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 6441 >/dev/null 2>/dev/null selfserv_9159 with PID 6441 found at Fri Jan 8 15:11:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7872: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 6441 >/dev/null 2>/dev/null selfserv_9159 with PID 6441 found at Fri Jan 8 15:11:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7873: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 6441 >/dev/null 2>/dev/null selfserv_9159 with PID 6441 found at Fri Jan 8 15:11:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7874: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 6441 at Fri Jan 8 15:11:58 EST 2016 kill -USR1 6441 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6441 killed at Fri Jan 8 15:11:58 EST 2016 ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 15:11:58 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:11:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:12:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7875: Waiting for Server - FAILED kill -0 6606 >/dev/null 2>/dev/null selfserv_9159 with PID 6606 found at Fri Jan 8 15:12:04 EST 2016 selfserv_9159 with PID 6606 started at Fri Jan 8 15:12:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7876: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 6606 >/dev/null 2>/dev/null selfserv_9159 with PID 6606 found at Fri Jan 8 15:12:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7877: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 6606 >/dev/null 2>/dev/null selfserv_9159 with PID 6606 found at Fri Jan 8 15:12:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7878: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 6606 >/dev/null 2>/dev/null selfserv_9159 with PID 6606 found at Fri Jan 8 15:12:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7879: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 6606 >/dev/null 2>/dev/null selfserv_9159 with PID 6606 found at Fri Jan 8 15:12:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7880: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 6606 >/dev/null 2>/dev/null selfserv_9159 with PID 6606 found at Fri Jan 8 15:12:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7881: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 6606 >/dev/null 2>/dev/null selfserv_9159 with PID 6606 found at Fri Jan 8 15:12:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7882: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 6606 >/dev/null 2>/dev/null selfserv_9159 with PID 6606 found at Fri Jan 8 15:12:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7883: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 6606 >/dev/null 2>/dev/null selfserv_9159 with PID 6606 found at Fri Jan 8 15:12:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7884: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 6606 >/dev/null 2>/dev/null selfserv_9159 with PID 6606 found at Fri Jan 8 15:12:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7885: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 6606 >/dev/null 2>/dev/null selfserv_9159 with PID 6606 found at Fri Jan 8 15:12:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7886: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 6606 >/dev/null 2>/dev/null selfserv_9159 with PID 6606 found at Fri Jan 8 15:12:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7887: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 6606 >/dev/null 2>/dev/null selfserv_9159 with PID 6606 found at Fri Jan 8 15:12:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7888: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 6606 >/dev/null 2>/dev/null selfserv_9159 with PID 6606 found at Fri Jan 8 15:12:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7889: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 6606 >/dev/null 2>/dev/null selfserv_9159 with PID 6606 found at Fri Jan 8 15:12:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7890: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 6606 at Fri Jan 8 15:12:12 EST 2016 kill -USR1 6606 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6606 killed at Fri Jan 8 15:12:12 EST 2016 ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 15:12:13 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:12:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:12:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7891: Waiting for Server - FAILED kill -0 7020 >/dev/null 2>/dev/null selfserv_9159 with PID 7020 found at Fri Jan 8 15:12:18 EST 2016 selfserv_9159 with PID 7020 started at Fri Jan 8 15:12:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7892: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 7020 >/dev/null 2>/dev/null selfserv_9159 with PID 7020 found at Fri Jan 8 15:12:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7893: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7020 >/dev/null 2>/dev/null selfserv_9159 with PID 7020 found at Fri Jan 8 15:12:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7894: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7020 >/dev/null 2>/dev/null selfserv_9159 with PID 7020 found at Fri Jan 8 15:12:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7895: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7020 >/dev/null 2>/dev/null selfserv_9159 with PID 7020 found at Fri Jan 8 15:12:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7896: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 7020 at Fri Jan 8 15:12:21 EST 2016 kill -USR1 7020 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7020 killed at Fri Jan 8 15:12:21 EST 2016 ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 15:12:21 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:12:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:12:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7897: Waiting for Server - FAILED kill -0 7185 >/dev/null 2>/dev/null selfserv_9159 with PID 7185 found at Fri Jan 8 15:12:27 EST 2016 selfserv_9159 with PID 7185 started at Fri Jan 8 15:12:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7898: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 7185 >/dev/null 2>/dev/null selfserv_9159 with PID 7185 found at Fri Jan 8 15:12:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7899: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7185 >/dev/null 2>/dev/null selfserv_9159 with PID 7185 found at Fri Jan 8 15:12:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7900: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7185 >/dev/null 2>/dev/null selfserv_9159 with PID 7185 found at Fri Jan 8 15:12:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7901: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7185 >/dev/null 2>/dev/null selfserv_9159 with PID 7185 found at Fri Jan 8 15:12:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7902: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 7185 >/dev/null 2>/dev/null selfserv_9159 with PID 7185 found at Fri Jan 8 15:12:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7903: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 7185 >/dev/null 2>/dev/null selfserv_9159 with PID 7185 found at Fri Jan 8 15:12:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7904: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7185 >/dev/null 2>/dev/null selfserv_9159 with PID 7185 found at Fri Jan 8 15:12:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7905: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7185 >/dev/null 2>/dev/null selfserv_9159 with PID 7185 found at Fri Jan 8 15:12:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7906: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7185 >/dev/null 2>/dev/null selfserv_9159 with PID 7185 found at Fri Jan 8 15:12:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7907: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 7185 >/dev/null 2>/dev/null selfserv_9159 with PID 7185 found at Fri Jan 8 15:12:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7908: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 7185 >/dev/null 2>/dev/null selfserv_9159 with PID 7185 found at Fri Jan 8 15:12:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7909: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7185 >/dev/null 2>/dev/null selfserv_9159 with PID 7185 found at Fri Jan 8 15:12:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7910: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7185 >/dev/null 2>/dev/null selfserv_9159 with PID 7185 found at Fri Jan 8 15:12:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7911: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7185 >/dev/null 2>/dev/null selfserv_9159 with PID 7185 found at Fri Jan 8 15:12:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7912: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 7185 at Fri Jan 8 15:12:35 EST 2016 kill -USR1 7185 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7185 killed at Fri Jan 8 15:12:36 EST 2016 ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 15:12:36 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:12:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:12:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7913: Waiting for Server - FAILED kill -0 7599 >/dev/null 2>/dev/null selfserv_9159 with PID 7599 found at Fri Jan 8 15:12:41 EST 2016 selfserv_9159 with PID 7599 started at Fri Jan 8 15:12:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7914: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 7599 >/dev/null 2>/dev/null selfserv_9159 with PID 7599 found at Fri Jan 8 15:12:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7915: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7599 >/dev/null 2>/dev/null selfserv_9159 with PID 7599 found at Fri Jan 8 15:12:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7916: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7599 >/dev/null 2>/dev/null selfserv_9159 with PID 7599 found at Fri Jan 8 15:12:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7917: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7599 >/dev/null 2>/dev/null selfserv_9159 with PID 7599 found at Fri Jan 8 15:12:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7918: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 7599 at Fri Jan 8 15:12:44 EST 2016 kill -USR1 7599 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7599 killed at Fri Jan 8 15:12:44 EST 2016 ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 15:12:45 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:12:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:12:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7919: Waiting for Server - FAILED kill -0 7764 >/dev/null 2>/dev/null selfserv_9159 with PID 7764 found at Fri Jan 8 15:12:50 EST 2016 selfserv_9159 with PID 7764 started at Fri Jan 8 15:12:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7920: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 7764 >/dev/null 2>/dev/null selfserv_9159 with PID 7764 found at Fri Jan 8 15:12:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7921: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7764 >/dev/null 2>/dev/null selfserv_9159 with PID 7764 found at Fri Jan 8 15:12:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7922: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7764 >/dev/null 2>/dev/null selfserv_9159 with PID 7764 found at Fri Jan 8 15:12:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7923: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7764 >/dev/null 2>/dev/null selfserv_9159 with PID 7764 found at Fri Jan 8 15:12:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7924: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 7764 >/dev/null 2>/dev/null selfserv_9159 with PID 7764 found at Fri Jan 8 15:12:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7925: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 7764 >/dev/null 2>/dev/null selfserv_9159 with PID 7764 found at Fri Jan 8 15:12:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7926: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 7764 >/dev/null 2>/dev/null selfserv_9159 with PID 7764 found at Fri Jan 8 15:12:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7927: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 7764 >/dev/null 2>/dev/null selfserv_9159 with PID 7764 found at Fri Jan 8 15:12:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7928: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 7764 >/dev/null 2>/dev/null selfserv_9159 with PID 7764 found at Fri Jan 8 15:12:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7929: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 7764 >/dev/null 2>/dev/null selfserv_9159 with PID 7764 found at Fri Jan 8 15:12:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7930: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 7764 >/dev/null 2>/dev/null selfserv_9159 with PID 7764 found at Fri Jan 8 15:12:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7931: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 7764 >/dev/null 2>/dev/null selfserv_9159 with PID 7764 found at Fri Jan 8 15:12:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7932: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 7764 at Fri Jan 8 15:12:57 EST 2016 kill -USR1 7764 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7764 killed at Fri Jan 8 15:12:58 EST 2016 ssl.sh: SSL Client Authentication - server bypass/client bypass - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 15:12:58 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:12:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:13:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7933: Waiting for Server - FAILED kill -0 8172 >/dev/null 2>/dev/null selfserv_9159 with PID 8172 found at Fri Jan 8 15:13:04 EST 2016 selfserv_9159 with PID 8172 started at Fri Jan 8 15:13:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7934: TLS Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 8172 at Fri Jan 8 15:13:04 EST 2016 kill -USR1 8172 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8172 killed at Fri Jan 8 15:13:05 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:13:05 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:13:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:13:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7935: Waiting for Server - FAILED kill -0 8241 >/dev/null 2>/dev/null selfserv_9159 with PID 8241 found at Fri Jan 8 15:13:11 EST 2016 selfserv_9159 with PID 8241 started at Fri Jan 8 15:13:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7936: TLS Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 8241 at Fri Jan 8 15:13:11 EST 2016 kill -USR1 8241 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8241 killed at Fri Jan 8 15:13:12 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:13:12 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:13:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:13:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7937: Waiting for Server - FAILED kill -0 8311 >/dev/null 2>/dev/null selfserv_9159 with PID 8311 found at Fri Jan 8 15:13:18 EST 2016 selfserv_9159 with PID 8311 started at Fri Jan 8 15:13:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7938: TLS Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 8311 at Fri Jan 8 15:13:18 EST 2016 kill -USR1 8311 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8311 killed at Fri Jan 8 15:13:18 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 15:13:19 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:13:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:13:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7939: Waiting for Server - FAILED kill -0 8380 >/dev/null 2>/dev/null selfserv_9159 with PID 8380 found at Fri Jan 8 15:13:24 EST 2016 selfserv_9159 with PID 8380 started at Fri Jan 8 15:13:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7940: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 8380 at Fri Jan 8 15:13:25 EST 2016 kill -USR1 8380 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8380 killed at Fri Jan 8 15:13:25 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:13:25 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:13:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:13:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7941: Waiting for Server - FAILED kill -0 8450 >/dev/null 2>/dev/null selfserv_9159 with PID 8450 found at Fri Jan 8 15:13:31 EST 2016 selfserv_9159 with PID 8450 started at Fri Jan 8 15:13:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7942: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 8450 at Fri Jan 8 15:13:32 EST 2016 kill -USR1 8450 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8450 killed at Fri Jan 8 15:13:32 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:13:32 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:13:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:13:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7943: Waiting for Server - FAILED kill -0 8520 >/dev/null 2>/dev/null selfserv_9159 with PID 8520 found at Fri Jan 8 15:13:38 EST 2016 selfserv_9159 with PID 8520 started at Fri Jan 8 15:13:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7944: TLS Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 8520 at Fri Jan 8 15:13:39 EST 2016 kill -USR1 8520 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8520 killed at Fri Jan 8 15:13:39 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 15:13:39 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:13:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:13:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7945: Waiting for Server - FAILED kill -0 8589 >/dev/null 2>/dev/null selfserv_9159 with PID 8589 found at Fri Jan 8 15:13:45 EST 2016 selfserv_9159 with PID 8589 started at Fri Jan 8 15:13:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7946: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 8589 at Fri Jan 8 15:13:46 EST 2016 kill -USR1 8589 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8589 killed at Fri Jan 8 15:13:46 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:13:46 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:13:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:13:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7947: Waiting for Server - FAILED kill -0 8658 >/dev/null 2>/dev/null selfserv_9159 with PID 8658 found at Fri Jan 8 15:13:52 EST 2016 selfserv_9159 with PID 8658 started at Fri Jan 8 15:13:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7948: SSL3 Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 8658 at Fri Jan 8 15:13:53 EST 2016 kill -USR1 8658 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8658 killed at Fri Jan 8 15:13:53 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:13:53 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:13:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:13:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7949: Waiting for Server - FAILED kill -0 8728 >/dev/null 2>/dev/null selfserv_9159 with PID 8728 found at Fri Jan 8 15:13:59 EST 2016 selfserv_9159 with PID 8728 started at Fri Jan 8 15:13:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7950: SSL3 Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 8728 at Fri Jan 8 15:13:59 EST 2016 kill -USR1 8728 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8728 killed at Fri Jan 8 15:14:00 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 15:14:00 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:14:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:14:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7951: Waiting for Server - FAILED kill -0 8797 >/dev/null 2>/dev/null selfserv_9159 with PID 8797 found at Fri Jan 8 15:14:06 EST 2016 selfserv_9159 with PID 8797 started at Fri Jan 8 15:14:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7952: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 8797 at Fri Jan 8 15:14:06 EST 2016 kill -USR1 8797 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8797 killed at Fri Jan 8 15:14:07 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:14:07 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:14:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:14:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7953: Waiting for Server - FAILED kill -0 8866 >/dev/null 2>/dev/null selfserv_9159 with PID 8866 found at Fri Jan 8 15:14:13 EST 2016 selfserv_9159 with PID 8866 started at Fri Jan 8 15:14:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7954: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 8866 at Fri Jan 8 15:14:13 EST 2016 kill -USR1 8866 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8866 killed at Fri Jan 8 15:14:14 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:14:14 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:14:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:14:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7955: Waiting for Server - FAILED kill -0 8936 >/dev/null 2>/dev/null selfserv_9159 with PID 8936 found at Fri Jan 8 15:14:20 EST 2016 selfserv_9159 with PID 8936 started at Fri Jan 8 15:14:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7956: SSL3 Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 8936 at Fri Jan 8 15:14:20 EST 2016 kill -USR1 8936 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8936 killed at Fri Jan 8 15:14:21 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 15:14:21 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:14:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:14:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7957: Waiting for Server - FAILED kill -0 9005 >/dev/null 2>/dev/null selfserv_9159 with PID 9005 found at Fri Jan 8 15:14:27 EST 2016 selfserv_9159 with PID 9005 started at Fri Jan 8 15:14:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7958: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 9005 at Fri Jan 8 15:14:27 EST 2016 kill -USR1 9005 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9005 killed at Fri Jan 8 15:14:27 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:14:28 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:14:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:14:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7959: Waiting for Server - FAILED kill -0 9074 >/dev/null 2>/dev/null selfserv_9159 with PID 9074 found at Fri Jan 8 15:14:33 EST 2016 selfserv_9159 with PID 9074 started at Fri Jan 8 15:14:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7960: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 9074 at Fri Jan 8 15:14:34 EST 2016 kill -USR1 9074 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9074 killed at Fri Jan 8 15:14:34 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:14:34 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:14:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:14:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7961: Waiting for Server - FAILED kill -0 9144 >/dev/null 2>/dev/null selfserv_9159 with PID 9144 found at Fri Jan 8 15:14:40 EST 2016 selfserv_9159 with PID 9144 started at Fri Jan 8 15:14:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7962: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 9144 at Fri Jan 8 15:14:41 EST 2016 kill -USR1 9144 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9144 killed at Fri Jan 8 15:14:41 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 15:14:41 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:14:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:14:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7963: Waiting for Server - FAILED kill -0 9213 >/dev/null 2>/dev/null selfserv_9159 with PID 9213 found at Fri Jan 8 15:14:47 EST 2016 selfserv_9159 with PID 9213 started at Fri Jan 8 15:14:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7964: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 9213 at Fri Jan 8 15:14:48 EST 2016 kill -USR1 9213 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9213 killed at Fri Jan 8 15:14:48 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:14:48 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:14:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:14:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7965: Waiting for Server - FAILED kill -0 9282 >/dev/null 2>/dev/null selfserv_9159 with PID 9282 found at Fri Jan 8 15:14:54 EST 2016 selfserv_9159 with PID 9282 started at Fri Jan 8 15:14:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7966: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 9282 at Fri Jan 8 15:14:55 EST 2016 kill -USR1 9282 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9282 killed at Fri Jan 8 15:14:55 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:14:55 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:14:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:15:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7967: Waiting for Server - FAILED kill -0 9352 >/dev/null 2>/dev/null selfserv_9159 with PID 9352 found at Fri Jan 8 15:15:01 EST 2016 selfserv_9159 with PID 9352 started at Fri Jan 8 15:15:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7968: TLS Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 9352 at Fri Jan 8 15:15:02 EST 2016 kill -USR1 9352 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9352 killed at Fri Jan 8 15:15:02 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 15:15:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:15:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:15:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7969: Waiting for Server - FAILED kill -0 9424 >/dev/null 2>/dev/null selfserv_9159 with PID 9424 found at Fri Jan 8 15:15:08 EST 2016 selfserv_9159 with PID 9424 started at Fri Jan 8 15:15:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7970: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 9424 at Fri Jan 8 15:15:08 EST 2016 kill -USR1 9424 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9424 killed at Fri Jan 8 15:15:09 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:15:09 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:15:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:15:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7971: Waiting for Server - FAILED kill -0 9493 >/dev/null 2>/dev/null selfserv_9159 with PID 9493 found at Fri Jan 8 15:15:15 EST 2016 selfserv_9159 with PID 9493 started at Fri Jan 8 15:15:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7972: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 9493 at Fri Jan 8 15:15:15 EST 2016 kill -USR1 9493 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9493 killed at Fri Jan 8 15:15:16 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:15:16 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:15:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:15:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7973: Waiting for Server - FAILED kill -0 9563 >/dev/null 2>/dev/null selfserv_9159 with PID 9563 found at Fri Jan 8 15:15:22 EST 2016 selfserv_9159 with PID 9563 started at Fri Jan 8 15:15:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7974: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 9563 at Fri Jan 8 15:15:22 EST 2016 kill -USR1 9563 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9563 killed at Fri Jan 8 15:15:23 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 15:15:23 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:15:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:15:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7975: Waiting for Server - FAILED kill -0 9632 >/dev/null 2>/dev/null selfserv_9159 with PID 9632 found at Fri Jan 8 15:15:29 EST 2016 selfserv_9159 with PID 9632 started at Fri Jan 8 15:15:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7976: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 9632 at Fri Jan 8 15:15:29 EST 2016 kill -USR1 9632 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9632 killed at Fri Jan 8 15:15:30 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:15:30 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:15:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:15:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7977: Waiting for Server - FAILED kill -0 9701 >/dev/null 2>/dev/null selfserv_9159 with PID 9701 found at Fri Jan 8 15:15:36 EST 2016 selfserv_9159 with PID 9701 started at Fri Jan 8 15:15:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7978: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 9701 at Fri Jan 8 15:15:36 EST 2016 kill -USR1 9701 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9701 killed at Fri Jan 8 15:15:37 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:15:37 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:15:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:15:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7979: Waiting for Server - FAILED kill -0 9771 >/dev/null 2>/dev/null selfserv_9159 with PID 9771 found at Fri Jan 8 15:15:42 EST 2016 selfserv_9159 with PID 9771 started at Fri Jan 8 15:15:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7980: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 9771 at Fri Jan 8 15:15:43 EST 2016 kill -USR1 9771 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9771 killed at Fri Jan 8 15:15:43 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 15:15:43 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:15:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:15:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7981: Waiting for Server - FAILED kill -0 9840 >/dev/null 2>/dev/null selfserv_9159 with PID 9840 found at Fri Jan 8 15:15:49 EST 2016 selfserv_9159 with PID 9840 started at Fri Jan 8 15:15:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7982: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 9840 at Fri Jan 8 15:15:50 EST 2016 kill -USR1 9840 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9840 killed at Fri Jan 8 15:15:50 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:15:50 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:15:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:15:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7983: Waiting for Server - FAILED kill -0 9909 >/dev/null 2>/dev/null selfserv_9159 with PID 9909 found at Fri Jan 8 15:15:56 EST 2016 selfserv_9159 with PID 9909 started at Fri Jan 8 15:15:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7984: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 9909 at Fri Jan 8 15:15:57 EST 2016 kill -USR1 9909 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9909 killed at Fri Jan 8 15:15:57 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:15:57 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:15:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:16:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7985: Waiting for Server - FAILED kill -0 9979 >/dev/null 2>/dev/null selfserv_9159 with PID 9979 found at Fri Jan 8 15:16:03 EST 2016 selfserv_9159 with PID 9979 started at Fri Jan 8 15:16:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7986: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 9979 at Fri Jan 8 15:16:04 EST 2016 kill -USR1 9979 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9979 killed at Fri Jan 8 15:16:04 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 15:16:04 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:16:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:16:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7987: Waiting for Server - FAILED kill -0 10048 >/dev/null 2>/dev/null selfserv_9159 with PID 10048 found at Fri Jan 8 15:16:10 EST 2016 selfserv_9159 with PID 10048 started at Fri Jan 8 15:16:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7988: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 10048 at Fri Jan 8 15:16:11 EST 2016 kill -USR1 10048 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10048 killed at Fri Jan 8 15:16:11 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:16:11 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:16:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:16:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7989: Waiting for Server - FAILED kill -0 10117 >/dev/null 2>/dev/null selfserv_9159 with PID 10117 found at Fri Jan 8 15:16:17 EST 2016 selfserv_9159 with PID 10117 started at Fri Jan 8 15:16:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7990: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 10117 at Fri Jan 8 15:16:18 EST 2016 kill -USR1 10117 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10117 killed at Fri Jan 8 15:16:18 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:16:18 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:16:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:16:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7991: Waiting for Server - FAILED kill -0 10187 >/dev/null 2>/dev/null selfserv_9159 with PID 10187 found at Fri Jan 8 15:16:24 EST 2016 selfserv_9159 with PID 10187 started at Fri Jan 8 15:16:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7992: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 10187 at Fri Jan 8 15:16:24 EST 2016 kill -USR1 10187 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10187 killed at Fri Jan 8 15:16:25 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:16:25 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:16:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:16:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7993: Waiting for Server - FAILED kill -0 10271 >/dev/null 2>/dev/null selfserv_9159 with PID 10271 found at Fri Jan 8 15:16:31 EST 2016 selfserv_9159 with PID 10271 started at Fri Jan 8 15:16:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7994: TLS Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 10271 at Fri Jan 8 15:16:31 EST 2016 kill -USR1 10271 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10271 killed at Fri Jan 8 15:16:32 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:16:32 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:16:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:16:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7995: Waiting for Server - FAILED kill -0 10341 >/dev/null 2>/dev/null selfserv_9159 with PID 10341 found at Fri Jan 8 15:16:38 EST 2016 selfserv_9159 with PID 10341 started at Fri Jan 8 15:16:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7996: TLS Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 10341 at Fri Jan 8 15:16:38 EST 2016 kill -USR1 10341 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10341 killed at Fri Jan 8 15:16:39 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:16:39 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:16:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:16:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7997: Waiting for Server - FAILED kill -0 10411 >/dev/null 2>/dev/null selfserv_9159 with PID 10411 found at Fri Jan 8 15:16:45 EST 2016 selfserv_9159 with PID 10411 started at Fri Jan 8 15:16:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7998: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 10411 at Fri Jan 8 15:16:45 EST 2016 kill -USR1 10411 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10411 killed at Fri Jan 8 15:16:46 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:16:46 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:16:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:16:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7999: Waiting for Server - FAILED kill -0 10480 >/dev/null 2>/dev/null selfserv_9159 with PID 10480 found at Fri Jan 8 15:16:52 EST 2016 selfserv_9159 with PID 10480 started at Fri Jan 8 15:16:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8000: TLS Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 10480 at Fri Jan 8 15:16:52 EST 2016 kill -USR1 10480 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10480 killed at Fri Jan 8 15:16:53 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:16:53 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:16:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:16:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8001: Waiting for Server - FAILED kill -0 10549 >/dev/null 2>/dev/null selfserv_9159 with PID 10549 found at Fri Jan 8 15:16:59 EST 2016 selfserv_9159 with PID 10549 started at Fri Jan 8 15:16:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8002: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 10549 at Fri Jan 8 15:16:59 EST 2016 kill -USR1 10549 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10549 killed at Fri Jan 8 15:16:59 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:17:00 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:17:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:17:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8003: Waiting for Server - FAILED kill -0 10619 >/dev/null 2>/dev/null selfserv_9159 with PID 10619 found at Fri Jan 8 15:17:05 EST 2016 selfserv_9159 with PID 10619 started at Fri Jan 8 15:17:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8004: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 10619 at Fri Jan 8 15:17:06 EST 2016 kill -USR1 10619 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10619 killed at Fri Jan 8 15:17:06 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:17:06 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:17:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:17:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8005: Waiting for Server - FAILED kill -0 10688 >/dev/null 2>/dev/null selfserv_9159 with PID 10688 found at Fri Jan 8 15:17:12 EST 2016 selfserv_9159 with PID 10688 started at Fri Jan 8 15:17:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8006: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 10688 at Fri Jan 8 15:17:13 EST 2016 kill -USR1 10688 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10688 killed at Fri Jan 8 15:17:13 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:17:13 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:17:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:17:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8007: Waiting for Server - FAILED kill -0 10757 >/dev/null 2>/dev/null selfserv_9159 with PID 10757 found at Fri Jan 8 15:17:19 EST 2016 selfserv_9159 with PID 10757 started at Fri Jan 8 15:17:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V :ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8008: SSL3 Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 10757 at Fri Jan 8 15:17:20 EST 2016 kill -USR1 10757 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10757 killed at Fri Jan 8 15:17:20 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:17:20 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:17:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:17:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8009: Waiting for Server - FAILED kill -0 10827 >/dev/null 2>/dev/null selfserv_9159 with PID 10827 found at Fri Jan 8 15:17:26 EST 2016 selfserv_9159 with PID 10827 started at Fri Jan 8 15:17:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8010: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 10827 at Fri Jan 8 15:17:27 EST 2016 kill -USR1 10827 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10827 killed at Fri Jan 8 15:17:27 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:17:27 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:17:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:17:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8011: Waiting for Server - FAILED kill -0 10896 >/dev/null 2>/dev/null selfserv_9159 with PID 10896 found at Fri Jan 8 15:17:33 EST 2016 selfserv_9159 with PID 10896 started at Fri Jan 8 15:17:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8012: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 10896 at Fri Jan 8 15:17:34 EST 2016 kill -USR1 10896 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10896 killed at Fri Jan 8 15:17:34 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:17:34 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:17:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:17:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8013: Waiting for Server - FAILED kill -0 10965 >/dev/null 2>/dev/null selfserv_9159 with PID 10965 found at Fri Jan 8 15:17:40 EST 2016 selfserv_9159 with PID 10965 started at Fri Jan 8 15:17:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8014: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 10965 at Fri Jan 8 15:17:40 EST 2016 kill -USR1 10965 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10965 killed at Fri Jan 8 15:17:41 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:17:41 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:17:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:17:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8015: Waiting for Server - FAILED kill -0 11035 >/dev/null 2>/dev/null selfserv_9159 with PID 11035 found at Fri Jan 8 15:17:47 EST 2016 selfserv_9159 with PID 11035 started at Fri Jan 8 15:17:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8016: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11035 at Fri Jan 8 15:17:47 EST 2016 kill -USR1 11035 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11035 killed at Fri Jan 8 15:17:48 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:17:48 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:17:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:17:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8017: Waiting for Server - FAILED kill -0 11104 >/dev/null 2>/dev/null selfserv_9159 with PID 11104 found at Fri Jan 8 15:17:54 EST 2016 selfserv_9159 with PID 11104 started at Fri Jan 8 15:17:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8018: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11104 at Fri Jan 8 15:17:54 EST 2016 kill -USR1 11104 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11104 killed at Fri Jan 8 15:17:55 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:17:55 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:17:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:18:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8019: Waiting for Server - FAILED kill -0 11173 >/dev/null 2>/dev/null selfserv_9159 with PID 11173 found at Fri Jan 8 15:18:01 EST 2016 selfserv_9159 with PID 11173 started at Fri Jan 8 15:18:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8020: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11173 at Fri Jan 8 15:18:01 EST 2016 kill -USR1 11173 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11173 killed at Fri Jan 8 15:18:02 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:18:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:18:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:18:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8021: Waiting for Server - FAILED kill -0 11243 >/dev/null 2>/dev/null selfserv_9159 with PID 11243 found at Fri Jan 8 15:18:08 EST 2016 selfserv_9159 with PID 11243 started at Fri Jan 8 15:18:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8022: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 11243 at Fri Jan 8 15:18:08 EST 2016 kill -USR1 11243 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11243 killed at Fri Jan 8 15:18:08 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:18:09 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:18:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:18:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8023: Waiting for Server - FAILED kill -0 11312 >/dev/null 2>/dev/null selfserv_9159 with PID 11312 found at Fri Jan 8 15:18:14 EST 2016 selfserv_9159 with PID 11312 started at Fri Jan 8 15:18:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8024: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11312 at Fri Jan 8 15:18:15 EST 2016 kill -USR1 11312 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11312 killed at Fri Jan 8 15:18:15 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:18:15 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:18:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:18:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8025: Waiting for Server - FAILED kill -0 11381 >/dev/null 2>/dev/null selfserv_9159 with PID 11381 found at Fri Jan 8 15:18:21 EST 2016 selfserv_9159 with PID 11381 started at Fri Jan 8 15:18:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8026: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11381 at Fri Jan 8 15:18:22 EST 2016 kill -USR1 11381 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11381 killed at Fri Jan 8 15:18:22 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:18:22 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:18:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:18:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8027: Waiting for Server - FAILED kill -0 11451 >/dev/null 2>/dev/null selfserv_9159 with PID 11451 found at Fri Jan 8 15:18:28 EST 2016 selfserv_9159 with PID 11451 started at Fri Jan 8 15:18:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8028: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11451 at Fri Jan 8 15:18:29 EST 2016 kill -USR1 11451 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11451 killed at Fri Jan 8 15:18:29 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:18:29 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:18:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:18:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8029: Waiting for Server - FAILED kill -0 11520 >/dev/null 2>/dev/null selfserv_9159 with PID 11520 found at Fri Jan 8 15:18:35 EST 2016 selfserv_9159 with PID 11520 started at Fri Jan 8 15:18:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8030: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 11520 at Fri Jan 8 15:18:36 EST 2016 kill -USR1 11520 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11520 killed at Fri Jan 8 15:18:36 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:18:36 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:18:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:18:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8031: Waiting for Server - FAILED kill -0 11589 >/dev/null 2>/dev/null selfserv_9159 with PID 11589 found at Fri Jan 8 15:18:42 EST 2016 selfserv_9159 with PID 11589 started at Fri Jan 8 15:18:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8032: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11589 at Fri Jan 8 15:18:43 EST 2016 kill -USR1 11589 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11589 killed at Fri Jan 8 15:18:43 EST 2016 ssl.sh: TLS Server hello response without SNI ---- selfserv_9159 starting at Fri Jan 8 15:18:43 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:18:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:18:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8033: Waiting for Server - FAILED kill -0 11680 >/dev/null 2>/dev/null selfserv_9159 with PID 11680 found at Fri Jan 8 15:18:49 EST 2016 selfserv_9159 with PID 11680 started at Fri Jan 8 15:18:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8034: TLS Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11680 at Fri Jan 8 15:18:50 EST 2016 kill -USR1 11680 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11680 killed at Fri Jan 8 15:18:50 EST 2016 ssl.sh: TLS Server hello response with SNI ---- selfserv_9159 starting at Fri Jan 8 15:18:50 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:18:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:18:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8035: Waiting for Server - FAILED kill -0 11755 >/dev/null 2>/dev/null selfserv_9159 with PID 11755 found at Fri Jan 8 15:18:56 EST 2016 selfserv_9159 with PID 11755 started at Fri Jan 8 15:18:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8036: TLS Server hello response with SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11755 at Fri Jan 8 15:18:57 EST 2016 kill -USR1 11755 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11755 killed at Fri Jan 8 15:18:57 EST 2016 ssl.sh: TLS Server response with alert ---- selfserv_9159 starting at Fri Jan 8 15:18:57 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:18:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:19:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8037: Waiting for Server - FAILED kill -0 11833 >/dev/null 2>/dev/null selfserv_9159 with PID 11833 found at Fri Jan 8 15:19:03 EST 2016 selfserv_9159 with PID 11833 started at Fri Jan 8 15:19:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8038: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 11833 at Fri Jan 8 15:19:03 EST 2016 kill -USR1 11833 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11833 killed at Fri Jan 8 15:19:04 EST 2016 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9159 starting at Fri Jan 8 15:19:04 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:19:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:19:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8039: Waiting for Server - FAILED kill -0 11909 >/dev/null 2>/dev/null selfserv_9159 with PID 11909 found at Fri Jan 8 15:19:10 EST 2016 selfserv_9159 with PID 11909 started at Fri Jan 8 15:19:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8040: SSL3 Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 11909 at Fri Jan 8 15:19:10 EST 2016 kill -USR1 11909 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11909 killed at Fri Jan 8 15:19:11 EST 2016 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9159 starting at Fri Jan 8 15:19:11 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:19:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:19:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8041: Waiting for Server - FAILED kill -0 11984 >/dev/null 2>/dev/null selfserv_9159 with PID 11984 found at Fri Jan 8 15:19:17 EST 2016 selfserv_9159 with PID 11984 started at Fri Jan 8 15:19:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c vssl3 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8042: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 11984 at Fri Jan 8 15:19:17 EST 2016 kill -USR1 11984 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11984 killed at Fri Jan 8 15:19:18 EST 2016 ssl.sh: TLS Server hello response without SNI ---- selfserv_9159 starting at Fri Jan 8 15:19:18 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:19:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:19:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8043: Waiting for Server - FAILED kill -0 12059 >/dev/null 2>/dev/null selfserv_9159 with PID 12059 found at Fri Jan 8 15:19:24 EST 2016 selfserv_9159 with PID 12059 started at Fri Jan 8 15:19:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8044: TLS Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 12059 at Fri Jan 8 15:19:24 EST 2016 kill -USR1 12059 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12059 killed at Fri Jan 8 15:19:25 EST 2016 ssl.sh: TLS Server hello response with SNI ---- selfserv_9159 starting at Fri Jan 8 15:19:25 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:19:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:19:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8045: Waiting for Server - FAILED kill -0 12135 >/dev/null 2>/dev/null selfserv_9159 with PID 12135 found at Fri Jan 8 15:19:31 EST 2016 selfserv_9159 with PID 12135 started at Fri Jan 8 15:19:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8046: TLS Server hello response with SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 12135 at Fri Jan 8 15:19:31 EST 2016 kill -USR1 12135 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12135 killed at Fri Jan 8 15:19:32 EST 2016 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9159 starting at Fri Jan 8 15:19:32 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:19:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:19:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8047: Waiting for Server - FAILED kill -0 12210 >/dev/null 2>/dev/null selfserv_9159 with PID 12210 found at Fri Jan 8 15:19:38 EST 2016 selfserv_9159 with PID 12210 started at Fri Jan 8 15:19:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8048: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 12210 at Fri Jan 8 15:19:38 EST 2016 kill -USR1 12210 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12210 killed at Fri Jan 8 15:19:39 EST 2016 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9159 starting at Fri Jan 8 15:19:39 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:19:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:19:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8049: Waiting for Server - FAILED kill -0 12285 >/dev/null 2>/dev/null selfserv_9159 with PID 12285 found at Fri Jan 8 15:19:45 EST 2016 selfserv_9159 with PID 12285 started at Fri Jan 8 15:19:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8050: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 12285 at Fri Jan 8 15:19:45 EST 2016 kill -USR1 12285 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12285 killed at Fri Jan 8 15:19:45 EST 2016 ssl.sh: TLS Server response with alert ---- selfserv_9159 starting at Fri Jan 8 15:19:46 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:19:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:19:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8051: Waiting for Server - FAILED kill -0 12362 >/dev/null 2>/dev/null selfserv_9159 with PID 12362 found at Fri Jan 8 15:19:51 EST 2016 selfserv_9159 with PID 12362 started at Fri Jan 8 15:19:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8052: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 12362 at Fri Jan 8 15:19:52 EST 2016 kill -USR1 12362 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12362 killed at Fri Jan 8 15:19:52 EST 2016 ssl.sh: SSL Cert Status (OCSP Stapling) - server bypass/client bypass - with ECC =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9159 starting at Fri Jan 8 15:19:52 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T good \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:19:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:19:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8053: Waiting for Server - FAILED kill -0 12423 >/dev/null 2>/dev/null selfserv_9159 with PID 12423 found at Fri Jan 8 15:19:58 EST 2016 selfserv_9159 with PID 12423 started at Fri Jan 8 15:19:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8054: OCSP stapling, signed response, good status produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 12423 at Fri Jan 8 15:19:59 EST 2016 kill -USR1 12423 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12423 killed at Fri Jan 8 15:19:59 EST 2016 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9159 starting at Fri Jan 8 15:19:59 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T revoked \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:19:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:20:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8055: Waiting for Server - FAILED kill -0 12484 >/dev/null 2>/dev/null selfserv_9159 with PID 12484 found at Fri Jan 8 15:20:05 EST 2016 selfserv_9159 with PID 12484 started at Fri Jan 8 15:20:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8056: OCSP stapling, signed response, revoked status produced a returncode of 1, expected is 3 - FAILED trying to kill selfserv_9159 with PID 12484 at Fri Jan 8 15:20:06 EST 2016 kill -USR1 12484 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12484 killed at Fri Jan 8 15:20:06 EST 2016 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9159 starting at Fri Jan 8 15:20:06 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T unknown \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:20:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:20:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8057: Waiting for Server - FAILED kill -0 12546 >/dev/null 2>/dev/null selfserv_9159 with PID 12546 found at Fri Jan 8 15:20:12 EST 2016 selfserv_9159 with PID 12546 started at Fri Jan 8 15:20:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8058: OCSP stapling, signed response, unknown status produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9159 with PID 12546 at Fri Jan 8 15:20:13 EST 2016 kill -USR1 12546 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12546 killed at Fri Jan 8 15:20:13 EST 2016 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9159 starting at Fri Jan 8 15:20:13 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T failure \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:20:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:20:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8059: Waiting for Server - FAILED kill -0 12607 >/dev/null 2>/dev/null selfserv_9159 with PID 12607 found at Fri Jan 8 15:20:19 EST 2016 selfserv_9159 with PID 12607 started at Fri Jan 8 15:20:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8060: OCSP stapling, unsigned failure response produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9159 with PID 12607 at Fri Jan 8 15:20:19 EST 2016 kill -USR1 12607 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12607 killed at Fri Jan 8 15:20:20 EST 2016 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9159 starting at Fri Jan 8 15:20:20 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T badsig \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:20:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:20:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8061: Waiting for Server - FAILED kill -0 12668 >/dev/null 2>/dev/null selfserv_9159 with PID 12668 found at Fri Jan 8 15:20:26 EST 2016 selfserv_9159 with PID 12668 started at Fri Jan 8 15:20:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8062: OCSP stapling, good status, bad signature produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9159 with PID 12668 at Fri Jan 8 15:20:26 EST 2016 kill -USR1 12668 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12668 killed at Fri Jan 8 15:20:27 EST 2016 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9159 starting at Fri Jan 8 15:20:27 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T corrupted \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:20:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:20:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8063: Waiting for Server - FAILED kill -0 12730 >/dev/null 2>/dev/null selfserv_9159 with PID 12730 found at Fri Jan 8 15:20:33 EST 2016 selfserv_9159 with PID 12730 started at Fri Jan 8 15:20:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8064: OCSP stapling, invalid cert status data produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9159 with PID 12730 at Fri Jan 8 15:20:33 EST 2016 kill -USR1 12730 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12730 killed at Fri Jan 8 15:20:34 EST 2016 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9159 starting at Fri Jan 8 15:20:34 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:20:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:20:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8065: Waiting for Server - FAILED kill -0 12791 >/dev/null 2>/dev/null selfserv_9159 with PID 12791 found at Fri Jan 8 15:20:40 EST 2016 selfserv_9159 with PID 12791 started at Fri Jan 8 15:20:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8066: Valid cert, Server doesn't staple produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9159 with PID 12791 at Fri Jan 8 15:20:40 EST 2016 kill -USR1 12791 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12791 killed at Fri Jan 8 15:20:41 EST 2016 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9159 starting at Fri Jan 8 15:20:41 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T random \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:20:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:20:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8067: Waiting for Server - FAILED kill -0 12852 >/dev/null 2>/dev/null selfserv_9159 with PID 12852 found at Fri Jan 8 15:20:46 EST 2016 selfserv_9159 with PID 12852 started at Fri Jan 8 15:20:46 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss \ -c 1000 -V ssl3: -N -T localhost.localdomain strsclnt started at Fri Jan 8 15:20:46 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:20:47 EST 2016 ssl.sh: #8068: Stress OCSP stapling, server uses random status produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 12852 at Fri Jan 8 15:20:47 EST 2016 kill -USR1 12852 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12852 killed at Fri Jan 8 15:20:47 EST 2016 ssl.sh: SSL Stress Test - server bypass/client bypass - with ECC =============================== ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9159 starting at Fri Jan 8 15:20:48 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:20:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:20:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8069: Waiting for Server - FAILED kill -0 13005 >/dev/null 2>/dev/null selfserv_9159 with PID 13005 found at Fri Jan 8 15:20:54 EST 2016 selfserv_9159 with PID 13005 started at Fri Jan 8 15:20:54 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -c 1000 -C c -V :ssl3 \ localhost.localdomain strsclnt started at Fri Jan 8 15:20:54 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:20:54 EST 2016 ssl.sh: #8070: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 13005 at Fri Jan 8 15:20:54 EST 2016 kill -USR1 13005 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13005 killed at Fri Jan 8 15:20:55 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9159 starting at Fri Jan 8 15:20:55 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:20:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:21:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8071: Waiting for Server - FAILED kill -0 13084 >/dev/null 2>/dev/null selfserv_9159 with PID 13084 found at Fri Jan 8 15:21:01 EST 2016 selfserv_9159 with PID 13084 started at Fri Jan 8 15:21:01 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Fri Jan 8 15:21:01 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:21:01 EST 2016 ssl.sh: #8072: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 13084 at Fri Jan 8 15:21:01 EST 2016 kill -USR1 13084 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13084 killed at Fri Jan 8 15:21:02 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9159 starting at Fri Jan 8 15:21:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:21:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:21:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8073: Waiting for Server - FAILED kill -0 13163 >/dev/null 2>/dev/null selfserv_9159 with PID 13163 found at Fri Jan 8 15:21:08 EST 2016 selfserv_9159 with PID 13163 started at Fri Jan 8 15:21:08 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Fri Jan 8 15:21:08 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:21:08 EST 2016 ssl.sh: #8074: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 13163 at Fri Jan 8 15:21:08 EST 2016 kill -USR1 13163 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13163 killed at Fri Jan 8 15:21:09 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9159 starting at Fri Jan 8 15:21:09 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:21:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:21:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8075: Waiting for Server - FAILED kill -0 13243 >/dev/null 2>/dev/null selfserv_9159 with PID 13243 found at Fri Jan 8 15:21:15 EST 2016 selfserv_9159 with PID 13243 started at Fri Jan 8 15:21:15 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 15:21:15 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:21:15 EST 2016 ssl.sh: #8076: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 13243 at Fri Jan 8 15:21:15 EST 2016 kill -USR1 13243 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13243 killed at Fri Jan 8 15:21:16 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9159 starting at Fri Jan 8 15:21:16 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:21:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:21:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8077: Waiting for Server - FAILED kill -0 13322 >/dev/null 2>/dev/null selfserv_9159 with PID 13322 found at Fri Jan 8 15:21:22 EST 2016 selfserv_9159 with PID 13322 started at Fri Jan 8 15:21:22 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Fri Jan 8 15:21:22 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:21:22 EST 2016 ssl.sh: #8078: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 13322 at Fri Jan 8 15:21:22 EST 2016 kill -USR1 13322 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13322 killed at Fri Jan 8 15:21:23 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9159 starting at Fri Jan 8 15:21:23 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:21:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:21:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8079: Waiting for Server - FAILED kill -0 13401 >/dev/null 2>/dev/null selfserv_9159 with PID 13401 found at Fri Jan 8 15:21:29 EST 2016 selfserv_9159 with PID 13401 started at Fri Jan 8 15:21:29 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 15:21:29 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:21:29 EST 2016 ssl.sh: #8080: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 13401 at Fri Jan 8 15:21:29 EST 2016 kill -USR1 13401 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13401 killed at Fri Jan 8 15:21:30 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9159 starting at Fri Jan 8 15:21:30 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:21:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:21:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8081: Waiting for Server - FAILED kill -0 13481 >/dev/null 2>/dev/null selfserv_9159 with PID 13481 found at Fri Jan 8 15:21:36 EST 2016 selfserv_9159 with PID 13481 started at Fri Jan 8 15:21:36 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 15:21:36 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:21:36 EST 2016 ssl.sh: #8082: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 13481 at Fri Jan 8 15:21:36 EST 2016 kill -USR1 13481 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13481 killed at Fri Jan 8 15:21:37 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9159 starting at Fri Jan 8 15:21:37 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:21:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:21:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8083: Waiting for Server - FAILED kill -0 13566 >/dev/null 2>/dev/null selfserv_9159 with PID 13566 found at Fri Jan 8 15:21:43 EST 2016 selfserv_9159 with PID 13566 started at Fri Jan 8 15:21:43 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 15:21:43 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:21:43 EST 2016 ssl.sh: #8084: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 13566 at Fri Jan 8 15:21:43 EST 2016 kill -USR1 13566 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13566 killed at Fri Jan 8 15:21:44 EST 2016 ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 15:21:44 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:21:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:21:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8085: Waiting for Server - FAILED kill -0 13673 >/dev/null 2>/dev/null selfserv_9159 with PID 13673 found at Fri Jan 8 15:21:50 EST 2016 selfserv_9159 with PID 13673 started at Fri Jan 8 15:21:50 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -c 100 -C c -V :ssl3 -N -n TestUser \ localhost.localdomain strsclnt started at Fri Jan 8 15:21:50 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:21:51 EST 2016 ssl.sh: #8086: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 13673 at Fri Jan 8 15:21:51 EST 2016 kill -USR1 13673 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13673 killed at Fri Jan 8 15:21:51 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 15:21:51 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:21:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:21:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8087: Waiting for Server - FAILED kill -0 13753 >/dev/null 2>/dev/null selfserv_9159 with PID 13753 found at Fri Jan 8 15:21:57 EST 2016 selfserv_9159 with PID 13753 started at Fri Jan 8 15:21:57 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Fri Jan 8 15:21:57 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:21:58 EST 2016 ssl.sh: #8088: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 13753 at Fri Jan 8 15:21:58 EST 2016 kill -USR1 13753 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13753 killed at Fri Jan 8 15:21:58 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9159 starting at Fri Jan 8 15:21:58 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:21:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:22:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8089: Waiting for Server - FAILED kill -0 13832 >/dev/null 2>/dev/null selfserv_9159 with PID 13832 found at Fri Jan 8 15:22:04 EST 2016 selfserv_9159 with PID 13832 started at Fri Jan 8 15:22:04 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Fri Jan 8 15:22:04 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:22:05 EST 2016 ssl.sh: #8090: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 13832 at Fri Jan 8 15:22:05 EST 2016 kill -USR1 13832 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13832 killed at Fri Jan 8 15:22:05 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9159 starting at Fri Jan 8 15:22:05 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:22:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:22:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8091: Waiting for Server - FAILED kill -0 13912 >/dev/null 2>/dev/null selfserv_9159 with PID 13912 found at Fri Jan 8 15:22:11 EST 2016 selfserv_9159 with PID 13912 started at Fri Jan 8 15:22:11 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Fri Jan 8 15:22:11 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:22:12 EST 2016 ssl.sh: #8092: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 13912 at Fri Jan 8 15:22:12 EST 2016 kill -USR1 13912 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13912 killed at Fri Jan 8 15:22:12 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9159 starting at Fri Jan 8 15:22:12 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:22:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:22:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8093: Waiting for Server - FAILED kill -0 13991 >/dev/null 2>/dev/null selfserv_9159 with PID 13991 found at Fri Jan 8 15:22:18 EST 2016 selfserv_9159 with PID 13991 started at Fri Jan 8 15:22:18 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 15:22:18 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:22:19 EST 2016 ssl.sh: #8094: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 13991 at Fri Jan 8 15:22:19 EST 2016 kill -USR1 13991 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13991 killed at Fri Jan 8 15:22:19 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9159 starting at Fri Jan 8 15:22:19 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:22:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:22:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8095: Waiting for Server - FAILED kill -0 14070 >/dev/null 2>/dev/null selfserv_9159 with PID 14070 found at Fri Jan 8 15:22:25 EST 2016 selfserv_9159 with PID 14070 started at Fri Jan 8 15:22:25 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 15:22:25 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:22:26 EST 2016 ssl.sh: #8096: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 14070 at Fri Jan 8 15:22:26 EST 2016 kill -USR1 14070 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14070 killed at Fri Jan 8 15:22:26 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9159 starting at Fri Jan 8 15:22:26 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:22:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:22:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8097: Waiting for Server - FAILED kill -0 14150 >/dev/null 2>/dev/null selfserv_9159 with PID 14150 found at Fri Jan 8 15:22:32 EST 2016 selfserv_9159 with PID 14150 started at Fri Jan 8 15:22:32 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 15:22:32 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:22:33 EST 2016 ssl.sh: #8098: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 14150 at Fri Jan 8 15:22:33 EST 2016 kill -USR1 14150 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14150 killed at Fri Jan 8 15:22:33 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9159 starting at Fri Jan 8 15:22:33 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:22:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:22:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8099: Waiting for Server - FAILED kill -0 14235 >/dev/null 2>/dev/null selfserv_9159 with PID 14235 found at Fri Jan 8 15:22:39 EST 2016 selfserv_9159 with PID 14235 started at Fri Jan 8 15:22:39 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 15:22:39 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:22:40 EST 2016 ssl.sh: #8100: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 14235 at Fri Jan 8 15:22:40 EST 2016 kill -USR1 14235 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14235 killed at Fri Jan 8 15:22:40 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9159 starting at Fri Jan 8 15:22:40 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:22:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:22:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8101: Waiting for Server - FAILED kill -0 14320 >/dev/null 2>/dev/null selfserv_9159 with PID 14320 found at Fri Jan 8 15:22:46 EST 2016 selfserv_9159 with PID 14320 started at Fri Jan 8 15:22:46 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Fri Jan 8 15:22:46 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:22:47 EST 2016 ssl.sh: #8102: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 14320 at Fri Jan 8 15:22:47 EST 2016 kill -USR1 14320 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14320 killed at Fri Jan 8 15:22:47 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 15:22:47 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:22:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:22:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8103: Waiting for Server - FAILED kill -0 14421 >/dev/null 2>/dev/null selfserv_9159 with PID 14421 found at Fri Jan 8 15:22:53 EST 2016 selfserv_9159 with PID 14421 started at Fri Jan 8 15:22:53 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Fri Jan 8 15:22:53 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:22:54 EST 2016 ssl.sh: #8104: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 14421 at Fri Jan 8 15:22:54 EST 2016 kill -USR1 14421 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14421 killed at Fri Jan 8 15:22:54 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 15:22:54 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:22:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:23:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8105: Waiting for Server - FAILED kill -0 14500 >/dev/null 2>/dev/null selfserv_9159 with PID 14500 found at Fri Jan 8 15:23:00 EST 2016 selfserv_9159 with PID 14500 started at Fri Jan 8 15:23:00 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Fri Jan 8 15:23:00 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:23:01 EST 2016 ssl.sh: #8106: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 14500 at Fri Jan 8 15:23:01 EST 2016 kill -USR1 14500 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14500 killed at Fri Jan 8 15:23:01 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9159 starting at Fri Jan 8 15:23:01 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:23:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:23:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8107: Waiting for Server - FAILED kill -0 14579 >/dev/null 2>/dev/null selfserv_9159 with PID 14579 found at Fri Jan 8 15:23:07 EST 2016 selfserv_9159 with PID 14579 started at Fri Jan 8 15:23:07 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Fri Jan 8 15:23:07 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:23:08 EST 2016 ssl.sh: #8108: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 14579 at Fri Jan 8 15:23:08 EST 2016 kill -USR1 14579 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14579 killed at Fri Jan 8 15:23:08 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 15:23:08 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:23:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:23:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8109: Waiting for Server - FAILED kill -0 14659 >/dev/null 2>/dev/null selfserv_9159 with PID 14659 found at Fri Jan 8 15:23:14 EST 2016 selfserv_9159 with PID 14659 started at Fri Jan 8 15:23:14 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Fri Jan 8 15:23:14 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:23:15 EST 2016 ssl.sh: #8110: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 14659 at Fri Jan 8 15:23:15 EST 2016 kill -USR1 14659 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14659 killed at Fri Jan 8 15:23:15 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 15:23:15 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:23:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:23:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8111: Waiting for Server - FAILED kill -0 14738 >/dev/null 2>/dev/null selfserv_9159 with PID 14738 found at Fri Jan 8 15:23:21 EST 2016 selfserv_9159 with PID 14738 started at Fri Jan 8 15:23:21 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Fri Jan 8 15:23:21 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:23:22 EST 2016 ssl.sh: #8112: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 14738 at Fri Jan 8 15:23:22 EST 2016 kill -USR1 14738 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14738 killed at Fri Jan 8 15:23:22 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9159 starting at Fri Jan 8 15:23:22 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:23:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:23:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8113: Waiting for Server - FAILED kill -0 14817 >/dev/null 2>/dev/null selfserv_9159 with PID 14817 found at Fri Jan 8 15:23:28 EST 2016 selfserv_9159 with PID 14817 started at Fri Jan 8 15:23:28 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Fri Jan 8 15:23:28 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:23:29 EST 2016 ssl.sh: #8114: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 14817 at Fri Jan 8 15:23:29 EST 2016 kill -USR1 14817 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14817 killed at Fri Jan 8 15:23:29 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9159 starting at Fri Jan 8 15:23:30 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:23:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:23:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8115: Waiting for Server - FAILED kill -0 14897 >/dev/null 2>/dev/null selfserv_9159 with PID 14897 found at Fri Jan 8 15:23:35 EST 2016 selfserv_9159 with PID 14897 started at Fri Jan 8 15:23:35 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Fri Jan 8 15:23:35 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:23:36 EST 2016 ssl.sh: #8116: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 14897 at Fri Jan 8 15:23:36 EST 2016 kill -USR1 14897 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14897 killed at Fri Jan 8 15:23:36 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9159 starting at Fri Jan 8 15:23:37 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:23:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:23:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8117: Waiting for Server - FAILED kill -0 14976 >/dev/null 2>/dev/null selfserv_9159 with PID 14976 found at Fri Jan 8 15:23:42 EST 2016 selfserv_9159 with PID 14976 started at Fri Jan 8 15:23:42 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Fri Jan 8 15:23:42 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:23:43 EST 2016 ssl.sh: #8118: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 14976 at Fri Jan 8 15:23:43 EST 2016 kill -USR1 14976 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14976 killed at Fri Jan 8 15:23:43 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9159 starting at Fri Jan 8 15:23:44 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:23:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:23:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8119: Waiting for Server - FAILED kill -0 15055 >/dev/null 2>/dev/null selfserv_9159 with PID 15055 found at Fri Jan 8 15:23:49 EST 2016 selfserv_9159 with PID 15055 started at Fri Jan 8 15:23:49 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Fri Jan 8 15:23:49 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:23:50 EST 2016 ssl.sh: #8120: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 15055 at Fri Jan 8 15:23:50 EST 2016 kill -USR1 15055 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15055 killed at Fri Jan 8 15:23:50 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9159 starting at Fri Jan 8 15:23:51 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:23:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:23:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8121: Waiting for Server - FAILED kill -0 15135 >/dev/null 2>/dev/null selfserv_9159 with PID 15135 found at Fri Jan 8 15:23:56 EST 2016 selfserv_9159 with PID 15135 started at Fri Jan 8 15:23:56 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Fri Jan 8 15:23:56 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:23:57 EST 2016 ssl.sh: #8122: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 15135 at Fri Jan 8 15:23:57 EST 2016 kill -USR1 15135 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15135 killed at Fri Jan 8 15:23:57 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 15:23:58 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:23:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:24:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8123: Waiting for Server - FAILED kill -0 15235 >/dev/null 2>/dev/null selfserv_9159 with PID 15235 found at Fri Jan 8 15:24:04 EST 2016 selfserv_9159 with PID 15235 started at Fri Jan 8 15:24:04 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C009 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 15:24:04 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:24:04 EST 2016 ssl.sh: #8124: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 15235 at Fri Jan 8 15:24:04 EST 2016 kill -USR1 15235 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15235 killed at Fri Jan 8 15:24:05 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:24:05 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:24:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:24:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8125: Waiting for Server - FAILED kill -0 15314 >/dev/null 2>/dev/null selfserv_9159 with PID 15314 found at Fri Jan 8 15:24:11 EST 2016 selfserv_9159 with PID 15314 started at Fri Jan 8 15:24:11 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 15:24:11 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:24:11 EST 2016 ssl.sh: #8126: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 15314 at Fri Jan 8 15:24:11 EST 2016 kill -USR1 15314 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15314 killed at Fri Jan 8 15:24:12 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 15:24:12 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:24:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:24:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8127: Waiting for Server - FAILED kill -0 15394 >/dev/null 2>/dev/null selfserv_9159 with PID 15394 found at Fri Jan 8 15:24:18 EST 2016 selfserv_9159 with PID 15394 started at Fri Jan 8 15:24:18 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C004 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 15:24:18 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:24:18 EST 2016 ssl.sh: #8128: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 15394 at Fri Jan 8 15:24:18 EST 2016 kill -USR1 15394 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15394 killed at Fri Jan 8 15:24:19 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 15:24:19 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:24:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:24:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8129: Waiting for Server - FAILED kill -0 15473 >/dev/null 2>/dev/null selfserv_9159 with PID 15473 found at Fri Jan 8 15:24:25 EST 2016 selfserv_9159 with PID 15473 started at Fri Jan 8 15:24:25 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C00E -N -n TestUser-ecmixed \ localhost.localdomain strsclnt started at Fri Jan 8 15:24:25 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:24:25 EST 2016 ssl.sh: #8130: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 15473 at Fri Jan 8 15:24:25 EST 2016 kill -USR1 15473 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15473 killed at Fri Jan 8 15:24:26 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9159 starting at Fri Jan 8 15:24:26 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:24:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:24:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8131: Waiting for Server - FAILED kill -0 15552 >/dev/null 2>/dev/null selfserv_9159 with PID 15552 found at Fri Jan 8 15:24:32 EST 2016 selfserv_9159 with PID 15552 started at Fri Jan 8 15:24:32 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 15:24:32 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:24:32 EST 2016 ssl.sh: #8132: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 15552 at Fri Jan 8 15:24:32 EST 2016 kill -USR1 15552 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15552 killed at Fri Jan 8 15:24:33 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9159 starting at Fri Jan 8 15:24:33 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:24:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:24:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8133: Waiting for Server - FAILED kill -0 15633 >/dev/null 2>/dev/null selfserv_9159 with PID 15633 found at Fri Jan 8 15:24:39 EST 2016 selfserv_9159 with PID 15633 started at Fri Jan 8 15:24:39 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \ localhost.localdomain strsclnt started at Fri Jan 8 15:24:39 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:24:39 EST 2016 ssl.sh: #8134: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 15633 at Fri Jan 8 15:24:39 EST 2016 kill -USR1 15633 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15633 killed at Fri Jan 8 15:24:40 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 15:24:40 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:24:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:24:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8135: Waiting for Server - FAILED kill -0 15733 >/dev/null 2>/dev/null selfserv_9159 with PID 15733 found at Fri Jan 8 15:24:46 EST 2016 selfserv_9159 with PID 15733 started at Fri Jan 8 15:24:46 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Fri Jan 8 15:24:46 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:24:46 EST 2016 ssl.sh: #8136: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 15733 at Fri Jan 8 15:24:46 EST 2016 kill -USR1 15733 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15733 killed at Fri Jan 8 15:24:47 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9159 starting at Fri Jan 8 15:24:47 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:24:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:24:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8137: Waiting for Server - FAILED kill -0 15812 >/dev/null 2>/dev/null selfserv_9159 with PID 15812 found at Fri Jan 8 15:24:53 EST 2016 selfserv_9159 with PID 15812 started at Fri Jan 8 15:24:53 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Fri Jan 8 15:24:53 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:24:53 EST 2016 ssl.sh: #8138: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 15812 at Fri Jan 8 15:24:53 EST 2016 kill -USR1 15812 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15812 killed at Fri Jan 8 15:24:54 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 15:24:54 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:24:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:24:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8139: Waiting for Server - FAILED kill -0 15892 >/dev/null 2>/dev/null selfserv_9159 with PID 15892 found at Fri Jan 8 15:25:00 EST 2016 selfserv_9159 with PID 15892 started at Fri Jan 8 15:25:00 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Fri Jan 8 15:25:00 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:25:00 EST 2016 ssl.sh: #8140: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 15892 at Fri Jan 8 15:25:00 EST 2016 kill -USR1 15892 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15892 killed at Fri Jan 8 15:25:01 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 15:25:01 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:25:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:25:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8141: Waiting for Server - FAILED kill -0 15971 >/dev/null 2>/dev/null selfserv_9159 with PID 15971 found at Fri Jan 8 15:25:07 EST 2016 selfserv_9159 with PID 15971 started at Fri Jan 8 15:25:07 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Fri Jan 8 15:25:07 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:25:07 EST 2016 ssl.sh: #8142: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 15971 at Fri Jan 8 15:25:07 EST 2016 kill -USR1 15971 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15971 killed at Fri Jan 8 15:25:08 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 15:25:08 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:25:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:25:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8143: Waiting for Server - FAILED kill -0 16064 >/dev/null 2>/dev/null selfserv_9159 with PID 16064 found at Fri Jan 8 15:25:14 EST 2016 selfserv_9159 with PID 16064 started at Fri Jan 8 15:25:14 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Fri Jan 8 15:25:14 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:25:14 EST 2016 ssl.sh: #8144: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 16064 at Fri Jan 8 15:25:14 EST 2016 kill -USR1 16064 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16064 killed at Fri Jan 8 15:25:15 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9159 starting at Fri Jan 8 15:25:15 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:25:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:25:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8145: Waiting for Server - FAILED kill -0 16158 >/dev/null 2>/dev/null selfserv_9159 with PID 16158 found at Fri Jan 8 15:25:21 EST 2016 selfserv_9159 with PID 16158 started at Fri Jan 8 15:25:21 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Fri Jan 8 15:25:21 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:25:21 EST 2016 ssl.sh: #8146: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 16158 at Fri Jan 8 15:25:22 EST 2016 kill -USR1 16158 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16158 killed at Fri Jan 8 15:25:22 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 15:25:22 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:25:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:25:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8147: Waiting for Server - FAILED kill -0 16237 >/dev/null 2>/dev/null selfserv_9159 with PID 16237 found at Fri Jan 8 15:25:28 EST 2016 selfserv_9159 with PID 16237 started at Fri Jan 8 15:25:28 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Fri Jan 8 15:25:28 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:25:28 EST 2016 ssl.sh: #8148: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 16237 at Fri Jan 8 15:25:29 EST 2016 kill -USR1 16237 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16237 killed at Fri Jan 8 15:25:29 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 15:25:29 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:25:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:25:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8149: Waiting for Server - FAILED kill -0 16316 >/dev/null 2>/dev/null selfserv_9159 with PID 16316 found at Fri Jan 8 15:25:35 EST 2016 selfserv_9159 with PID 16316 started at Fri Jan 8 15:25:35 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Fri Jan 8 15:25:35 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:25:35 EST 2016 ssl.sh: #8150: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 16316 at Fri Jan 8 15:25:36 EST 2016 kill -USR1 16316 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16316 killed at Fri Jan 8 15:25:36 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 15:25:36 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:25:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:25:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8151: Waiting for Server - FAILED kill -0 16417 >/dev/null 2>/dev/null selfserv_9159 with PID 16417 found at Fri Jan 8 15:25:42 EST 2016 selfserv_9159 with PID 16417 started at Fri Jan 8 15:25:42 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0032 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 15:25:42 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:25:43 EST 2016 ssl.sh: #8152: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 16417 at Fri Jan 8 15:25:43 EST 2016 kill -USR1 16417 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16417 killed at Fri Jan 8 15:25:43 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:25:43 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:25:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:25:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8153: Waiting for Server - FAILED kill -0 16496 >/dev/null 2>/dev/null selfserv_9159 with PID 16496 found at Fri Jan 8 15:25:49 EST 2016 selfserv_9159 with PID 16496 started at Fri Jan 8 15:25:49 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0067 -n TestUser-dsamixed \ localhost.localdomain strsclnt started at Fri Jan 8 15:25:49 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:25:50 EST 2016 ssl.sh: #8154: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 16496 at Fri Jan 8 15:25:50 EST 2016 kill -USR1 16496 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16496 killed at Fri Jan 8 15:25:50 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 15:25:50 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:25:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:25:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8155: Waiting for Server - FAILED kill -0 16589 >/dev/null 2>/dev/null selfserv_9159 with PID 16589 found at Fri Jan 8 15:25:56 EST 2016 selfserv_9159 with PID 16589 started at Fri Jan 8 15:25:56 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :00A2 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 15:25:56 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:25:57 EST 2016 ssl.sh: #8156: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 16589 at Fri Jan 8 15:25:57 EST 2016 kill -USR1 16589 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16589 killed at Fri Jan 8 15:25:57 EST 2016 ssl.sh: SSL Cipher Coverage Extended Test - server bypass/client bypass - with ECC =============================== selfserv_9159 starting at Fri Jan 8 15:25:57 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:25:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:26:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8157: Waiting for Server - FAILED kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:03 EST 2016 selfserv_9159 with PID 16656 started at Fri Jan 8 15:26:03 EST 2016 ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping A SSL2_RC4_128_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping B SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping C SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping D SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping E SSL2_DES_64_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping F SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping B SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping C SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 0: command not found ssl.sh: skipping E SSL2_DES_64_CBC_WITH_MD5 for Extended Test ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8158: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8159: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8160: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8161: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8162: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8163: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8164: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8165: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8166: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8167: SSL3_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8168: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8169: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8170: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8171: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8172: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8173: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8174: TLS_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8175: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8176: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8177: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8178: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8179: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8180: TLS_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8181: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8182: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8183: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8184: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8185: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8186: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8187: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8188: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8189: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8190: TLS11_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c c -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8191: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c d -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8192: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c e -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8193: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c i -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8194: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c j -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8195: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c k -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8196: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c n -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8197: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c v -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8198: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c y -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8199: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c z -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8200: TLS12_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8201: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8202: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8203: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8204: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8205: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8206: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8207: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8208: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8209: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8210: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8211: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8212: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8213: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8214: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8215: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8216: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8217: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8218: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8219: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8220: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8221: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8222: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8223: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8224: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 16656 >/dev/null 2>/dev/null selfserv_9159 with PID 16656 found at Fri Jan 8 15:26:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8225: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 16656 at Fri Jan 8 15:26:40 EST 2016 kill -USR1 16656 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16656 killed at Fri Jan 8 15:26:40 EST 2016 ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 15:26:40 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:26:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:26:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8226: Waiting for Server - FAILED kill -0 18729 >/dev/null 2>/dev/null selfserv_9159 with PID 18729 found at Fri Jan 8 15:26:46 EST 2016 selfserv_9159 with PID 18729 started at Fri Jan 8 15:26:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8227: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 18729 >/dev/null 2>/dev/null selfserv_9159 with PID 18729 found at Fri Jan 8 15:26:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8228: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18729 >/dev/null 2>/dev/null selfserv_9159 with PID 18729 found at Fri Jan 8 15:26:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8229: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 18729 >/dev/null 2>/dev/null selfserv_9159 with PID 18729 found at Fri Jan 8 15:26:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8230: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 18729 >/dev/null 2>/dev/null selfserv_9159 with PID 18729 found at Fri Jan 8 15:26:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8231: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 18729 at Fri Jan 8 15:26:49 EST 2016 kill -USR1 18729 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18729 killed at Fri Jan 8 15:26:49 EST 2016 ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 15:26:49 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:26:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:26:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8232: Waiting for Server - FAILED kill -0 18894 >/dev/null 2>/dev/null selfserv_9159 with PID 18894 found at Fri Jan 8 15:26:55 EST 2016 selfserv_9159 with PID 18894 started at Fri Jan 8 15:26:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8233: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 18894 >/dev/null 2>/dev/null selfserv_9159 with PID 18894 found at Fri Jan 8 15:26:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8234: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18894 >/dev/null 2>/dev/null selfserv_9159 with PID 18894 found at Fri Jan 8 15:26:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8235: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 18894 >/dev/null 2>/dev/null selfserv_9159 with PID 18894 found at Fri Jan 8 15:26:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8236: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 18894 >/dev/null 2>/dev/null selfserv_9159 with PID 18894 found at Fri Jan 8 15:26:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8237: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 18894 >/dev/null 2>/dev/null selfserv_9159 with PID 18894 found at Fri Jan 8 15:26:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8238: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 18894 >/dev/null 2>/dev/null selfserv_9159 with PID 18894 found at Fri Jan 8 15:26:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8239: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18894 >/dev/null 2>/dev/null selfserv_9159 with PID 18894 found at Fri Jan 8 15:26:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8240: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 18894 >/dev/null 2>/dev/null selfserv_9159 with PID 18894 found at Fri Jan 8 15:26:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8241: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 18894 >/dev/null 2>/dev/null selfserv_9159 with PID 18894 found at Fri Jan 8 15:27:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8242: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 18894 >/dev/null 2>/dev/null selfserv_9159 with PID 18894 found at Fri Jan 8 15:27:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8243: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 18894 >/dev/null 2>/dev/null selfserv_9159 with PID 18894 found at Fri Jan 8 15:27:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8244: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18894 >/dev/null 2>/dev/null selfserv_9159 with PID 18894 found at Fri Jan 8 15:27:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8245: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 18894 >/dev/null 2>/dev/null selfserv_9159 with PID 18894 found at Fri Jan 8 15:27:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8246: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 18894 >/dev/null 2>/dev/null selfserv_9159 with PID 18894 found at Fri Jan 8 15:27:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8247: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 18894 at Fri Jan 8 15:27:03 EST 2016 kill -USR1 18894 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18894 killed at Fri Jan 8 15:27:03 EST 2016 ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 15:27:03 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:27:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:27:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8248: Waiting for Server - FAILED kill -0 19309 >/dev/null 2>/dev/null selfserv_9159 with PID 19309 found at Fri Jan 8 15:27:09 EST 2016 selfserv_9159 with PID 19309 started at Fri Jan 8 15:27:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8249: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 19309 >/dev/null 2>/dev/null selfserv_9159 with PID 19309 found at Fri Jan 8 15:27:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8250: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 19309 >/dev/null 2>/dev/null selfserv_9159 with PID 19309 found at Fri Jan 8 15:27:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8251: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 19309 >/dev/null 2>/dev/null selfserv_9159 with PID 19309 found at Fri Jan 8 15:27:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8252: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 19309 >/dev/null 2>/dev/null selfserv_9159 with PID 19309 found at Fri Jan 8 15:27:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8253: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 19309 at Fri Jan 8 15:27:12 EST 2016 kill -USR1 19309 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19309 killed at Fri Jan 8 15:27:12 EST 2016 ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 15:27:12 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:27:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:27:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8254: Waiting for Server - FAILED kill -0 19474 >/dev/null 2>/dev/null selfserv_9159 with PID 19474 found at Fri Jan 8 15:27:18 EST 2016 selfserv_9159 with PID 19474 started at Fri Jan 8 15:27:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8255: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 19474 >/dev/null 2>/dev/null selfserv_9159 with PID 19474 found at Fri Jan 8 15:27:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8256: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 19474 >/dev/null 2>/dev/null selfserv_9159 with PID 19474 found at Fri Jan 8 15:27:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8257: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 19474 >/dev/null 2>/dev/null selfserv_9159 with PID 19474 found at Fri Jan 8 15:27:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8258: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 19474 >/dev/null 2>/dev/null selfserv_9159 with PID 19474 found at Fri Jan 8 15:27:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8259: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 19474 >/dev/null 2>/dev/null selfserv_9159 with PID 19474 found at Fri Jan 8 15:27:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8260: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 19474 >/dev/null 2>/dev/null selfserv_9159 with PID 19474 found at Fri Jan 8 15:27:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8261: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 19474 >/dev/null 2>/dev/null selfserv_9159 with PID 19474 found at Fri Jan 8 15:27:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8262: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 19474 >/dev/null 2>/dev/null selfserv_9159 with PID 19474 found at Fri Jan 8 15:27:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8263: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 19474 >/dev/null 2>/dev/null selfserv_9159 with PID 19474 found at Fri Jan 8 15:27:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8264: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 19474 >/dev/null 2>/dev/null selfserv_9159 with PID 19474 found at Fri Jan 8 15:27:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8265: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 19474 >/dev/null 2>/dev/null selfserv_9159 with PID 19474 found at Fri Jan 8 15:27:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8266: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 19474 >/dev/null 2>/dev/null selfserv_9159 with PID 19474 found at Fri Jan 8 15:27:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8267: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 19474 >/dev/null 2>/dev/null selfserv_9159 with PID 19474 found at Fri Jan 8 15:27:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8268: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 19474 >/dev/null 2>/dev/null selfserv_9159 with PID 19474 found at Fri Jan 8 15:27:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8269: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 19474 at Fri Jan 8 15:27:26 EST 2016 kill -USR1 19474 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19474 killed at Fri Jan 8 15:27:26 EST 2016 ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 15:27:26 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:27:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:27:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8270: Waiting for Server - FAILED kill -0 19888 >/dev/null 2>/dev/null selfserv_9159 with PID 19888 found at Fri Jan 8 15:27:32 EST 2016 selfserv_9159 with PID 19888 started at Fri Jan 8 15:27:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8271: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 19888 >/dev/null 2>/dev/null selfserv_9159 with PID 19888 found at Fri Jan 8 15:27:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8272: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 19888 >/dev/null 2>/dev/null selfserv_9159 with PID 19888 found at Fri Jan 8 15:27:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8273: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 19888 >/dev/null 2>/dev/null selfserv_9159 with PID 19888 found at Fri Jan 8 15:27:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8274: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 19888 >/dev/null 2>/dev/null selfserv_9159 with PID 19888 found at Fri Jan 8 15:27:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8275: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9159 with PID 19888 at Fri Jan 8 15:27:35 EST 2016 kill -USR1 19888 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19888 killed at Fri Jan 8 15:27:35 EST 2016 ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9159 starting at Fri Jan 8 15:27:35 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:27:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:27:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8276: Waiting for Server - FAILED kill -0 20056 >/dev/null 2>/dev/null selfserv_9159 with PID 20056 found at Fri Jan 8 15:27:41 EST 2016 selfserv_9159 with PID 20056 started at Fri Jan 8 15:27:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8277: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 20056 >/dev/null 2>/dev/null selfserv_9159 with PID 20056 found at Fri Jan 8 15:27:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8278: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 20056 >/dev/null 2>/dev/null selfserv_9159 with PID 20056 found at Fri Jan 8 15:27:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8279: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 20056 >/dev/null 2>/dev/null selfserv_9159 with PID 20056 found at Fri Jan 8 15:27:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8280: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 20056 >/dev/null 2>/dev/null selfserv_9159 with PID 20056 found at Fri Jan 8 15:27:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8281: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 20056 >/dev/null 2>/dev/null selfserv_9159 with PID 20056 found at Fri Jan 8 15:27:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8282: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 20056 >/dev/null 2>/dev/null selfserv_9159 with PID 20056 found at Fri Jan 8 15:27:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8283: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 20056 >/dev/null 2>/dev/null selfserv_9159 with PID 20056 found at Fri Jan 8 15:27:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8284: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 20056 >/dev/null 2>/dev/null selfserv_9159 with PID 20056 found at Fri Jan 8 15:27:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8285: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 20056 >/dev/null 2>/dev/null selfserv_9159 with PID 20056 found at Fri Jan 8 15:27:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8286: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 20056 >/dev/null 2>/dev/null selfserv_9159 with PID 20056 found at Fri Jan 8 15:27:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8287: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 20056 >/dev/null 2>/dev/null selfserv_9159 with PID 20056 found at Fri Jan 8 15:27:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8288: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ./ssl.sh: line 297: [: missing `]' ./ssl.sh: line 297: 1: command not found ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 20056 >/dev/null 2>/dev/null selfserv_9159 with PID 20056 found at Fri Jan 8 15:27:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8289: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 20056 at Fri Jan 8 15:27:48 EST 2016 kill -USR1 20056 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20056 killed at Fri Jan 8 15:27:48 EST 2016 ssl.sh: SSL Client Authentication Extended Test - server bypass/client bypass - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 15:27:49 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:27:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:27:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8290: Waiting for Server - FAILED kill -0 20464 >/dev/null 2>/dev/null selfserv_9159 with PID 20464 found at Fri Jan 8 15:27:54 EST 2016 selfserv_9159 with PID 20464 started at Fri Jan 8 15:27:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8291: TLS Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 20464 at Fri Jan 8 15:27:55 EST 2016 kill -USR1 20464 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20464 killed at Fri Jan 8 15:27:55 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:27:55 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:27:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:28:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8292: Waiting for Server - FAILED kill -0 20534 >/dev/null 2>/dev/null selfserv_9159 with PID 20534 found at Fri Jan 8 15:28:01 EST 2016 selfserv_9159 with PID 20534 started at Fri Jan 8 15:28:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8293: TLS Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 20534 at Fri Jan 8 15:28:02 EST 2016 kill -USR1 20534 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20534 killed at Fri Jan 8 15:28:02 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:28:02 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:28:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:28:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8294: Waiting for Server - FAILED kill -0 20603 >/dev/null 2>/dev/null selfserv_9159 with PID 20603 found at Fri Jan 8 15:28:08 EST 2016 selfserv_9159 with PID 20603 started at Fri Jan 8 15:28:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8295: TLS Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 20603 at Fri Jan 8 15:28:09 EST 2016 kill -USR1 20603 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20603 killed at Fri Jan 8 15:28:09 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 15:28:09 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:28:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:28:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8296: Waiting for Server - FAILED kill -0 20672 >/dev/null 2>/dev/null selfserv_9159 with PID 20672 found at Fri Jan 8 15:28:15 EST 2016 selfserv_9159 with PID 20672 started at Fri Jan 8 15:28:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8297: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 20672 at Fri Jan 8 15:28:16 EST 2016 kill -USR1 20672 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20672 killed at Fri Jan 8 15:28:16 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:28:16 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:28:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:28:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8298: Waiting for Server - FAILED kill -0 20742 >/dev/null 2>/dev/null selfserv_9159 with PID 20742 found at Fri Jan 8 15:28:22 EST 2016 selfserv_9159 with PID 20742 started at Fri Jan 8 15:28:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8299: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 20742 at Fri Jan 8 15:28:23 EST 2016 kill -USR1 20742 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20742 killed at Fri Jan 8 15:28:23 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:28:23 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:28:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:28:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8300: Waiting for Server - FAILED kill -0 20811 >/dev/null 2>/dev/null selfserv_9159 with PID 20811 found at Fri Jan 8 15:28:29 EST 2016 selfserv_9159 with PID 20811 started at Fri Jan 8 15:28:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8301: TLS Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 20811 at Fri Jan 8 15:28:29 EST 2016 kill -USR1 20811 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20811 killed at Fri Jan 8 15:28:30 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 15:28:30 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:28:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:28:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8302: Waiting for Server - FAILED kill -0 20880 >/dev/null 2>/dev/null selfserv_9159 with PID 20880 found at Fri Jan 8 15:28:36 EST 2016 selfserv_9159 with PID 20880 started at Fri Jan 8 15:28:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8303: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 20880 at Fri Jan 8 15:28:36 EST 2016 kill -USR1 20880 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20880 killed at Fri Jan 8 15:28:37 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:28:37 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:28:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:28:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8304: Waiting for Server - FAILED kill -0 20950 >/dev/null 2>/dev/null selfserv_9159 with PID 20950 found at Fri Jan 8 15:28:43 EST 2016 selfserv_9159 with PID 20950 started at Fri Jan 8 15:28:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8305: SSL3 Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 20950 at Fri Jan 8 15:28:43 EST 2016 kill -USR1 20950 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20950 killed at Fri Jan 8 15:28:44 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:28:44 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:28:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:28:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8306: Waiting for Server - FAILED kill -0 21019 >/dev/null 2>/dev/null selfserv_9159 with PID 21019 found at Fri Jan 8 15:28:50 EST 2016 selfserv_9159 with PID 21019 started at Fri Jan 8 15:28:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8307: SSL3 Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 21019 at Fri Jan 8 15:28:50 EST 2016 kill -USR1 21019 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21019 killed at Fri Jan 8 15:28:51 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 15:28:51 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:28:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:28:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8308: Waiting for Server - FAILED kill -0 21088 >/dev/null 2>/dev/null selfserv_9159 with PID 21088 found at Fri Jan 8 15:28:57 EST 2016 selfserv_9159 with PID 21088 started at Fri Jan 8 15:28:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8309: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 21088 at Fri Jan 8 15:28:57 EST 2016 kill -USR1 21088 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21088 killed at Fri Jan 8 15:28:58 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:28:58 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:28:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:29:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8310: Waiting for Server - FAILED kill -0 21158 >/dev/null 2>/dev/null selfserv_9159 with PID 21158 found at Fri Jan 8 15:29:04 EST 2016 selfserv_9159 with PID 21158 started at Fri Jan 8 15:29:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8311: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 21158 at Fri Jan 8 15:29:04 EST 2016 kill -USR1 21158 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21158 killed at Fri Jan 8 15:29:04 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:29:05 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:29:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:29:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8312: Waiting for Server - FAILED kill -0 21227 >/dev/null 2>/dev/null selfserv_9159 with PID 21227 found at Fri Jan 8 15:29:10 EST 2016 selfserv_9159 with PID 21227 started at Fri Jan 8 15:29:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8313: SSL3 Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 21227 at Fri Jan 8 15:29:11 EST 2016 kill -USR1 21227 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21227 killed at Fri Jan 8 15:29:11 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 15:29:11 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:29:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:29:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8314: Waiting for Server - FAILED kill -0 21296 >/dev/null 2>/dev/null selfserv_9159 with PID 21296 found at Fri Jan 8 15:29:17 EST 2016 selfserv_9159 with PID 21296 started at Fri Jan 8 15:29:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8315: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 21296 at Fri Jan 8 15:29:18 EST 2016 kill -USR1 21296 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21296 killed at Fri Jan 8 15:29:18 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:29:18 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:29:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:29:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8316: Waiting for Server - FAILED kill -0 21366 >/dev/null 2>/dev/null selfserv_9159 with PID 21366 found at Fri Jan 8 15:29:24 EST 2016 selfserv_9159 with PID 21366 started at Fri Jan 8 15:29:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8317: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 21366 at Fri Jan 8 15:29:25 EST 2016 kill -USR1 21366 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21366 killed at Fri Jan 8 15:29:25 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:29:25 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:29:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:29:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8318: Waiting for Server - FAILED kill -0 21435 >/dev/null 2>/dev/null selfserv_9159 with PID 21435 found at Fri Jan 8 15:29:31 EST 2016 selfserv_9159 with PID 21435 started at Fri Jan 8 15:29:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8319: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 21435 at Fri Jan 8 15:29:32 EST 2016 kill -USR1 21435 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21435 killed at Fri Jan 8 15:29:32 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 15:29:32 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:29:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:29:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8320: Waiting for Server - FAILED kill -0 21504 >/dev/null 2>/dev/null selfserv_9159 with PID 21504 found at Fri Jan 8 15:29:38 EST 2016 selfserv_9159 with PID 21504 started at Fri Jan 8 15:29:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8321: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 21504 at Fri Jan 8 15:29:39 EST 2016 kill -USR1 21504 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21504 killed at Fri Jan 8 15:29:39 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:29:39 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:29:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:29:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8322: Waiting for Server - FAILED kill -0 21574 >/dev/null 2>/dev/null selfserv_9159 with PID 21574 found at Fri Jan 8 15:29:45 EST 2016 selfserv_9159 with PID 21574 started at Fri Jan 8 15:29:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8323: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 21574 at Fri Jan 8 15:29:45 EST 2016 kill -USR1 21574 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21574 killed at Fri Jan 8 15:29:46 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:29:46 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:29:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:29:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8324: Waiting for Server - FAILED kill -0 21643 >/dev/null 2>/dev/null selfserv_9159 with PID 21643 found at Fri Jan 8 15:29:52 EST 2016 selfserv_9159 with PID 21643 started at Fri Jan 8 15:29:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8325: TLS Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 21643 at Fri Jan 8 15:29:52 EST 2016 kill -USR1 21643 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21643 killed at Fri Jan 8 15:29:53 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 15:29:53 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:29:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:29:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8326: Waiting for Server - FAILED kill -0 21712 >/dev/null 2>/dev/null selfserv_9159 with PID 21712 found at Fri Jan 8 15:29:59 EST 2016 selfserv_9159 with PID 21712 started at Fri Jan 8 15:29:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8327: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 21712 at Fri Jan 8 15:29:59 EST 2016 kill -USR1 21712 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21712 killed at Fri Jan 8 15:30:00 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:30:00 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:30:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:30:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8328: Waiting for Server - FAILED kill -0 21782 >/dev/null 2>/dev/null selfserv_9159 with PID 21782 found at Fri Jan 8 15:30:06 EST 2016 selfserv_9159 with PID 21782 started at Fri Jan 8 15:30:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8329: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 21782 at Fri Jan 8 15:30:06 EST 2016 kill -USR1 21782 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21782 killed at Fri Jan 8 15:30:07 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:30:07 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:30:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:30:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8330: Waiting for Server - FAILED kill -0 21851 >/dev/null 2>/dev/null selfserv_9159 with PID 21851 found at Fri Jan 8 15:30:13 EST 2016 selfserv_9159 with PID 21851 started at Fri Jan 8 15:30:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8331: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 21851 at Fri Jan 8 15:30:13 EST 2016 kill -USR1 21851 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21851 killed at Fri Jan 8 15:30:14 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 15:30:14 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:30:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:30:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8332: Waiting for Server - FAILED kill -0 21920 >/dev/null 2>/dev/null selfserv_9159 with PID 21920 found at Fri Jan 8 15:30:19 EST 2016 selfserv_9159 with PID 21920 started at Fri Jan 8 15:30:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8333: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 21920 at Fri Jan 8 15:30:20 EST 2016 kill -USR1 21920 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21920 killed at Fri Jan 8 15:30:20 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:30:20 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:30:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:30:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8334: Waiting for Server - FAILED kill -0 21990 >/dev/null 2>/dev/null selfserv_9159 with PID 21990 found at Fri Jan 8 15:30:26 EST 2016 selfserv_9159 with PID 21990 started at Fri Jan 8 15:30:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8335: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 21990 at Fri Jan 8 15:30:27 EST 2016 kill -USR1 21990 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21990 killed at Fri Jan 8 15:30:27 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:30:27 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:30:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:30:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8336: Waiting for Server - FAILED kill -0 22059 >/dev/null 2>/dev/null selfserv_9159 with PID 22059 found at Fri Jan 8 15:30:33 EST 2016 selfserv_9159 with PID 22059 started at Fri Jan 8 15:30:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8337: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 22059 at Fri Jan 8 15:30:34 EST 2016 kill -USR1 22059 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22059 killed at Fri Jan 8 15:30:34 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 15:30:34 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:30:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:30:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8338: Waiting for Server - FAILED kill -0 22128 >/dev/null 2>/dev/null selfserv_9159 with PID 22128 found at Fri Jan 8 15:30:40 EST 2016 selfserv_9159 with PID 22128 started at Fri Jan 8 15:30:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8339: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 22128 at Fri Jan 8 15:30:41 EST 2016 kill -USR1 22128 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22128 killed at Fri Jan 8 15:30:41 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:30:41 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:30:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:30:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8340: Waiting for Server - FAILED kill -0 22198 >/dev/null 2>/dev/null selfserv_9159 with PID 22198 found at Fri Jan 8 15:30:47 EST 2016 selfserv_9159 with PID 22198 started at Fri Jan 8 15:30:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8341: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 22198 at Fri Jan 8 15:30:48 EST 2016 kill -USR1 22198 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22198 killed at Fri Jan 8 15:30:48 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:30:48 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:30:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:30:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8342: Waiting for Server - FAILED kill -0 22267 >/dev/null 2>/dev/null selfserv_9159 with PID 22267 found at Fri Jan 8 15:30:54 EST 2016 selfserv_9159 with PID 22267 started at Fri Jan 8 15:30:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8343: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 22267 at Fri Jan 8 15:30:55 EST 2016 kill -USR1 22267 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22267 killed at Fri Jan 8 15:30:55 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 15:30:55 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:30:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:31:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8344: Waiting for Server - FAILED kill -0 22336 >/dev/null 2>/dev/null selfserv_9159 with PID 22336 found at Fri Jan 8 15:31:01 EST 2016 selfserv_9159 with PID 22336 started at Fri Jan 8 15:31:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8345: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 22336 at Fri Jan 8 15:31:01 EST 2016 kill -USR1 22336 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22336 killed at Fri Jan 8 15:31:02 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:31:02 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:31:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:31:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8346: Waiting for Server - FAILED kill -0 22406 >/dev/null 2>/dev/null selfserv_9159 with PID 22406 found at Fri Jan 8 15:31:08 EST 2016 selfserv_9159 with PID 22406 started at Fri Jan 8 15:31:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8347: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 22406 at Fri Jan 8 15:31:08 EST 2016 kill -USR1 22406 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22406 killed at Fri Jan 8 15:31:09 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:31:09 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:31:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:31:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8348: Waiting for Server - FAILED kill -0 22475 >/dev/null 2>/dev/null selfserv_9159 with PID 22475 found at Fri Jan 8 15:31:15 EST 2016 selfserv_9159 with PID 22475 started at Fri Jan 8 15:31:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8349: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 22475 at Fri Jan 8 15:31:15 EST 2016 kill -USR1 22475 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22475 killed at Fri Jan 8 15:31:16 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:31:16 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:31:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:31:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8350: Waiting for Server - FAILED kill -0 22559 >/dev/null 2>/dev/null selfserv_9159 with PID 22559 found at Fri Jan 8 15:31:22 EST 2016 selfserv_9159 with PID 22559 started at Fri Jan 8 15:31:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8351: TLS Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 22559 at Fri Jan 8 15:31:22 EST 2016 kill -USR1 22559 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22559 killed at Fri Jan 8 15:31:23 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:31:23 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:31:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:31:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8352: Waiting for Server - FAILED kill -0 22629 >/dev/null 2>/dev/null selfserv_9159 with PID 22629 found at Fri Jan 8 15:31:29 EST 2016 selfserv_9159 with PID 22629 started at Fri Jan 8 15:31:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8353: TLS Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 22629 at Fri Jan 8 15:31:29 EST 2016 kill -USR1 22629 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22629 killed at Fri Jan 8 15:31:30 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:31:30 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:31:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:31:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8354: Waiting for Server - FAILED kill -0 22698 >/dev/null 2>/dev/null selfserv_9159 with PID 22698 found at Fri Jan 8 15:31:36 EST 2016 selfserv_9159 with PID 22698 started at Fri Jan 8 15:31:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8355: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 22698 at Fri Jan 8 15:31:36 EST 2016 kill -USR1 22698 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22698 killed at Fri Jan 8 15:31:36 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:31:37 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:31:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:31:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8356: Waiting for Server - FAILED kill -0 22767 >/dev/null 2>/dev/null selfserv_9159 with PID 22767 found at Fri Jan 8 15:31:42 EST 2016 selfserv_9159 with PID 22767 started at Fri Jan 8 15:31:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8357: TLS Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 22767 at Fri Jan 8 15:31:43 EST 2016 kill -USR1 22767 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22767 killed at Fri Jan 8 15:31:43 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:31:43 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:31:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:31:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8358: Waiting for Server - FAILED kill -0 22837 >/dev/null 2>/dev/null selfserv_9159 with PID 22837 found at Fri Jan 8 15:31:49 EST 2016 selfserv_9159 with PID 22837 started at Fri Jan 8 15:31:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8359: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 22837 at Fri Jan 8 15:31:50 EST 2016 kill -USR1 22837 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22837 killed at Fri Jan 8 15:31:50 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:31:50 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:31:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:31:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8360: Waiting for Server - FAILED kill -0 22906 >/dev/null 2>/dev/null selfserv_9159 with PID 22906 found at Fri Jan 8 15:31:56 EST 2016 selfserv_9159 with PID 22906 started at Fri Jan 8 15:31:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8361: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 22906 at Fri Jan 8 15:31:57 EST 2016 kill -USR1 22906 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22906 killed at Fri Jan 8 15:31:57 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:31:57 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:31:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:32:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8362: Waiting for Server - FAILED kill -0 22975 >/dev/null 2>/dev/null selfserv_9159 with PID 22975 found at Fri Jan 8 15:32:03 EST 2016 selfserv_9159 with PID 22975 started at Fri Jan 8 15:32:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8363: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 22975 at Fri Jan 8 15:32:04 EST 2016 kill -USR1 22975 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22975 killed at Fri Jan 8 15:32:04 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:32:04 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:32:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:32:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8364: Waiting for Server - FAILED kill -0 23045 >/dev/null 2>/dev/null selfserv_9159 with PID 23045 found at Fri Jan 8 15:32:10 EST 2016 selfserv_9159 with PID 23045 started at Fri Jan 8 15:32:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V :ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8365: SSL3 Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23045 at Fri Jan 8 15:32:11 EST 2016 kill -USR1 23045 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23045 killed at Fri Jan 8 15:32:11 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:32:11 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:32:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:32:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8366: Waiting for Server - FAILED kill -0 23114 >/dev/null 2>/dev/null selfserv_9159 with PID 23114 found at Fri Jan 8 15:32:17 EST 2016 selfserv_9159 with PID 23114 started at Fri Jan 8 15:32:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8367: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23114 at Fri Jan 8 15:32:17 EST 2016 kill -USR1 23114 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23114 killed at Fri Jan 8 15:32:18 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:32:18 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:32:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:32:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8368: Waiting for Server - FAILED kill -0 23183 >/dev/null 2>/dev/null selfserv_9159 with PID 23183 found at Fri Jan 8 15:32:24 EST 2016 selfserv_9159 with PID 23183 started at Fri Jan 8 15:32:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8369: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23183 at Fri Jan 8 15:32:24 EST 2016 kill -USR1 23183 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23183 killed at Fri Jan 8 15:32:25 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:32:25 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:32:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:32:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8370: Waiting for Server - FAILED kill -0 23253 >/dev/null 2>/dev/null selfserv_9159 with PID 23253 found at Fri Jan 8 15:32:31 EST 2016 selfserv_9159 with PID 23253 started at Fri Jan 8 15:32:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8371: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 23253 at Fri Jan 8 15:32:31 EST 2016 kill -USR1 23253 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23253 killed at Fri Jan 8 15:32:32 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:32:32 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:32:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:32:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8372: Waiting for Server - FAILED kill -0 23322 >/dev/null 2>/dev/null selfserv_9159 with PID 23322 found at Fri Jan 8 15:32:38 EST 2016 selfserv_9159 with PID 23322 started at Fri Jan 8 15:32:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8373: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23322 at Fri Jan 8 15:32:38 EST 2016 kill -USR1 23322 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23322 killed at Fri Jan 8 15:32:39 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:32:39 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:32:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:32:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8374: Waiting for Server - FAILED kill -0 23391 >/dev/null 2>/dev/null selfserv_9159 with PID 23391 found at Fri Jan 8 15:32:45 EST 2016 selfserv_9159 with PID 23391 started at Fri Jan 8 15:32:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8375: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23391 at Fri Jan 8 15:32:45 EST 2016 kill -USR1 23391 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23391 killed at Fri Jan 8 15:32:46 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:32:46 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:32:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:32:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8376: Waiting for Server - FAILED kill -0 23461 >/dev/null 2>/dev/null selfserv_9159 with PID 23461 found at Fri Jan 8 15:32:52 EST 2016 selfserv_9159 with PID 23461 started at Fri Jan 8 15:32:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8377: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23461 at Fri Jan 8 15:32:52 EST 2016 kill -USR1 23461 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23461 killed at Fri Jan 8 15:32:52 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:32:53 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:32:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:32:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8378: Waiting for Server - FAILED kill -0 23530 >/dev/null 2>/dev/null selfserv_9159 with PID 23530 found at Fri Jan 8 15:32:58 EST 2016 selfserv_9159 with PID 23530 started at Fri Jan 8 15:32:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8379: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 23530 at Fri Jan 8 15:32:59 EST 2016 kill -USR1 23530 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23530 killed at Fri Jan 8 15:32:59 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:32:59 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:32:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:33:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8380: Waiting for Server - FAILED kill -0 23599 >/dev/null 2>/dev/null selfserv_9159 with PID 23599 found at Fri Jan 8 15:33:05 EST 2016 selfserv_9159 with PID 23599 started at Fri Jan 8 15:33:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8381: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23599 at Fri Jan 8 15:33:06 EST 2016 kill -USR1 23599 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23599 killed at Fri Jan 8 15:33:06 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:33:06 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:33:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:33:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8382: Waiting for Server - FAILED kill -0 23669 >/dev/null 2>/dev/null selfserv_9159 with PID 23669 found at Fri Jan 8 15:33:12 EST 2016 selfserv_9159 with PID 23669 started at Fri Jan 8 15:33:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8383: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23669 at Fri Jan 8 15:33:13 EST 2016 kill -USR1 23669 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23669 killed at Fri Jan 8 15:33:13 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:33:13 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:33:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:33:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8384: Waiting for Server - FAILED kill -0 23738 >/dev/null 2>/dev/null selfserv_9159 with PID 23738 found at Fri Jan 8 15:33:19 EST 2016 selfserv_9159 with PID 23738 started at Fri Jan 8 15:33:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8385: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23738 at Fri Jan 8 15:33:20 EST 2016 kill -USR1 23738 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23738 killed at Fri Jan 8 15:33:20 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 15:33:20 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:33:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:33:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8386: Waiting for Server - FAILED kill -0 23807 >/dev/null 2>/dev/null selfserv_9159 with PID 23807 found at Fri Jan 8 15:33:26 EST 2016 selfserv_9159 with PID 23807 started at Fri Jan 8 15:33:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8387: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 23807 at Fri Jan 8 15:33:27 EST 2016 kill -USR1 23807 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23807 killed at Fri Jan 8 15:33:27 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:33:27 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:33:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:33:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8388: Waiting for Server - FAILED kill -0 23877 >/dev/null 2>/dev/null selfserv_9159 with PID 23877 found at Fri Jan 8 15:33:33 EST 2016 selfserv_9159 with PID 23877 started at Fri Jan 8 15:33:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8389: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23877 at Fri Jan 8 15:33:33 EST 2016 kill -USR1 23877 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23877 killed at Fri Jan 8 15:33:34 EST 2016 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server bypass/client bypass - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Stress Test Extended Test - server bypass/client bypass - with ECC =============================== ssl.sh: skipping -c_1000_-C_A Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9159 starting at Fri Jan 8 15:33:34 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:33:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:33:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8390: Waiting for Server - FAILED kill -0 24060 >/dev/null 2>/dev/null selfserv_9159 with PID 24060 found at Fri Jan 8 15:33:40 EST 2016 selfserv_9159 with PID 24060 started at Fri Jan 8 15:33:40 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -c 1000 -C c -V :ssl3 \ localhost.localdomain strsclnt started at Fri Jan 8 15:33:40 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:33:41 EST 2016 ssl.sh: #8391: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 24060 at Fri Jan 8 15:33:41 EST 2016 kill -USR1 24060 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24060 killed at Fri Jan 8 15:33:41 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9159 starting at Fri Jan 8 15:33:41 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:33:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:33:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8392: Waiting for Server - FAILED kill -0 24139 >/dev/null 2>/dev/null selfserv_9159 with PID 24139 found at Fri Jan 8 15:33:47 EST 2016 selfserv_9159 with PID 24139 started at Fri Jan 8 15:33:47 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Fri Jan 8 15:33:47 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:33:48 EST 2016 ssl.sh: #8393: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 24139 at Fri Jan 8 15:33:48 EST 2016 kill -USR1 24139 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24139 killed at Fri Jan 8 15:33:48 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9159 starting at Fri Jan 8 15:33:48 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:33:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:33:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8394: Waiting for Server - FAILED kill -0 24219 >/dev/null 2>/dev/null selfserv_9159 with PID 24219 found at Fri Jan 8 15:33:54 EST 2016 selfserv_9159 with PID 24219 started at Fri Jan 8 15:33:54 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Fri Jan 8 15:33:54 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:33:55 EST 2016 ssl.sh: #8395: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 24219 at Fri Jan 8 15:33:55 EST 2016 kill -USR1 24219 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24219 killed at Fri Jan 8 15:33:55 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9159 starting at Fri Jan 8 15:33:55 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:33:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:34:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8396: Waiting for Server - FAILED kill -0 24298 >/dev/null 2>/dev/null selfserv_9159 with PID 24298 found at Fri Jan 8 15:34:01 EST 2016 selfserv_9159 with PID 24298 started at Fri Jan 8 15:34:01 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 15:34:01 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:34:02 EST 2016 ssl.sh: #8397: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 24298 at Fri Jan 8 15:34:02 EST 2016 kill -USR1 24298 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24298 killed at Fri Jan 8 15:34:02 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9159 starting at Fri Jan 8 15:34:02 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:34:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:34:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8398: Waiting for Server - FAILED kill -0 24378 >/dev/null 2>/dev/null selfserv_9159 with PID 24378 found at Fri Jan 8 15:34:08 EST 2016 selfserv_9159 with PID 24378 started at Fri Jan 8 15:34:08 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Fri Jan 8 15:34:08 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:34:09 EST 2016 ssl.sh: #8399: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 24378 at Fri Jan 8 15:34:09 EST 2016 kill -USR1 24378 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24378 killed at Fri Jan 8 15:34:09 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9159 starting at Fri Jan 8 15:34:10 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:34:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:34:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8400: Waiting for Server - FAILED kill -0 24459 >/dev/null 2>/dev/null selfserv_9159 with PID 24459 found at Fri Jan 8 15:34:15 EST 2016 selfserv_9159 with PID 24459 started at Fri Jan 8 15:34:15 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 15:34:15 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:34:16 EST 2016 ssl.sh: #8401: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 24459 at Fri Jan 8 15:34:16 EST 2016 kill -USR1 24459 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24459 killed at Fri Jan 8 15:34:16 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9159 starting at Fri Jan 8 15:34:17 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:34:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:34:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8402: Waiting for Server - FAILED kill -0 24538 >/dev/null 2>/dev/null selfserv_9159 with PID 24538 found at Fri Jan 8 15:34:22 EST 2016 selfserv_9159 with PID 24538 started at Fri Jan 8 15:34:22 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 15:34:22 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:34:23 EST 2016 ssl.sh: #8403: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 24538 at Fri Jan 8 15:34:23 EST 2016 kill -USR1 24538 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24538 killed at Fri Jan 8 15:34:23 EST 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping -c_100_-C_A_-N_-n_TestUser Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 15:34:24 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:34:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:34:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8404: Waiting for Server - FAILED kill -0 24646 >/dev/null 2>/dev/null selfserv_9159 with PID 24646 found at Fri Jan 8 15:34:30 EST 2016 selfserv_9159 with PID 24646 started at Fri Jan 8 15:34:30 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Fri Jan 8 15:34:30 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:34:30 EST 2016 ssl.sh: #8405: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 24646 at Fri Jan 8 15:34:30 EST 2016 kill -USR1 24646 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24646 killed at Fri Jan 8 15:34:31 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 15:34:31 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:34:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:34:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8406: Waiting for Server - FAILED kill -0 24726 >/dev/null 2>/dev/null selfserv_9159 with PID 24726 found at Fri Jan 8 15:34:37 EST 2016 selfserv_9159 with PID 24726 started at Fri Jan 8 15:34:37 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Fri Jan 8 15:34:37 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:34:37 EST 2016 ssl.sh: #8407: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 24726 at Fri Jan 8 15:34:37 EST 2016 kill -USR1 24726 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24726 killed at Fri Jan 8 15:34:38 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9159 starting at Fri Jan 8 15:34:38 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:34:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:34:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8408: Waiting for Server - FAILED kill -0 24807 >/dev/null 2>/dev/null selfserv_9159 with PID 24807 found at Fri Jan 8 15:34:44 EST 2016 selfserv_9159 with PID 24807 started at Fri Jan 8 15:34:44 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Fri Jan 8 15:34:44 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:34:44 EST 2016 ssl.sh: #8409: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 24807 at Fri Jan 8 15:34:44 EST 2016 kill -USR1 24807 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24807 killed at Fri Jan 8 15:34:45 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9159 starting at Fri Jan 8 15:34:45 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:34:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:34:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8410: Waiting for Server - FAILED kill -0 24888 >/dev/null 2>/dev/null selfserv_9159 with PID 24888 found at Fri Jan 8 15:34:51 EST 2016 selfserv_9159 with PID 24888 started at Fri Jan 8 15:34:51 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Fri Jan 8 15:34:51 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:34:51 EST 2016 ssl.sh: #8411: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 24888 at Fri Jan 8 15:34:51 EST 2016 kill -USR1 24888 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24888 killed at Fri Jan 8 15:34:52 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9159 starting at Fri Jan 8 15:34:52 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:34:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:34:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8412: Waiting for Server - FAILED kill -0 24968 >/dev/null 2>/dev/null selfserv_9159 with PID 24968 found at Fri Jan 8 15:34:58 EST 2016 selfserv_9159 with PID 24968 started at Fri Jan 8 15:34:58 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 15:34:58 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:34:58 EST 2016 ssl.sh: #8413: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 24968 at Fri Jan 8 15:34:58 EST 2016 kill -USR1 24968 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24968 killed at Fri Jan 8 15:34:59 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9159 starting at Fri Jan 8 15:34:59 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:34:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:35:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8414: Waiting for Server - FAILED kill -0 25049 >/dev/null 2>/dev/null selfserv_9159 with PID 25049 found at Fri Jan 8 15:35:05 EST 2016 selfserv_9159 with PID 25049 started at Fri Jan 8 15:35:05 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 15:35:05 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:35:05 EST 2016 ssl.sh: #8415: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 25049 at Fri Jan 8 15:35:05 EST 2016 kill -USR1 25049 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25049 killed at Fri Jan 8 15:35:06 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9159 starting at Fri Jan 8 15:35:06 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:35:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:35:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8416: Waiting for Server - FAILED kill -0 25130 >/dev/null 2>/dev/null selfserv_9159 with PID 25130 found at Fri Jan 8 15:35:12 EST 2016 selfserv_9159 with PID 25130 started at Fri Jan 8 15:35:12 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 15:35:12 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:35:12 EST 2016 ssl.sh: #8417: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 25130 at Fri Jan 8 15:35:12 EST 2016 kill -USR1 25130 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25130 killed at Fri Jan 8 15:35:13 EST 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 15:35:13 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:35:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:35:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8418: Waiting for Server - FAILED kill -0 25242 >/dev/null 2>/dev/null selfserv_9159 with PID 25242 found at Fri Jan 8 15:35:19 EST 2016 selfserv_9159 with PID 25242 started at Fri Jan 8 15:35:19 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Fri Jan 8 15:35:19 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:35:19 EST 2016 ssl.sh: #8419: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 25242 at Fri Jan 8 15:35:19 EST 2016 kill -USR1 25242 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25242 killed at Fri Jan 8 15:35:20 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 15:35:20 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:35:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:35:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8420: Waiting for Server - FAILED kill -0 25321 >/dev/null 2>/dev/null selfserv_9159 with PID 25321 found at Fri Jan 8 15:35:26 EST 2016 selfserv_9159 with PID 25321 started at Fri Jan 8 15:35:26 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Fri Jan 8 15:35:26 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:35:26 EST 2016 ssl.sh: #8421: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 25321 at Fri Jan 8 15:35:26 EST 2016 kill -USR1 25321 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25321 killed at Fri Jan 8 15:35:27 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9159 starting at Fri Jan 8 15:35:27 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:35:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:35:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8422: Waiting for Server - FAILED kill -0 25401 >/dev/null 2>/dev/null selfserv_9159 with PID 25401 found at Fri Jan 8 15:35:33 EST 2016 selfserv_9159 with PID 25401 started at Fri Jan 8 15:35:33 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Fri Jan 8 15:35:33 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:35:33 EST 2016 ssl.sh: #8423: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 25401 at Fri Jan 8 15:35:33 EST 2016 kill -USR1 25401 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25401 killed at Fri Jan 8 15:35:34 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 15:35:34 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:35:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:35:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8424: Waiting for Server - FAILED kill -0 25482 >/dev/null 2>/dev/null selfserv_9159 with PID 25482 found at Fri Jan 8 15:35:40 EST 2016 selfserv_9159 with PID 25482 started at Fri Jan 8 15:35:40 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Fri Jan 8 15:35:40 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:35:40 EST 2016 ssl.sh: #8425: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 25482 at Fri Jan 8 15:35:40 EST 2016 kill -USR1 25482 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25482 killed at Fri Jan 8 15:35:41 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 15:35:41 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:35:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:35:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8426: Waiting for Server - FAILED kill -0 25561 >/dev/null 2>/dev/null selfserv_9159 with PID 25561 found at Fri Jan 8 15:35:47 EST 2016 selfserv_9159 with PID 25561 started at Fri Jan 8 15:35:47 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Fri Jan 8 15:35:47 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:35:47 EST 2016 ssl.sh: #8427: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 25561 at Fri Jan 8 15:35:47 EST 2016 kill -USR1 25561 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25561 killed at Fri Jan 8 15:35:48 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9159 starting at Fri Jan 8 15:35:48 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:35:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:35:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8428: Waiting for Server - FAILED kill -0 25641 >/dev/null 2>/dev/null selfserv_9159 with PID 25641 found at Fri Jan 8 15:35:54 EST 2016 selfserv_9159 with PID 25641 started at Fri Jan 8 15:35:54 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Fri Jan 8 15:35:54 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:35:54 EST 2016 ssl.sh: #8429: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 25641 at Fri Jan 8 15:35:54 EST 2016 kill -USR1 25641 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25641 killed at Fri Jan 8 15:35:55 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9159 starting at Fri Jan 8 15:35:55 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:35:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:36:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8430: Waiting for Server - FAILED kill -0 25720 >/dev/null 2>/dev/null selfserv_9159 with PID 25720 found at Fri Jan 8 15:36:01 EST 2016 selfserv_9159 with PID 25720 started at Fri Jan 8 15:36:01 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Fri Jan 8 15:36:01 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:36:01 EST 2016 ssl.sh: #8431: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 25720 at Fri Jan 8 15:36:01 EST 2016 kill -USR1 25720 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25720 killed at Fri Jan 8 15:36:02 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9159 starting at Fri Jan 8 15:36:02 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:36:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:36:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8432: Waiting for Server - FAILED kill -0 25799 >/dev/null 2>/dev/null selfserv_9159 with PID 25799 found at Fri Jan 8 15:36:08 EST 2016 selfserv_9159 with PID 25799 started at Fri Jan 8 15:36:08 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Fri Jan 8 15:36:08 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:36:08 EST 2016 ssl.sh: #8433: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 25799 at Fri Jan 8 15:36:08 EST 2016 kill -USR1 25799 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25799 killed at Fri Jan 8 15:36:09 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9159 starting at Fri Jan 8 15:36:09 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:36:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:36:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8434: Waiting for Server - FAILED kill -0 25881 >/dev/null 2>/dev/null selfserv_9159 with PID 25881 found at Fri Jan 8 15:36:15 EST 2016 selfserv_9159 with PID 25881 started at Fri Jan 8 15:36:15 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Fri Jan 8 15:36:15 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:36:15 EST 2016 ssl.sh: #8435: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 25881 at Fri Jan 8 15:36:15 EST 2016 kill -USR1 25881 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25881 killed at Fri Jan 8 15:36:16 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9159 starting at Fri Jan 8 15:36:16 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:36:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:36:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8436: Waiting for Server - FAILED kill -0 25960 >/dev/null 2>/dev/null selfserv_9159 with PID 25960 found at Fri Jan 8 15:36:22 EST 2016 selfserv_9159 with PID 25960 started at Fri Jan 8 15:36:22 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Fri Jan 8 15:36:22 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:36:22 EST 2016 ssl.sh: #8437: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 25960 at Fri Jan 8 15:36:23 EST 2016 kill -USR1 25960 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25960 killed at Fri Jan 8 15:36:23 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 15:36:23 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:36:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:36:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8438: Waiting for Server - FAILED kill -0 26060 >/dev/null 2>/dev/null selfserv_9159 with PID 26060 found at Fri Jan 8 15:36:29 EST 2016 selfserv_9159 with PID 26060 started at Fri Jan 8 15:36:29 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C009 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 15:36:29 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:36:30 EST 2016 ssl.sh: #8439: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 26060 at Fri Jan 8 15:36:30 EST 2016 kill -USR1 26060 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26060 killed at Fri Jan 8 15:36:30 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:36:30 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:36:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:36:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8440: Waiting for Server - FAILED kill -0 26140 >/dev/null 2>/dev/null selfserv_9159 with PID 26140 found at Fri Jan 8 15:36:36 EST 2016 selfserv_9159 with PID 26140 started at Fri Jan 8 15:36:36 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 15:36:36 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:36:37 EST 2016 ssl.sh: #8441: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 26140 at Fri Jan 8 15:36:37 EST 2016 kill -USR1 26140 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26140 killed at Fri Jan 8 15:36:37 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 15:36:37 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:36:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:36:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8442: Waiting for Server - FAILED kill -0 26219 >/dev/null 2>/dev/null selfserv_9159 with PID 26219 found at Fri Jan 8 15:36:43 EST 2016 selfserv_9159 with PID 26219 started at Fri Jan 8 15:36:43 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C004 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 15:36:43 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:36:44 EST 2016 ssl.sh: #8443: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 26219 at Fri Jan 8 15:36:44 EST 2016 kill -USR1 26219 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26219 killed at Fri Jan 8 15:36:44 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 15:36:44 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:36:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:36:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8444: Waiting for Server - FAILED kill -0 26300 >/dev/null 2>/dev/null selfserv_9159 with PID 26300 found at Fri Jan 8 15:36:50 EST 2016 selfserv_9159 with PID 26300 started at Fri Jan 8 15:36:50 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \ localhost.localdomain strsclnt started at Fri Jan 8 15:36:50 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:36:51 EST 2016 ssl.sh: #8445: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 26300 at Fri Jan 8 15:36:51 EST 2016 kill -USR1 26300 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26300 killed at Fri Jan 8 15:36:51 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9159 starting at Fri Jan 8 15:36:51 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:36:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:36:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8446: Waiting for Server - FAILED kill -0 26380 >/dev/null 2>/dev/null selfserv_9159 with PID 26380 found at Fri Jan 8 15:36:57 EST 2016 selfserv_9159 with PID 26380 started at Fri Jan 8 15:36:57 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 15:36:57 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:36:58 EST 2016 ssl.sh: #8447: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 26380 at Fri Jan 8 15:36:58 EST 2016 kill -USR1 26380 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26380 killed at Fri Jan 8 15:36:58 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9159 starting at Fri Jan 8 15:36:58 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:36:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:37:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8448: Waiting for Server - FAILED kill -0 26459 >/dev/null 2>/dev/null selfserv_9159 with PID 26459 found at Fri Jan 8 15:37:04 EST 2016 selfserv_9159 with PID 26459 started at Fri Jan 8 15:37:04 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \ localhost.localdomain strsclnt started at Fri Jan 8 15:37:04 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:37:05 EST 2016 ssl.sh: #8449: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 26459 at Fri Jan 8 15:37:05 EST 2016 kill -USR1 26459 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26459 killed at Fri Jan 8 15:37:05 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 15:37:05 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:37:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:37:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8450: Waiting for Server - FAILED kill -0 26559 >/dev/null 2>/dev/null selfserv_9159 with PID 26559 found at Fri Jan 8 15:37:11 EST 2016 selfserv_9159 with PID 26559 started at Fri Jan 8 15:37:11 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Fri Jan 8 15:37:11 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:37:12 EST 2016 ssl.sh: #8451: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 26559 at Fri Jan 8 15:37:12 EST 2016 kill -USR1 26559 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26559 killed at Fri Jan 8 15:37:12 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9159 starting at Fri Jan 8 15:37:12 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:37:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:37:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8452: Waiting for Server - FAILED kill -0 26641 >/dev/null 2>/dev/null selfserv_9159 with PID 26641 found at Fri Jan 8 15:37:18 EST 2016 selfserv_9159 with PID 26641 started at Fri Jan 8 15:37:18 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Fri Jan 8 15:37:18 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:37:19 EST 2016 ssl.sh: #8453: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 26641 at Fri Jan 8 15:37:19 EST 2016 kill -USR1 26641 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26641 killed at Fri Jan 8 15:37:19 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 15:37:19 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:37:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:37:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8454: Waiting for Server - FAILED kill -0 26720 >/dev/null 2>/dev/null selfserv_9159 with PID 26720 found at Fri Jan 8 15:37:25 EST 2016 selfserv_9159 with PID 26720 started at Fri Jan 8 15:37:25 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Fri Jan 8 15:37:25 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:37:26 EST 2016 ssl.sh: #8455: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 26720 at Fri Jan 8 15:37:26 EST 2016 kill -USR1 26720 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26720 killed at Fri Jan 8 15:37:26 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 15:37:26 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:37:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:37:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8456: Waiting for Server - FAILED kill -0 26799 >/dev/null 2>/dev/null selfserv_9159 with PID 26799 found at Fri Jan 8 15:37:32 EST 2016 selfserv_9159 with PID 26799 started at Fri Jan 8 15:37:32 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Fri Jan 8 15:37:32 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:37:33 EST 2016 ssl.sh: #8457: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 26799 at Fri Jan 8 15:37:33 EST 2016 kill -USR1 26799 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26799 killed at Fri Jan 8 15:37:33 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 15:37:33 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:37:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:37:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8458: Waiting for Server - FAILED kill -0 26893 >/dev/null 2>/dev/null selfserv_9159 with PID 26893 found at Fri Jan 8 15:37:39 EST 2016 selfserv_9159 with PID 26893 started at Fri Jan 8 15:37:39 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Fri Jan 8 15:37:39 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:37:40 EST 2016 ssl.sh: #8459: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 26893 at Fri Jan 8 15:37:40 EST 2016 kill -USR1 26893 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26893 killed at Fri Jan 8 15:37:40 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9159 starting at Fri Jan 8 15:37:41 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:37:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:37:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8460: Waiting for Server - FAILED kill -0 26986 >/dev/null 2>/dev/null selfserv_9159 with PID 26986 found at Fri Jan 8 15:37:46 EST 2016 selfserv_9159 with PID 26986 started at Fri Jan 8 15:37:46 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Fri Jan 8 15:37:46 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:37:47 EST 2016 ssl.sh: #8461: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 26986 at Fri Jan 8 15:37:47 EST 2016 kill -USR1 26986 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26986 killed at Fri Jan 8 15:37:47 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 15:37:48 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:37:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:37:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8462: Waiting for Server - FAILED kill -0 27069 >/dev/null 2>/dev/null selfserv_9159 with PID 27069 found at Fri Jan 8 15:37:53 EST 2016 selfserv_9159 with PID 27069 started at Fri Jan 8 15:37:53 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Fri Jan 8 15:37:53 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:37:54 EST 2016 ssl.sh: #8463: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 27069 at Fri Jan 8 15:37:54 EST 2016 kill -USR1 27069 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27069 killed at Fri Jan 8 15:37:54 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 15:37:55 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:37:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:38:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8464: Waiting for Server - FAILED kill -0 27151 >/dev/null 2>/dev/null selfserv_9159 with PID 27151 found at Fri Jan 8 15:38:00 EST 2016 selfserv_9159 with PID 27151 started at Fri Jan 8 15:38:00 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Fri Jan 8 15:38:00 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:38:01 EST 2016 ssl.sh: #8465: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 27151 at Fri Jan 8 15:38:01 EST 2016 kill -USR1 27151 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27151 killed at Fri Jan 8 15:38:01 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 15:38:02 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:38:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:38:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8466: Waiting for Server - FAILED kill -0 27251 >/dev/null 2>/dev/null selfserv_9159 with PID 27251 found at Fri Jan 8 15:38:08 EST 2016 selfserv_9159 with PID 27251 started at Fri Jan 8 15:38:08 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 15:38:08 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:38:08 EST 2016 ssl.sh: #8467: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 27251 at Fri Jan 8 15:38:08 EST 2016 kill -USR1 27251 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27251 killed at Fri Jan 8 15:38:09 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9159 starting at Fri Jan 8 15:38:09 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:38:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:38:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8468: Waiting for Server - FAILED kill -0 27330 >/dev/null 2>/dev/null selfserv_9159 with PID 27330 found at Fri Jan 8 15:38:15 EST 2016 selfserv_9159 with PID 27330 started at Fri Jan 8 15:38:15 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \ localhost.localdomain strsclnt started at Fri Jan 8 15:38:15 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:38:15 EST 2016 ssl.sh: #8469: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 27330 at Fri Jan 8 15:38:15 EST 2016 kill -USR1 27330 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27330 killed at Fri Jan 8 15:38:16 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 15:38:16 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 15:38:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 15:38:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #8470: Waiting for Server - FAILED kill -0 27424 >/dev/null 2>/dev/null selfserv_9159 with PID 27424 found at Fri Jan 8 15:38:22 EST 2016 selfserv_9159 with PID 27424 started at Fri Jan 8 15:38:22 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 15:38:22 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 15:38:22 EST 2016 ssl.sh: #8471: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 27424 at Fri Jan 8 15:38:22 EST 2016 kill -USR1 27424 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27424 killed at Fri Jan 8 15:38:23 EST 2016 TIMESTAMP ssl END: Fri Jan 8 15:38:23 EST 2016 Running tests for ocsp TIMESTAMP ocsp BEGIN: Fri Jan 8 15:38:23 EST 2016 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Fri Jan 8 15:38:23 EST 2016 Running tests for pkits TIMESTAMP pkits BEGIN: Fri Jan 8 15:38:23 EST 2016 pkits.sh: PKITS data directory not defined, skipping. TIMESTAMP pkits END: Fri Jan 8 15:38:23 EST 2016 Running tests for chains TIMESTAMP chains BEGIN: Fri Jan 8 15:38:23 EST 2016 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #8472: OCSPD: Creating DB OCSPRootDB - PASSED chains.sh: Creating Root CA OCSPRoot certutil -s "CN=OCSPRoot ROOT CA, O=OCSPRoot, C=US" -S -n OCSPRoot -t CTu,CTu,CTu -v 600 -x -d OCSPRootDB -1 -2 -5 -f OCSPRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153824 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8473: OCSPD: Creating Root CA OCSPRoot - PASSED chains.sh: Exporting Root CA OCSPRoot.der certutil -L -d OCSPRootDB -r -n OCSPRoot -o OCSPRoot.der chains.sh: #8474: OCSPD: Exporting Root CA OCSPRoot.der - PASSED chains.sh: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPRootDB -o OCSPRoot.p12 -n OCSPRoot -k OCSPRootDB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #8475: OCSPD: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #8476: OCSPD: Creating DB OCSPCA1DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA1Req.der certutil -s "CN=OCSPCA1 Intermediate, O=OCSPCA1, C=US" -R -2 -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o OCSPCA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8477: OCSPD: Creating Intermediate certifiate request OCSPCA1Req.der - PASSED chains.sh: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA1Req.der -o OCSPCA1OCSPRoot.der -f OCSPRootDB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9169/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8478: OCSPD: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database certutil -A -n OCSPCA1 -t u,u,u -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -i OCSPCA1OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8479: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database - PASSED chains.sh: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA1DB -o OCSPCA1.p12 -n OCSPCA1 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #8480: OCSPD: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database - PASSED chains.sh: Creating DB OCSPCA2DB certutil -N -d OCSPCA2DB -f OCSPCA2DB/dbpasswd chains.sh: #8481: OCSPD: Creating DB OCSPCA2DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA2Req.der certutil -s "CN=OCSPCA2 Intermediate, O=OCSPCA2, C=US" -R -2 -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o OCSPCA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8482: OCSPD: Creating Intermediate certifiate request OCSPCA2Req.der - PASSED chains.sh: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA2Req.der -o OCSPCA2OCSPRoot.der -f OCSPRootDB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9169/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8483: OCSPD: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database certutil -A -n OCSPCA2 -t u,u,u -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -i OCSPCA2OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8484: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database - PASSED chains.sh: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA2DB -o OCSPCA2.p12 -n OCSPCA2 -k OCSPCA2DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #8485: OCSPD: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database - PASSED chains.sh: Creating DB OCSPCA3DB certutil -N -d OCSPCA3DB -f OCSPCA3DB/dbpasswd chains.sh: #8486: OCSPD: Creating DB OCSPCA3DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA3Req.der certutil -s "CN=OCSPCA3 Intermediate, O=OCSPCA3, C=US" -R -2 -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o OCSPCA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8487: OCSPD: Creating Intermediate certifiate request OCSPCA3Req.der - PASSED chains.sh: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA3Req.der -o OCSPCA3OCSPRoot.der -f OCSPRootDB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9170 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8488: OCSPD: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database certutil -A -n OCSPCA3 -t u,u,u -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -i OCSPCA3OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8489: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database - PASSED chains.sh: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA3DB -o OCSPCA3.p12 -n OCSPCA3 -k OCSPCA3DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #8490: OCSPD: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database - PASSED chains.sh: Creating DB OCSPEE11DB certutil -N -d OCSPEE11DB -f OCSPEE11DB/dbpasswd chains.sh: #8491: OCSPD: Creating DB OCSPEE11DB - PASSED chains.sh: Creating EE certifiate request OCSPEE11Req.der certutil -s "CN=OCSPEE11 EE, O=OCSPEE11, C=US" -R -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE11Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8492: OCSPD: Creating EE certifiate request OCSPEE11Req.der - PASSED chains.sh: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE11Req.der -o OCSPEE11OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9169/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8493: OCSPD: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database certutil -A -n OCSPEE11 -t u,u,u -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -i OCSPEE11OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8494: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database - PASSED chains.sh: Creating DB OCSPEE12DB certutil -N -d OCSPEE12DB -f OCSPEE12DB/dbpasswd chains.sh: #8495: OCSPD: Creating DB OCSPEE12DB - PASSED chains.sh: Creating EE certifiate request OCSPEE12Req.der certutil -s "CN=OCSPEE12 EE, O=OCSPEE12, C=US" -R -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8496: OCSPD: Creating EE certifiate request OCSPEE12Req.der - PASSED chains.sh: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE12Req.der -o OCSPEE12OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9169/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8497: OCSPD: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database certutil -A -n OCSPEE12 -t u,u,u -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -i OCSPEE12OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8498: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database - PASSED chains.sh: Creating DB OCSPEE13DB certutil -N -d OCSPEE13DB -f OCSPEE13DB/dbpasswd chains.sh: #8499: OCSPD: Creating DB OCSPEE13DB - PASSED chains.sh: Creating EE certifiate request OCSPEE13Req.der certutil -s "CN=OCSPEE13 EE, O=OCSPEE13, C=US" -R -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE13Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8500: OCSPD: Creating EE certifiate request OCSPEE13Req.der - PASSED chains.sh: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE13Req.der -o OCSPEE13OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9169/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8501: OCSPD: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database certutil -A -n OCSPEE13 -t u,u,u -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -i OCSPEE13OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8502: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database - PASSED chains.sh: Creating DB OCSPEE14DB certutil -N -d OCSPEE14DB -f OCSPEE14DB/dbpasswd chains.sh: #8503: OCSPD: Creating DB OCSPEE14DB - PASSED chains.sh: Creating EE certifiate request OCSPEE14Req.der certutil -s "CN=OCSPEE14 EE, O=OCSPEE14, C=US" -R -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE14Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8504: OCSPD: Creating EE certifiate request OCSPEE14Req.der - PASSED chains.sh: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE14Req.der -o OCSPEE14OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 4 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9169/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8505: OCSPD: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database certutil -A -n OCSPEE14 -t u,u,u -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -i OCSPEE14OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8506: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database - PASSED chains.sh: Creating DB OCSPEE15DB certutil -N -d OCSPEE15DB -f OCSPEE15DB/dbpasswd chains.sh: #8507: OCSPD: Creating DB OCSPEE15DB - PASSED chains.sh: Creating EE certifiate request OCSPEE15Req.der certutil -s "CN=OCSPEE15 EE, O=OCSPEE15, C=US" -R -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE15Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8508: OCSPD: Creating EE certifiate request OCSPEE15Req.der - PASSED chains.sh: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE15Req.der -o OCSPEE15OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 5 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9170 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8509: OCSPD: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database certutil -A -n OCSPEE15 -t u,u,u -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -i OCSPEE15OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8510: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database - PASSED chains.sh: Creating DB OCSPEE21DB certutil -N -d OCSPEE21DB -f OCSPEE21DB/dbpasswd chains.sh: #8511: OCSPD: Creating DB OCSPEE21DB - PASSED chains.sh: Creating EE certifiate request OCSPEE21Req.der certutil -s "CN=OCSPEE21 EE, O=OCSPEE21, C=US" -R -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8512: OCSPD: Creating EE certifiate request OCSPEE21Req.der - PASSED chains.sh: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE21Req.der -o OCSPEE21OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9169/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8513: OCSPD: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database certutil -A -n OCSPEE21 -t u,u,u -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -i OCSPEE21OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8514: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database - PASSED chains.sh: Creating DB OCSPEE22DB certutil -N -d OCSPEE22DB -f OCSPEE22DB/dbpasswd chains.sh: #8515: OCSPD: Creating DB OCSPEE22DB - PASSED chains.sh: Creating EE certifiate request OCSPEE22Req.der certutil -s "CN=OCSPEE22 EE, O=OCSPEE22, C=US" -R -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE22Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8516: OCSPD: Creating EE certifiate request OCSPEE22Req.der - PASSED chains.sh: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE22Req.der -o OCSPEE22OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9169/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8517: OCSPD: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database certutil -A -n OCSPEE22 -t u,u,u -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -i OCSPEE22OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8518: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database - PASSED chains.sh: Creating DB OCSPEE23DB certutil -N -d OCSPEE23DB -f OCSPEE23DB/dbpasswd chains.sh: #8519: OCSPD: Creating DB OCSPEE23DB - PASSED chains.sh: Creating EE certifiate request OCSPEE23Req.der certutil -s "CN=OCSPEE23 EE, O=OCSPEE23, C=US" -R -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE23Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8520: OCSPD: Creating EE certifiate request OCSPEE23Req.der - PASSED chains.sh: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE23Req.der -o OCSPEE23OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9170 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8521: OCSPD: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database certutil -A -n OCSPEE23 -t u,u,u -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -i OCSPEE23OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8522: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database - PASSED chains.sh: Creating DB OCSPEE31DB certutil -N -d OCSPEE31DB -f OCSPEE31DB/dbpasswd chains.sh: #8523: OCSPD: Creating DB OCSPEE31DB - PASSED chains.sh: Creating EE certifiate request OCSPEE31Req.der certutil -s "CN=OCSPEE31 EE, O=OCSPEE31, C=US" -R -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE31Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8524: OCSPD: Creating EE certifiate request OCSPEE31Req.der - PASSED chains.sh: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE31Req.der -o OCSPEE31OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9169/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8525: OCSPD: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database certutil -A -n OCSPEE31 -t u,u,u -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -i OCSPEE31OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8526: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database - PASSED chains.sh: Creating DB OCSPEE32DB certutil -N -d OCSPEE32DB -f OCSPEE32DB/dbpasswd chains.sh: #8527: OCSPD: Creating DB OCSPEE32DB - PASSED chains.sh: Creating EE certifiate request OCSPEE32Req.der certutil -s "CN=OCSPEE32 EE, O=OCSPEE32, C=US" -R -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE32Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8528: OCSPD: Creating EE certifiate request OCSPEE32Req.der - PASSED chains.sh: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE32Req.der -o OCSPEE32OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9169/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8529: OCSPD: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database certutil -A -n OCSPEE32 -t u,u,u -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -i OCSPEE32OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8530: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database - PASSED chains.sh: Creating DB OCSPEE33DB certutil -N -d OCSPEE33DB -f OCSPEE33DB/dbpasswd chains.sh: #8531: OCSPD: Creating DB OCSPEE33DB - PASSED chains.sh: Creating EE certifiate request OCSPEE33Req.der certutil -s "CN=OCSPEE33 EE, O=OCSPEE33, C=US" -R -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE33Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8532: OCSPD: Creating EE certifiate request OCSPEE33Req.der - PASSED chains.sh: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE33Req.der -o OCSPEE33OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9170 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8533: OCSPD: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database certutil -A -n OCSPEE33 -t u,u,u -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -i OCSPEE33OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8534: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database - PASSED chains.sh: Create CRL for OCSPRootDB crlutil -G -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20160108204040Z nextupdate=20170108204040Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Fri Jan 08 20:40:40 2016 Next Update: Sun Jan 08 20:40:40 2017 CRL Extensions: chains.sh: #8535: OCSPD: Create CRL for OCSPRootDB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPRoot crlutil -M -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20160108204041Z addcert 2 20160108204041Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Fri Jan 08 20:40:41 2016 Next Update: Sun Jan 08 20:40:40 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 20:40:41 2016 CRL Extensions: chains.sh: #8536: OCSPD: Revoking certificate with SN 2 issued by OCSPRoot - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20160108204042Z nextupdate=20170108204042Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Jan 08 20:40:42 2016 Next Update: Sun Jan 08 20:40:42 2017 CRL Extensions: chains.sh: #8537: OCSPD: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20160108204043Z addcert 2 20160108204043Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Jan 08 20:40:43 2016 Next Update: Sun Jan 08 20:40:42 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 20:40:43 2016 CRL Extensions: chains.sh: #8538: OCSPD: Revoking certificate with SN 2 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20160108204044Z addcert 4 20160108204044Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Jan 08 20:40:44 2016 Next Update: Sun Jan 08 20:40:42 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 20:40:43 2016 Entry 2 (0x2): Serial Number: 4 (0x4) Revocation Date: Fri Jan 08 20:40:44 2016 CRL Extensions: chains.sh: #8539: OCSPD: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Create CRL for OCSPCA2DB crlutil -G -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20160108204045Z nextupdate=20170108204045Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Jan 08 20:40:45 2016 Next Update: Sun Jan 08 20:40:45 2017 CRL Extensions: chains.sh: #8540: OCSPD: Create CRL for OCSPCA2DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20160108204046Z addcert 2 20160108204046Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Jan 08 20:40:46 2016 Next Update: Sun Jan 08 20:40:45 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 20:40:46 2016 CRL Extensions: chains.sh: #8541: OCSPD: Revoking certificate with SN 2 issued by OCSPCA2 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20160108204047Z addcert 3 20160108204047Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Jan 08 20:40:47 2016 Next Update: Sun Jan 08 20:40:45 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 20:40:46 2016 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Fri Jan 08 20:40:47 2016 CRL Extensions: chains.sh: #8542: OCSPD: Revoking certificate with SN 3 issued by OCSPCA2 - PASSED chains.sh: Create CRL for OCSPCA3DB crlutil -G -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20160108204048Z nextupdate=20170108204048Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Jan 08 20:40:48 2016 Next Update: Sun Jan 08 20:40:48 2017 CRL Extensions: chains.sh: #8543: OCSPD: Create CRL for OCSPCA3DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20160108204049Z addcert 2 20160108204049Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Jan 08 20:40:49 2016 Next Update: Sun Jan 08 20:40:48 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 20:40:49 2016 CRL Extensions: chains.sh: #8544: OCSPD: Revoking certificate with SN 2 issued by OCSPCA3 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20160108204050Z addcert 3 20160108204050Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Jan 08 20:40:50 2016 Next Update: Sun Jan 08 20:40:48 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 20:40:49 2016 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Fri Jan 08 20:40:50 2016 CRL Extensions: chains.sh: #8545: OCSPD: Revoking certificate with SN 3 issued by OCSPCA3 - PASSED chains.sh: Creating DB ServerDB certutil -N -d ServerDB -f ServerDB/dbpasswd chains.sh: #8546: OCSPD: Creating DB ServerDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ServerDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.der chains.sh: #8547: OCSPD: Importing certificate OCSPRoot.der to ServerDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ServerDB database crlutil -I -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.crl chains.sh: #8548: OCSPD: Importing CRL OCSPRoot.crl to ServerDB database - PASSED chains.sh: Importing p12 key OCSPRoot.p12 to ServerDB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPRoot.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #8549: OCSPD: Importing p12 key OCSPRoot.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to ServerDB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA1.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #8550: OCSPD: Importing p12 key OCSPCA1.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA2.p12 to ServerDB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA2.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #8551: OCSPD: Importing p12 key OCSPCA2.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA3.p12 to ServerDB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA3.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #8552: OCSPD: Importing p12 key OCSPCA3.p12 to ServerDB database - PASSED chains.sh: Creating DB ClientDB certutil -N -d ClientDB -f ClientDB/dbpasswd chains.sh: #8553: OCSPD: Creating DB ClientDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ClientDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.der chains.sh: #8554: OCSPD: Importing certificate OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ClientDB database crlutil -I -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.crl chains.sh: #8555: OCSPD: Importing CRL OCSPRoot.crl to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database certutil -A -n OCSPCA1OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA1OCSPRoot.der chains.sh: #8556: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database certutil -A -n OCSPCA2OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA2OCSPRoot.der chains.sh: #8557: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database certutil -A -n OCSPCA3OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA3OCSPRoot.der chains.sh: #8558: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database certutil -A -n OCSPEE11OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE11OCSPCA1.der chains.sh: #8559: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database certutil -A -n OCSPEE12OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE12OCSPCA1.der chains.sh: #8560: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database certutil -A -n OCSPEE13OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE13OCSPCA1.der chains.sh: #8561: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database certutil -A -n OCSPEE14OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE14OCSPCA1.der chains.sh: #8562: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database certutil -A -n OCSPEE15OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE15OCSPCA1.der chains.sh: #8563: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database certutil -A -n OCSPEE21OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE21OCSPCA2.der chains.sh: #8564: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database certutil -A -n OCSPEE22OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE22OCSPCA2.der chains.sh: #8565: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database certutil -A -n OCSPEE23OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE23OCSPCA2.der chains.sh: #8566: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database certutil -A -n OCSPEE31OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE31OCSPCA3.der chains.sh: #8567: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database certutil -A -n OCSPEE32OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE32OCSPCA3.der chains.sh: #8568: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database certutil -A -n OCSPEE33OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE33OCSPCA3.der chains.sh: #8569: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database - PASSED httpserv starting at Fri Jan 8 15:41:04 EST 2016 httpserv -D -p 9169 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O get -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/aiahttp/http_pid.27064 & trying to connect to httpserv at Fri Jan 8 15:41:04 EST 2016 tstclnt -p 9169 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to httpserv at Fri Jan 8 15:41:09 EST 2016 tstclnt -p 9169 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #8570: Waiting for Server - FAILED kill -0 28912 >/dev/null 2>/dev/null httpserv with PID 28912 found at Fri Jan 8 15:41:10 EST 2016 httpserv with PID 28912 started at Fri Jan 8 15:41:10 EST 2016 tstclnt -h localhost.localdomain -p 9169 -q -t 20 tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #8571: Test that OCSP server is reachable - FAILED trying to kill httpserv with PID 28912 at Fri Jan 8 15:41:11 EST 2016 kill -USR1 28912 httpserv: normal termination httpserv -b -p 9169 2>/dev/null; httpserv with PID 28912 killed at Fri Jan 8 15:41:11 EST 2016 httpserv starting at Fri Jan 8 15:41:12 EST 2016 httpserv -D -p 9169 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O post -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/aiahttp/http_pid.27064 & trying to connect to httpserv at Fri Jan 8 15:41:12 EST 2016 tstclnt -p 9169 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to httpserv at Fri Jan 8 15:41:17 EST 2016 tstclnt -p 9169 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #8572: Waiting for Server - FAILED kill -0 28997 >/dev/null 2>/dev/null httpserv with PID 28997 found at Fri Jan 8 15:41:17 EST 2016 httpserv with PID 28997 started at Fri Jan 8 15:41:17 EST 2016 tstclnt -h localhost.localdomain -p 9169 -q -t 20 tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #8573: Test that OCSP server is reachable - FAILED trying to kill httpserv with PID 28997 at Fri Jan 8 15:41:19 EST 2016 kill -USR1 28997 httpserv: normal termination httpserv -b -p 9169 2>/dev/null; httpserv with PID 28997 killed at Fri Jan 8 15:41:19 EST 2016 httpserv starting at Fri Jan 8 15:41:19 EST 2016 httpserv -D -p 9169 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/aiahttp/http_pid.27064 & trying to connect to httpserv at Fri Jan 8 15:41:19 EST 2016 tstclnt -p 9169 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to httpserv at Fri Jan 8 15:41:25 EST 2016 tstclnt -p 9169 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #8574: Waiting for Server - FAILED kill -0 29083 >/dev/null 2>/dev/null httpserv with PID 29083 found at Fri Jan 8 15:41:25 EST 2016 httpserv with PID 29083 started at Fri Jan 8 15:41:25 EST 2016 chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #8575: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153825 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8576: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #8577: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #8578: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153826 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8579: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #8580: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #8581: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8582: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108153827 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8583: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8584: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108153828 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8585: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8586: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #8587: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #8588: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8589: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 108153829 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8590: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8591: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8592: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #8593: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #8594: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153826 (0x6724be2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 20:41:46 2016 Not After : Fri Jan 08 20:41:46 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:b1:2f:bf:49:2b:07:d3:c2:5e:5e:4f:0d:b9:a3:34: 22:d0:f5:19:df:bb:24:2b:6a:b5:7c:09:45:e0:e2:ba: a6:5e:81:f2:c6:c5:a7:cb:48:dc:37:67:d0:03:dc:fd: 1f:37:39:fd:55:64:fa:7d:d6:dd:68:c7:69:b0:aa:42: 2f:37:0d:1b:a0:2d:4f:93:5b:3c:35:cc:24:d6:b0:33: ae:a2:13:f7:63:a3:57:09:17:5b:88:11:68:62:1e:8d: 78:8d:ed:ea:58:c3:82:a7:e4:2b:1f:21:72:bc:f2:83: 9d:85:5e:d8:54:81:e4:3c:fb:7a:55:19:02:ca:5d:5e: fa:c8:cd:6a:19:79:cd:12:6c:ab:70:62:03:50:a0:8b: 1d:cf:16:97:1f:83:da:f8:c2:43:38:df:28:1c:0b:61: 3e:1e:5e:6c:57:37:6c:4f:fb:e0:cf:dc:f0:fb:7c:9f: 3e:54:f8:fa:2e:0d:ef:d8:4d:7a:b8:99:63:fa:95:a0: 60:20:33:77:00:ac:0d:07:a4:8d:f8:7e:ed:52:18:9f: ef:21:41:b0:9b:b1:9e:c1:ba:90:5f:52:16:4e:48:bc: 28:13:21:b6:f9:e4:d4:76:47:bd:5e:e9:fa:8b:2a:05: 36:4e:62:c8:12:7f:8a:bf:05:67:a3:39:9d:9e:d4:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:ff:94:f3:0c:d9:93:61:b8:c6:40:e3:94:ba:77:ba: 4b:b8:b0:89:ee:c7:b2:ad:57:be:14:a9:3b:d3:c9:dc: 2e:db:e4:a8:2a:87:e0:a4:9f:5f:5f:ab:e3:5f:47:1d: cf:3b:15:1c:92:99:4c:85:10:c2:f5:9c:aa:25:f6:c8: 31:ae:11:4b:48:bf:ad:c7:ad:7e:a4:55:2f:80:02:6e: e6:54:95:c6:4e:18:ae:56:70:7a:ec:0a:1f:a4:60:81: a6:bd:04:da:29:9e:36:3b:51:64:6f:cd:7c:9d:68:9e: 87:b9:53:91:10:8f:b6:d8:41:4d:3b:4e:9f:c9:d4:08: 5e:d1:14:b2:f2:48:c2:2e:9c:1c:4f:f4:17:b6:67:d4: f7:df:60:84:84:20:4b:8b:ef:39:c4:10:a3:70:fe:a0: a5:2d:16:a3:35:f2:64:f6:4a:a7:1a:a4:09:69:66:b7: 09:24:2c:ad:9f:31:1b:27:d2:96:92:d4:b7:c7:e8:50: 7a:94:31:d2:8f:c8:6d:f9:42:60:ad:e0:81:25:25:ce: e2:55:12:dc:64:9a:37:6e:90:eb:8d:e7:d1:a0:95:40: b9:94:5e:1f:d4:fb:65:01:87:4a:b2:fb:05:37:7c:32: da:8b:c3:57:8f:58:34:98:ec:a7:51:28:43:7e:74:84 Fingerprint (SHA-256): DE:AF:97:85:DE:8E:94:08:11:79:9E:18:9E:DB:1C:2D:FE:78:9A:1C:38:D3:89:03:3C:6A:99:AA:F7:0A:EB:98 Fingerprint (SHA1): 6B:AF:D0:BF:EE:7E:5C:75:53:A5:A6:3C:DE:B0:1F:50:64:D8:77:9E Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8595: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153825 (0x6724be1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 20:41:32 2016 Not After : Fri Jan 08 20:41:32 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:a2:f1:f6:67:84:13:6b:48:58:fb:a5:53:82:10:e5: fa:54:1c:91:99:6d:0c:80:ef:c4:1b:6f:4a:ad:ce:68: 7e:e2:0a:a2:14:78:b2:3a:f3:fb:af:a6:5b:5e:39:81: 51:c1:2e:e0:e7:a1:73:d7:e3:d0:22:ee:6b:71:31:84: 0a:02:b0:b5:8b:36:f6:27:da:9b:db:e0:41:b3:14:9a: 39:e3:4a:61:52:df:f4:cd:88:69:26:f1:78:2b:a7:93: 78:37:a5:d2:af:da:11:65:64:60:d8:77:d3:77:3a:e7: 91:15:43:3d:99:f4:a2:85:80:76:65:8d:6e:d6:62:11: 93:c2:68:cb:d5:ec:76:e1:b7:9b:cf:3d:64:0c:02:75: 13:ea:91:d3:d7:9e:03:c4:8b:66:93:91:e6:97:06:14: 57:44:d0:4c:7a:e1:6c:52:3b:a5:06:6d:a3:79:75:e4: 6d:b5:51:37:df:ec:69:ce:b9:ac:b3:6d:05:4c:1c:80: 50:a8:21:26:67:37:23:eb:8d:83:95:82:04:c0:23:2d: 50:d0:ae:97:ea:3e:12:40:4f:38:25:65:c4:62:73:d7: 6f:b9:b4:74:82:9e:3f:15:11:d9:cd:05:c0:de:31:91: 42:1f:23:f1:a6:66:1c:a3:45:dd:d8:a1:bb:d1:49:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:60:97:a2:19:ad:5f:7d:e6:1c:9b:ce:16:a3:39:2a: dc:68:46:52:c9:52:0a:5c:05:55:76:80:ac:39:5a:d6: 29:72:3f:e3:ea:17:cb:59:31:27:5f:3f:76:dd:0a:f9: 1b:be:d3:32:05:66:f6:21:4a:03:0f:26:4b:db:56:ab: fd:67:bd:17:0f:dc:c4:e5:3a:37:98:9d:d4:6f:8c:d8: ad:54:26:1b:51:55:f6:d0:d2:92:22:9f:eb:e5:05:77: 7c:5b:09:75:db:82:15:4f:83:0c:0c:5d:69:1e:8a:e1: 5a:dc:ce:fd:fa:25:5e:af:2c:d2:9f:0b:c4:45:b1:25: 2d:42:48:b4:b7:cb:b1:5d:7a:94:eb:0a:ec:ef:af:7a: b6:ab:b8:67:d4:a3:ac:bb:62:ab:66:4a:b7:05:3d:36: bf:15:fe:99:64:7c:c4:ea:13:cf:e8:1c:70:9a:48:88: 6d:e1:ed:84:9c:6c:7e:c1:4c:01:d1:3b:79:65:d4:16: ff:85:fd:89:8e:a6:e3:fb:39:d5:09:58:ac:b1:dc:be: 44:74:34:1c:71:0f:02:66:9b:8f:1b:a3:94:94:f6:46: 9b:8f:f4:ee:2a:6e:83:95:57:70:09:ff:5c:99:28:99: 94:77:95:e0:c6:eb:b5:f0:f6:39:6b:7c:ed:6b:69:de Fingerprint (SHA-256): 2B:FE:D2:5C:F4:C5:EB:FE:00:D6:41:D8:BD:07:D9:48:71:1D:B2:5A:C2:3C:6C:D7:95:21:C2:66:62:EE:46:C8 Fingerprint (SHA1): 25:B7:35:48:E4:70:31:3F:1E:3C:D8:0F:C7:9E:DE:42:A7:C9:62:77 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8596: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #8597: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #8598: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #8599: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153825 (0x6724be1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 20:41:32 2016 Not After : Fri Jan 08 20:41:32 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:a2:f1:f6:67:84:13:6b:48:58:fb:a5:53:82:10:e5: fa:54:1c:91:99:6d:0c:80:ef:c4:1b:6f:4a:ad:ce:68: 7e:e2:0a:a2:14:78:b2:3a:f3:fb:af:a6:5b:5e:39:81: 51:c1:2e:e0:e7:a1:73:d7:e3:d0:22:ee:6b:71:31:84: 0a:02:b0:b5:8b:36:f6:27:da:9b:db:e0:41:b3:14:9a: 39:e3:4a:61:52:df:f4:cd:88:69:26:f1:78:2b:a7:93: 78:37:a5:d2:af:da:11:65:64:60:d8:77:d3:77:3a:e7: 91:15:43:3d:99:f4:a2:85:80:76:65:8d:6e:d6:62:11: 93:c2:68:cb:d5:ec:76:e1:b7:9b:cf:3d:64:0c:02:75: 13:ea:91:d3:d7:9e:03:c4:8b:66:93:91:e6:97:06:14: 57:44:d0:4c:7a:e1:6c:52:3b:a5:06:6d:a3:79:75:e4: 6d:b5:51:37:df:ec:69:ce:b9:ac:b3:6d:05:4c:1c:80: 50:a8:21:26:67:37:23:eb:8d:83:95:82:04:c0:23:2d: 50:d0:ae:97:ea:3e:12:40:4f:38:25:65:c4:62:73:d7: 6f:b9:b4:74:82:9e:3f:15:11:d9:cd:05:c0:de:31:91: 42:1f:23:f1:a6:66:1c:a3:45:dd:d8:a1:bb:d1:49:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:60:97:a2:19:ad:5f:7d:e6:1c:9b:ce:16:a3:39:2a: dc:68:46:52:c9:52:0a:5c:05:55:76:80:ac:39:5a:d6: 29:72:3f:e3:ea:17:cb:59:31:27:5f:3f:76:dd:0a:f9: 1b:be:d3:32:05:66:f6:21:4a:03:0f:26:4b:db:56:ab: fd:67:bd:17:0f:dc:c4:e5:3a:37:98:9d:d4:6f:8c:d8: ad:54:26:1b:51:55:f6:d0:d2:92:22:9f:eb:e5:05:77: 7c:5b:09:75:db:82:15:4f:83:0c:0c:5d:69:1e:8a:e1: 5a:dc:ce:fd:fa:25:5e:af:2c:d2:9f:0b:c4:45:b1:25: 2d:42:48:b4:b7:cb:b1:5d:7a:94:eb:0a:ec:ef:af:7a: b6:ab:b8:67:d4:a3:ac:bb:62:ab:66:4a:b7:05:3d:36: bf:15:fe:99:64:7c:c4:ea:13:cf:e8:1c:70:9a:48:88: 6d:e1:ed:84:9c:6c:7e:c1:4c:01:d1:3b:79:65:d4:16: ff:85:fd:89:8e:a6:e3:fb:39:d5:09:58:ac:b1:dc:be: 44:74:34:1c:71:0f:02:66:9b:8f:1b:a3:94:94:f6:46: 9b:8f:f4:ee:2a:6e:83:95:57:70:09:ff:5c:99:28:99: 94:77:95:e0:c6:eb:b5:f0:f6:39:6b:7c:ed:6b:69:de Fingerprint (SHA-256): 2B:FE:D2:5C:F4:C5:EB:FE:00:D6:41:D8:BD:07:D9:48:71:1D:B2:5A:C2:3C:6C:D7:95:21:C2:66:62:EE:46:C8 Fingerprint (SHA1): 25:B7:35:48:E4:70:31:3F:1E:3C:D8:0F:C7:9E:DE:42:A7:C9:62:77 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8600: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153826 (0x6724be2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 20:41:46 2016 Not After : Fri Jan 08 20:41:46 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:b1:2f:bf:49:2b:07:d3:c2:5e:5e:4f:0d:b9:a3:34: 22:d0:f5:19:df:bb:24:2b:6a:b5:7c:09:45:e0:e2:ba: a6:5e:81:f2:c6:c5:a7:cb:48:dc:37:67:d0:03:dc:fd: 1f:37:39:fd:55:64:fa:7d:d6:dd:68:c7:69:b0:aa:42: 2f:37:0d:1b:a0:2d:4f:93:5b:3c:35:cc:24:d6:b0:33: ae:a2:13:f7:63:a3:57:09:17:5b:88:11:68:62:1e:8d: 78:8d:ed:ea:58:c3:82:a7:e4:2b:1f:21:72:bc:f2:83: 9d:85:5e:d8:54:81:e4:3c:fb:7a:55:19:02:ca:5d:5e: fa:c8:cd:6a:19:79:cd:12:6c:ab:70:62:03:50:a0:8b: 1d:cf:16:97:1f:83:da:f8:c2:43:38:df:28:1c:0b:61: 3e:1e:5e:6c:57:37:6c:4f:fb:e0:cf:dc:f0:fb:7c:9f: 3e:54:f8:fa:2e:0d:ef:d8:4d:7a:b8:99:63:fa:95:a0: 60:20:33:77:00:ac:0d:07:a4:8d:f8:7e:ed:52:18:9f: ef:21:41:b0:9b:b1:9e:c1:ba:90:5f:52:16:4e:48:bc: 28:13:21:b6:f9:e4:d4:76:47:bd:5e:e9:fa:8b:2a:05: 36:4e:62:c8:12:7f:8a:bf:05:67:a3:39:9d:9e:d4:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:ff:94:f3:0c:d9:93:61:b8:c6:40:e3:94:ba:77:ba: 4b:b8:b0:89:ee:c7:b2:ad:57:be:14:a9:3b:d3:c9:dc: 2e:db:e4:a8:2a:87:e0:a4:9f:5f:5f:ab:e3:5f:47:1d: cf:3b:15:1c:92:99:4c:85:10:c2:f5:9c:aa:25:f6:c8: 31:ae:11:4b:48:bf:ad:c7:ad:7e:a4:55:2f:80:02:6e: e6:54:95:c6:4e:18:ae:56:70:7a:ec:0a:1f:a4:60:81: a6:bd:04:da:29:9e:36:3b:51:64:6f:cd:7c:9d:68:9e: 87:b9:53:91:10:8f:b6:d8:41:4d:3b:4e:9f:c9:d4:08: 5e:d1:14:b2:f2:48:c2:2e:9c:1c:4f:f4:17:b6:67:d4: f7:df:60:84:84:20:4b:8b:ef:39:c4:10:a3:70:fe:a0: a5:2d:16:a3:35:f2:64:f6:4a:a7:1a:a4:09:69:66:b7: 09:24:2c:ad:9f:31:1b:27:d2:96:92:d4:b7:c7:e8:50: 7a:94:31:d2:8f:c8:6d:f9:42:60:ad:e0:81:25:25:ce: e2:55:12:dc:64:9a:37:6e:90:eb:8d:e7:d1:a0:95:40: b9:94:5e:1f:d4:fb:65:01:87:4a:b2:fb:05:37:7c:32: da:8b:c3:57:8f:58:34:98:ec:a7:51:28:43:7e:74:84 Fingerprint (SHA-256): DE:AF:97:85:DE:8E:94:08:11:79:9E:18:9E:DB:1C:2D:FE:78:9A:1C:38:D3:89:03:3C:6A:99:AA:F7:0A:EB:98 Fingerprint (SHA1): 6B:AF:D0:BF:EE:7E:5C:75:53:A5:A6:3C:DE:B0:1F:50:64:D8:77:9E Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8601: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #8602: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #8603: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #8604: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #8605: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #8606: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153826 (0x6724be2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 20:41:46 2016 Not After : Fri Jan 08 20:41:46 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:b1:2f:bf:49:2b:07:d3:c2:5e:5e:4f:0d:b9:a3:34: 22:d0:f5:19:df:bb:24:2b:6a:b5:7c:09:45:e0:e2:ba: a6:5e:81:f2:c6:c5:a7:cb:48:dc:37:67:d0:03:dc:fd: 1f:37:39:fd:55:64:fa:7d:d6:dd:68:c7:69:b0:aa:42: 2f:37:0d:1b:a0:2d:4f:93:5b:3c:35:cc:24:d6:b0:33: ae:a2:13:f7:63:a3:57:09:17:5b:88:11:68:62:1e:8d: 78:8d:ed:ea:58:c3:82:a7:e4:2b:1f:21:72:bc:f2:83: 9d:85:5e:d8:54:81:e4:3c:fb:7a:55:19:02:ca:5d:5e: fa:c8:cd:6a:19:79:cd:12:6c:ab:70:62:03:50:a0:8b: 1d:cf:16:97:1f:83:da:f8:c2:43:38:df:28:1c:0b:61: 3e:1e:5e:6c:57:37:6c:4f:fb:e0:cf:dc:f0:fb:7c:9f: 3e:54:f8:fa:2e:0d:ef:d8:4d:7a:b8:99:63:fa:95:a0: 60:20:33:77:00:ac:0d:07:a4:8d:f8:7e:ed:52:18:9f: ef:21:41:b0:9b:b1:9e:c1:ba:90:5f:52:16:4e:48:bc: 28:13:21:b6:f9:e4:d4:76:47:bd:5e:e9:fa:8b:2a:05: 36:4e:62:c8:12:7f:8a:bf:05:67:a3:39:9d:9e:d4:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:ff:94:f3:0c:d9:93:61:b8:c6:40:e3:94:ba:77:ba: 4b:b8:b0:89:ee:c7:b2:ad:57:be:14:a9:3b:d3:c9:dc: 2e:db:e4:a8:2a:87:e0:a4:9f:5f:5f:ab:e3:5f:47:1d: cf:3b:15:1c:92:99:4c:85:10:c2:f5:9c:aa:25:f6:c8: 31:ae:11:4b:48:bf:ad:c7:ad:7e:a4:55:2f:80:02:6e: e6:54:95:c6:4e:18:ae:56:70:7a:ec:0a:1f:a4:60:81: a6:bd:04:da:29:9e:36:3b:51:64:6f:cd:7c:9d:68:9e: 87:b9:53:91:10:8f:b6:d8:41:4d:3b:4e:9f:c9:d4:08: 5e:d1:14:b2:f2:48:c2:2e:9c:1c:4f:f4:17:b6:67:d4: f7:df:60:84:84:20:4b:8b:ef:39:c4:10:a3:70:fe:a0: a5:2d:16:a3:35:f2:64:f6:4a:a7:1a:a4:09:69:66:b7: 09:24:2c:ad:9f:31:1b:27:d2:96:92:d4:b7:c7:e8:50: 7a:94:31:d2:8f:c8:6d:f9:42:60:ad:e0:81:25:25:ce: e2:55:12:dc:64:9a:37:6e:90:eb:8d:e7:d1:a0:95:40: b9:94:5e:1f:d4:fb:65:01:87:4a:b2:fb:05:37:7c:32: da:8b:c3:57:8f:58:34:98:ec:a7:51:28:43:7e:74:84 Fingerprint (SHA-256): DE:AF:97:85:DE:8E:94:08:11:79:9E:18:9E:DB:1C:2D:FE:78:9A:1C:38:D3:89:03:3C:6A:99:AA:F7:0A:EB:98 Fingerprint (SHA1): 6B:AF:D0:BF:EE:7E:5C:75:53:A5:A6:3C:DE:B0:1F:50:64:D8:77:9E Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8607: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153826 (0x6724be2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 20:41:46 2016 Not After : Fri Jan 08 20:41:46 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:b1:2f:bf:49:2b:07:d3:c2:5e:5e:4f:0d:b9:a3:34: 22:d0:f5:19:df:bb:24:2b:6a:b5:7c:09:45:e0:e2:ba: a6:5e:81:f2:c6:c5:a7:cb:48:dc:37:67:d0:03:dc:fd: 1f:37:39:fd:55:64:fa:7d:d6:dd:68:c7:69:b0:aa:42: 2f:37:0d:1b:a0:2d:4f:93:5b:3c:35:cc:24:d6:b0:33: ae:a2:13:f7:63:a3:57:09:17:5b:88:11:68:62:1e:8d: 78:8d:ed:ea:58:c3:82:a7:e4:2b:1f:21:72:bc:f2:83: 9d:85:5e:d8:54:81:e4:3c:fb:7a:55:19:02:ca:5d:5e: fa:c8:cd:6a:19:79:cd:12:6c:ab:70:62:03:50:a0:8b: 1d:cf:16:97:1f:83:da:f8:c2:43:38:df:28:1c:0b:61: 3e:1e:5e:6c:57:37:6c:4f:fb:e0:cf:dc:f0:fb:7c:9f: 3e:54:f8:fa:2e:0d:ef:d8:4d:7a:b8:99:63:fa:95:a0: 60:20:33:77:00:ac:0d:07:a4:8d:f8:7e:ed:52:18:9f: ef:21:41:b0:9b:b1:9e:c1:ba:90:5f:52:16:4e:48:bc: 28:13:21:b6:f9:e4:d4:76:47:bd:5e:e9:fa:8b:2a:05: 36:4e:62:c8:12:7f:8a:bf:05:67:a3:39:9d:9e:d4:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:ff:94:f3:0c:d9:93:61:b8:c6:40:e3:94:ba:77:ba: 4b:b8:b0:89:ee:c7:b2:ad:57:be:14:a9:3b:d3:c9:dc: 2e:db:e4:a8:2a:87:e0:a4:9f:5f:5f:ab:e3:5f:47:1d: cf:3b:15:1c:92:99:4c:85:10:c2:f5:9c:aa:25:f6:c8: 31:ae:11:4b:48:bf:ad:c7:ad:7e:a4:55:2f:80:02:6e: e6:54:95:c6:4e:18:ae:56:70:7a:ec:0a:1f:a4:60:81: a6:bd:04:da:29:9e:36:3b:51:64:6f:cd:7c:9d:68:9e: 87:b9:53:91:10:8f:b6:d8:41:4d:3b:4e:9f:c9:d4:08: 5e:d1:14:b2:f2:48:c2:2e:9c:1c:4f:f4:17:b6:67:d4: f7:df:60:84:84:20:4b:8b:ef:39:c4:10:a3:70:fe:a0: a5:2d:16:a3:35:f2:64:f6:4a:a7:1a:a4:09:69:66:b7: 09:24:2c:ad:9f:31:1b:27:d2:96:92:d4:b7:c7:e8:50: 7a:94:31:d2:8f:c8:6d:f9:42:60:ad:e0:81:25:25:ce: e2:55:12:dc:64:9a:37:6e:90:eb:8d:e7:d1:a0:95:40: b9:94:5e:1f:d4:fb:65:01:87:4a:b2:fb:05:37:7c:32: da:8b:c3:57:8f:58:34:98:ec:a7:51:28:43:7e:74:84 Fingerprint (SHA-256): DE:AF:97:85:DE:8E:94:08:11:79:9E:18:9E:DB:1C:2D:FE:78:9A:1C:38:D3:89:03:3C:6A:99:AA:F7:0A:EB:98 Fingerprint (SHA1): 6B:AF:D0:BF:EE:7E:5C:75:53:A5:A6:3C:DE:B0:1F:50:64:D8:77:9E Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8608: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #8609: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #8610: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #8611: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #8612: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #8613: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153825 (0x6724be1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 20:41:32 2016 Not After : Fri Jan 08 20:41:32 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:a2:f1:f6:67:84:13:6b:48:58:fb:a5:53:82:10:e5: fa:54:1c:91:99:6d:0c:80:ef:c4:1b:6f:4a:ad:ce:68: 7e:e2:0a:a2:14:78:b2:3a:f3:fb:af:a6:5b:5e:39:81: 51:c1:2e:e0:e7:a1:73:d7:e3:d0:22:ee:6b:71:31:84: 0a:02:b0:b5:8b:36:f6:27:da:9b:db:e0:41:b3:14:9a: 39:e3:4a:61:52:df:f4:cd:88:69:26:f1:78:2b:a7:93: 78:37:a5:d2:af:da:11:65:64:60:d8:77:d3:77:3a:e7: 91:15:43:3d:99:f4:a2:85:80:76:65:8d:6e:d6:62:11: 93:c2:68:cb:d5:ec:76:e1:b7:9b:cf:3d:64:0c:02:75: 13:ea:91:d3:d7:9e:03:c4:8b:66:93:91:e6:97:06:14: 57:44:d0:4c:7a:e1:6c:52:3b:a5:06:6d:a3:79:75:e4: 6d:b5:51:37:df:ec:69:ce:b9:ac:b3:6d:05:4c:1c:80: 50:a8:21:26:67:37:23:eb:8d:83:95:82:04:c0:23:2d: 50:d0:ae:97:ea:3e:12:40:4f:38:25:65:c4:62:73:d7: 6f:b9:b4:74:82:9e:3f:15:11:d9:cd:05:c0:de:31:91: 42:1f:23:f1:a6:66:1c:a3:45:dd:d8:a1:bb:d1:49:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:60:97:a2:19:ad:5f:7d:e6:1c:9b:ce:16:a3:39:2a: dc:68:46:52:c9:52:0a:5c:05:55:76:80:ac:39:5a:d6: 29:72:3f:e3:ea:17:cb:59:31:27:5f:3f:76:dd:0a:f9: 1b:be:d3:32:05:66:f6:21:4a:03:0f:26:4b:db:56:ab: fd:67:bd:17:0f:dc:c4:e5:3a:37:98:9d:d4:6f:8c:d8: ad:54:26:1b:51:55:f6:d0:d2:92:22:9f:eb:e5:05:77: 7c:5b:09:75:db:82:15:4f:83:0c:0c:5d:69:1e:8a:e1: 5a:dc:ce:fd:fa:25:5e:af:2c:d2:9f:0b:c4:45:b1:25: 2d:42:48:b4:b7:cb:b1:5d:7a:94:eb:0a:ec:ef:af:7a: b6:ab:b8:67:d4:a3:ac:bb:62:ab:66:4a:b7:05:3d:36: bf:15:fe:99:64:7c:c4:ea:13:cf:e8:1c:70:9a:48:88: 6d:e1:ed:84:9c:6c:7e:c1:4c:01:d1:3b:79:65:d4:16: ff:85:fd:89:8e:a6:e3:fb:39:d5:09:58:ac:b1:dc:be: 44:74:34:1c:71:0f:02:66:9b:8f:1b:a3:94:94:f6:46: 9b:8f:f4:ee:2a:6e:83:95:57:70:09:ff:5c:99:28:99: 94:77:95:e0:c6:eb:b5:f0:f6:39:6b:7c:ed:6b:69:de Fingerprint (SHA-256): 2B:FE:D2:5C:F4:C5:EB:FE:00:D6:41:D8:BD:07:D9:48:71:1D:B2:5A:C2:3C:6C:D7:95:21:C2:66:62:EE:46:C8 Fingerprint (SHA1): 25:B7:35:48:E4:70:31:3F:1E:3C:D8:0F:C7:9E:DE:42:A7:C9:62:77 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8614: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153825 (0x6724be1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 20:41:32 2016 Not After : Fri Jan 08 20:41:32 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:a2:f1:f6:67:84:13:6b:48:58:fb:a5:53:82:10:e5: fa:54:1c:91:99:6d:0c:80:ef:c4:1b:6f:4a:ad:ce:68: 7e:e2:0a:a2:14:78:b2:3a:f3:fb:af:a6:5b:5e:39:81: 51:c1:2e:e0:e7:a1:73:d7:e3:d0:22:ee:6b:71:31:84: 0a:02:b0:b5:8b:36:f6:27:da:9b:db:e0:41:b3:14:9a: 39:e3:4a:61:52:df:f4:cd:88:69:26:f1:78:2b:a7:93: 78:37:a5:d2:af:da:11:65:64:60:d8:77:d3:77:3a:e7: 91:15:43:3d:99:f4:a2:85:80:76:65:8d:6e:d6:62:11: 93:c2:68:cb:d5:ec:76:e1:b7:9b:cf:3d:64:0c:02:75: 13:ea:91:d3:d7:9e:03:c4:8b:66:93:91:e6:97:06:14: 57:44:d0:4c:7a:e1:6c:52:3b:a5:06:6d:a3:79:75:e4: 6d:b5:51:37:df:ec:69:ce:b9:ac:b3:6d:05:4c:1c:80: 50:a8:21:26:67:37:23:eb:8d:83:95:82:04:c0:23:2d: 50:d0:ae:97:ea:3e:12:40:4f:38:25:65:c4:62:73:d7: 6f:b9:b4:74:82:9e:3f:15:11:d9:cd:05:c0:de:31:91: 42:1f:23:f1:a6:66:1c:a3:45:dd:d8:a1:bb:d1:49:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:60:97:a2:19:ad:5f:7d:e6:1c:9b:ce:16:a3:39:2a: dc:68:46:52:c9:52:0a:5c:05:55:76:80:ac:39:5a:d6: 29:72:3f:e3:ea:17:cb:59:31:27:5f:3f:76:dd:0a:f9: 1b:be:d3:32:05:66:f6:21:4a:03:0f:26:4b:db:56:ab: fd:67:bd:17:0f:dc:c4:e5:3a:37:98:9d:d4:6f:8c:d8: ad:54:26:1b:51:55:f6:d0:d2:92:22:9f:eb:e5:05:77: 7c:5b:09:75:db:82:15:4f:83:0c:0c:5d:69:1e:8a:e1: 5a:dc:ce:fd:fa:25:5e:af:2c:d2:9f:0b:c4:45:b1:25: 2d:42:48:b4:b7:cb:b1:5d:7a:94:eb:0a:ec:ef:af:7a: b6:ab:b8:67:d4:a3:ac:bb:62:ab:66:4a:b7:05:3d:36: bf:15:fe:99:64:7c:c4:ea:13:cf:e8:1c:70:9a:48:88: 6d:e1:ed:84:9c:6c:7e:c1:4c:01:d1:3b:79:65:d4:16: ff:85:fd:89:8e:a6:e3:fb:39:d5:09:58:ac:b1:dc:be: 44:74:34:1c:71:0f:02:66:9b:8f:1b:a3:94:94:f6:46: 9b:8f:f4:ee:2a:6e:83:95:57:70:09:ff:5c:99:28:99: 94:77:95:e0:c6:eb:b5:f0:f6:39:6b:7c:ed:6b:69:de Fingerprint (SHA-256): 2B:FE:D2:5C:F4:C5:EB:FE:00:D6:41:D8:BD:07:D9:48:71:1D:B2:5A:C2:3C:6C:D7:95:21:C2:66:62:EE:46:C8 Fingerprint (SHA1): 25:B7:35:48:E4:70:31:3F:1E:3C:D8:0F:C7:9E:DE:42:A7:C9:62:77 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8615: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #8616: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153830 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8617: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #8618: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #8619: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153831 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8620: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #8621: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #8622: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153832 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8623: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #8624: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #8625: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153833 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8626: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #8627: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #8628: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153834 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8629: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #8630: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #8631: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153835 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8632: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #8633: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #8634: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153836 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8635: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #8636: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #8637: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153837 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8638: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #8639: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #8640: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153838 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8641: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #8642: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #8643: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8644: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 108153839 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8645: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8646: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 108153840 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8647: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8648: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 108153841 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8649: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8650: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #8651: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #8652: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8653: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 108153842 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8654: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8655: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 108153843 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8656: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8657: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 108153844 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8658: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8659: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #8660: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #8661: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8662: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 108153845 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8663: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8664: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 108153846 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8665: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8666: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 108153847 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8667: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8668: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #8669: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #8670: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8671: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 108153848 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8672: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8673: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 108153849 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8674: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8675: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 108153850 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8676: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8677: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #8678: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8679: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8680: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 108153851 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8681: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8682: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #8683: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8684: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108153852 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8685: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8686: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153830 (0x6724be6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Fri Jan 08 20:43:02 2016 Not After : Fri Jan 08 20:43:02 2066 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:35:38:a4:da:8b:72:57:42:69:a7:61:a7:f2:b1:87: 93:d3:dd:b0:7a:e1:ee:19:76:ea:80:b4:3c:04:0e:df: 03:04:0c:ea:09:8b:f3:f2:ee:d6:e1:39:94:92:39:ff: 14:42:1d:42:80:e6:45:6c:af:7a:0f:03:68:0b:46:6d: ef:73:36:43:8d:fa:7a:df:84:ae:b8:cd:dd:2e:7f:02: 8f:e3:d3:23:e3:9a:43:db:0e:68:b4:82:b6:0e:8e:47: 0b:46:5f:48:65:29:86:74:0b:6d:33:35:03:b1:e7:26: ca:46:a9:29:d6:04:1e:29:29:4d:28:1d:38:28:d9:1b: b4:40:75:7b:c5:18:3b:ff:80:5e:d1:2b:31:cc:b0:29: 66:1f:d3:65:e8:a1:6d:54:ae:10:ce:24:b3:2e:fe:ea: bd:c2:6d:04:ec:7c:69:ac:79:b3:f3:d0:5c:48:27:78: 82:2c:0f:39:1e:da:ec:b9:c2:a4:8a:28:49:19:d2:8c: a3:a1:a3:38:20:ad:11:b4:77:fc:27:c4:c6:3a:a9:f5: 70:f4:0c:db:af:3e:6b:d6:56:7d:73:ca:be:2d:8f:1f: 97:34:57:71:92:52:4f:8b:12:db:17:75:99:1a:2d:f2: 5d:a5:73:8f:9a:f5:cb:25:d3:45:88:e0:d1:4b:c8:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: af:bb:0d:56:97:3c:cc:e1:f1:86:29:b0:36:fa:3b:31: 8e:40:71:d7:3e:62:76:81:56:87:2c:1a:6c:b9:61:71: 53:e9:e7:12:63:33:46:43:d5:95:0c:66:98:eb:ef:23: 35:6d:3d:c6:e9:54:5d:8b:4c:5f:29:31:cf:07:4b:89: b7:7f:87:c4:9c:e7:f7:19:01:84:20:28:e9:43:46:bd: 85:43:74:93:2b:94:36:03:c9:3e:24:ad:c1:bb:73:96: 59:85:9f:60:57:d0:5a:02:44:19:cb:7f:a7:31:36:bc: b9:ea:96:f1:39:0b:7c:3e:c1:66:f6:70:8e:4e:f1:16: 7d:c1:50:04:d8:69:63:d2:7c:f8:18:ea:9c:ce:81:14: 19:1c:d2:a5:b4:77:46:3f:4a:9a:9b:8f:45:bc:c1:12: cb:5a:ae:20:16:76:0b:e0:15:26:04:df:21:78:5c:be: f7:09:63:75:79:27:39:e6:30:58:34:04:4d:d4:c9:a3: c0:26:d3:01:c4:2c:6e:6a:38:62:c6:4f:67:fa:90:16: 19:64:dc:12:cd:c2:a0:d1:26:41:ae:cc:49:74:4d:9c: ec:64:d7:72:5a:20:87:2f:da:bb:ab:81:b9:fb:55:6b: 6e:e8:65:ea:0e:8e:81:5c:4f:1f:92:2c:e5:ad:47:02 Fingerprint (SHA-256): 06:86:DA:BA:97:A3:96:08:2B:C4:5C:F4:6A:45:C7:2D:C2:40:70:99:D0:9D:E8:13:EF:82:EE:22:B9:C0:AA:6F Fingerprint (SHA1): 7B:DF:96:86:7A:43:56:AA:89:68:52:AD:22:6B:CF:17:41:F0:40:A6 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #8687: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153831 (0x6724be7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Fri Jan 08 20:43:20 2016 Not After : Fri Jan 08 20:43:20 2066 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:7e:03:29:cf:d4:40:0a:4d:d5:01:d0:a2:d8:ba:40: 58:1a:7a:96:e8:4c:87:39:b1:7d:42:3f:f4:27:db:80: b3:73:7f:3d:d3:1d:58:1a:1e:ee:3e:03:96:15:e5:69: 6c:a4:fa:98:bc:7a:ee:c2:3f:06:ea:f4:52:82:61:03: e6:a4:ad:5a:34:4e:3c:1e:f4:26:3e:6f:1d:f8:a2:e5: 83:01:f2:0b:d5:cd:22:2d:44:49:fe:12:7a:d5:e1:52: 57:6b:2a:a5:e6:2e:ff:92:51:5f:47:79:af:9a:63:78: 9a:02:3b:0c:a7:06:1b:4d:97:b4:7a:4f:a2:31:9e:a7: a0:85:81:bb:2a:fd:33:5e:10:a9:c8:2c:fe:50:0b:a5: 2a:ee:e1:94:d2:73:e7:01:83:29:cb:b7:cf:28:ad:a9: c7:03:48:76:f3:2b:6d:bc:77:70:00:39:f3:24:26:4b: 2a:f4:11:99:5e:7d:43:7b:d4:ff:48:49:03:34:63:93: d9:15:19:05:58:22:50:e8:8a:d9:bb:e3:7d:19:45:84: 8b:8d:d4:0b:d1:c4:09:46:ec:7b:fd:45:15:af:2e:79: 1f:5f:41:4b:56:c4:48:ad:4f:e9:e1:40:eb:66:d0:7b: ca:27:14:af:ea:23:5e:3b:7b:5b:71:ef:bd:75:d5:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 80:b9:32:bb:b9:e6:8c:ff:2d:a8:42:8c:90:4d:10:ec: 4b:7e:1f:c8:73:22:57:a0:c1:97:93:b8:04:bb:2b:ab: c3:61:40:8b:ed:a4:ad:94:fa:82:62:c4:a1:3f:f6:bc: 25:92:d7:34:04:2c:2a:b5:86:cb:4c:e4:17:d8:83:03: 82:b1:9b:55:15:25:04:c1:2b:25:de:ba:6f:0a:fb:c4: 3f:38:7e:3c:9c:86:58:47:93:20:b3:8b:93:a4:78:16: 6e:2c:e5:bf:b1:b6:e5:c3:f2:8b:c6:66:23:b6:62:a6: 7f:3c:2e:32:6f:97:55:c2:1b:9e:b3:f0:d2:db:c4:f4: c0:ba:10:8e:aa:6f:46:7c:89:14:3c:10:cf:52:1f:e7: d2:5c:2a:92:e4:f5:39:cc:a0:c7:d7:ba:8b:3d:ac:9a: 27:06:81:1d:88:25:3a:a5:7b:80:9f:ee:a5:d6:bb:27: 58:83:fb:04:9d:3c:ea:40:25:d4:b6:b8:70:62:48:06: a9:57:a5:45:9a:92:fa:f8:2c:0a:2a:b7:c3:6e:7c:a4: 4b:93:d5:72:23:d8:b1:fe:50:fb:ba:f4:06:8c:7b:24: 53:4c:13:84:f4:3d:15:51:dc:0a:06:38:a6:f8:21:e5: c6:e2:1b:34:7b:ef:81:44:2d:9c:de:c4:8a:6f:a5:8c Fingerprint (SHA-256): AA:D4:A3:99:C3:39:EA:C2:9B:A5:78:79:3C:CA:FF:AB:41:DC:AC:8F:BA:52:F9:00:CA:0C:1A:FD:D2:40:A7:11 Fingerprint (SHA1): EB:7A:7F:5A:06:0A:73:D7:AD:A2:09:3D:51:80:C9:06:40:51:67:08 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #8688: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153832 (0x6724be8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Fri Jan 08 20:43:28 2016 Not After : Fri Jan 08 20:43:28 2066 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:ba:0e:fb:aa:bd:71:c1:e5:72:57:31:48:e0:ed:9a: 20:ee:2f:31:f4:66:7d:c0:21:bd:c1:96:6f:f3:b7:75: 82:b6:06:65:05:b5:4d:b1:f7:66:10:ed:a5:f1:14:ee: 1f:af:51:ef:04:47:27:9f:99:09:5b:46:fa:06:d5:cf: f4:d7:b5:5e:c9:32:c2:b2:1c:f3:29:33:1b:35:62:b1: 7b:b3:4d:dc:50:66:26:77:05:69:85:33:31:2a:11:29: f1:30:e2:52:b2:03:5c:ab:d4:57:fe:a8:d0:f8:38:30: 6d:4c:64:55:9c:e4:47:f5:e2:cf:8a:6a:5e:f0:6c:45: 92:b2:7d:55:4c:23:d8:bd:d3:b7:69:e9:ae:b1:4e:88: 6d:c1:a5:45:9c:ea:a4:fe:ec:a3:0f:cc:90:e7:03:50: d2:e1:14:e8:10:4d:29:e3:e8:e8:a5:22:0c:7e:92:ab: 3c:26:c0:85:44:e4:23:04:ab:9b:ac:31:2c:76:81:49: 10:41:22:30:9a:20:a2:ff:9e:bd:7d:dc:d6:01:8f:aa: 34:b7:d0:04:1e:69:dc:71:b7:d7:aa:5b:94:d4:46:ac: 96:5b:93:8f:ee:1d:35:7e:d7:41:09:bf:7b:e9:c0:66: d4:c2:3f:29:03:5b:c6:1c:96:35:0b:8f:3f:46:c3:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:c4:d9:45:6a:16:35:6b:1a:3f:4c:4e:29:51:fa:4e: a8:6b:4f:4c:12:f9:d1:a8:a0:3b:1e:da:76:d2:68:bc: 98:1a:e1:82:bb:79:43:76:85:59:a9:fc:7d:ba:1c:74: 8a:7d:1b:c2:e5:4e:5a:09:db:1f:ca:08:84:4a:33:a5: b8:d3:f0:3e:0c:e5:97:4d:cc:96:34:c5:a9:d7:38:a4: 24:79:1d:b9:6f:80:4f:5b:75:f1:d8:07:c5:a2:e0:08: fb:d4:d9:43:25:6b:c8:fd:5b:15:47:08:0f:b4:49:e6: 6b:4a:be:d9:4b:22:16:09:28:a7:09:3d:48:86:61:f9: e1:47:99:79:81:7b:65:2d:43:70:58:ba:cb:d3:69:bb: 60:7e:bb:b9:95:0b:da:c5:97:10:66:76:52:09:88:f5: 05:8b:98:74:51:ec:93:9f:06:85:fd:e1:5d:f1:2c:ba: fa:03:a4:35:a8:22:30:63:78:a1:86:84:e8:61:2b:3c: ff:56:11:f7:45:fe:57:14:2a:f7:6e:c9:3c:2e:b9:a1: 57:a3:2e:2b:77:3a:85:4e:d4:2f:fe:8d:5e:2c:9d:b4: 08:86:fa:57:a9:2b:65:ef:13:93:3f:e0:44:87:57:e6: 59:c7:7e:55:4a:67:e1:30:6b:05:02:82:51:1d:be:81 Fingerprint (SHA-256): 10:91:FA:6C:4F:77:8F:8C:94:96:86:B8:0D:EC:D4:F4:A4:07:65:39:06:21:BA:6D:DA:A0:C1:7C:31:17:32:27 Fingerprint (SHA1): F0:12:4F:E9:C3:C0:66:68:70:22:EE:44:26:FA:5E:A4:33:AD:49:3F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #8689: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153833 (0x6724be9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Fri Jan 08 20:43:35 2016 Not After : Fri Jan 08 20:43:35 2066 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:3e:2b:52:38:7a:5e:63:ce:d9:e9:2e:78:f7:d5:4a: e9:dd:be:9d:a0:7c:a8:11:cb:7a:d6:79:ab:fc:0b:f0: e9:78:4c:56:b6:2b:1f:e2:0c:98:ad:aa:bf:bc:64:16: 0a:a7:41:a8:4c:c6:7a:c2:6a:8c:9a:9e:2e:7d:78:7e: f9:35:9e:54:89:c2:2b:64:93:5a:48:c4:81:91:77:38: 44:0b:fc:48:8b:4b:d2:5f:92:22:7e:03:52:05:9f:2e: a0:bd:c5:a2:d8:eb:cd:e5:7c:dc:13:57:ca:ad:e0:f5: 56:f1:06:67:db:18:92:5e:1d:c6:a3:d0:fb:83:27:23: a7:74:30:f6:dc:fc:52:cf:fe:5b:23:d0:fd:83:5a:00: 7c:01:6f:a7:9b:0e:5c:f7:d4:f3:ba:a2:0e:3c:af:bb: 96:f7:fa:41:31:0e:b5:c0:21:0f:cf:c3:d0:ad:4c:64: 40:f2:ba:ed:0d:1c:26:8b:27:42:4e:30:ad:0a:e5:7c: 29:58:1a:1d:6a:6a:c7:ff:7d:c3:9b:73:cc:8b:34:a5: 4f:97:a2:2f:42:e7:c1:5c:cd:5c:70:71:bc:06:d5:40: 16:e5:e7:6b:26:ca:2e:38:05:88:fe:5e:41:01:44:0e: fe:a2:a3:7f:0f:3c:ea:81:78:7e:6c:a1:02:3a:86:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:bc:7e:2c:71:9f:e1:b6:7d:76:3f:1b:54:d7:a7:2c: 4e:55:57:c9:b4:d7:21:21:36:0b:2d:ce:cc:e7:2b:0b: ca:25:e2:c7:3c:19:b5:cf:09:e2:c6:ae:c2:09:b0:57: 2c:35:d6:f9:c2:c7:7d:f7:46:1c:f7:9f:8b:16:b5:b9: 39:95:d0:73:2e:78:7b:11:a9:b6:e2:a8:18:5f:9a:a2: d5:e1:09:17:d0:14:5b:82:d9:0b:30:11:5a:a5:35:57: 3b:fe:b0:62:f9:a2:ec:e7:59:ec:7a:b5:62:f7:15:38: 25:a4:f7:c6:a8:40:a1:e9:8a:e8:43:c8:5b:a9:9d:66: c5:bd:d9:e0:06:28:0d:79:31:bb:2e:92:64:80:d0:8b: e7:69:fb:c0:8b:0d:76:f3:30:08:73:70:49:fa:37:73: 56:d4:22:f7:ba:02:9e:33:d2:c5:ca:6b:02:dd:76:8f: 24:30:52:26:01:fe:22:34:1f:d6:d4:05:20:ee:96:bd: d3:63:8a:7d:82:ac:0b:7b:55:f8:0c:86:13:12:f9:6b: d6:4c:96:f8:b5:0b:1c:9a:c6:1f:33:74:6e:f2:d4:f3: ce:a9:32:00:73:70:bf:fa:9d:56:be:58:5c:27:67:f4: 49:95:ff:b7:47:c0:c4:7f:03:54:9a:1a:2f:81:ca:ed Fingerprint (SHA-256): 11:E3:77:17:D2:F3:83:4A:03:66:19:83:01:E7:C8:90:03:82:21:F1:E9:04:78:6A:A6:5A:03:B7:9D:79:08:49 Fingerprint (SHA1): B9:9B:E7:B2:C7:68:EF:F3:DC:14:B4:0E:24:FE:C1:B4:43:8D:F1:0D Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #8690: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153834 (0x6724bea) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Fri Jan 08 20:43:41 2016 Not After : Fri Jan 08 20:43:41 2066 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:f6:70:33:a3:fe:9f:62:7f:a6:49:46:e7:7b:8e:99: 6a:5d:fa:fc:02:b7:52:22:6e:2c:62:83:20:31:0c:fc: 9a:62:a4:c7:c6:fb:b7:33:56:96:a8:72:89:bd:6e:9d: 8b:a5:d6:c4:8d:50:73:00:a5:d7:fa:6c:5c:6e:ec:a2: 5d:a4:c5:10:4f:1f:e3:64:45:35:e1:fd:2f:9a:d2:99: 28:1c:27:c7:bf:cd:55:ab:a5:d7:23:49:a6:ca:b6:fc: 00:9b:72:a0:80:bb:43:33:72:6f:bb:cc:09:06:6a:33: 2f:85:43:11:8d:13:25:25:80:d8:a3:27:54:5b:3b:7d: 73:17:69:e7:a4:d6:94:58:c4:3c:ab:a4:a0:64:6f:88: c4:90:db:d7:3e:27:42:ed:49:d5:46:76:e5:75:3e:6a: ea:8d:06:0c:61:a4:1e:4c:5b:0c:25:5f:58:30:05:39: f2:94:87:ee:72:39:63:f8:85:7c:05:db:b6:0b:1e:4d: d2:39:86:48:71:5c:d4:1e:2c:66:a3:5d:39:76:1a:a6: d7:36:01:e3:46:a3:e2:29:55:6e:f7:f5:28:86:cd:06: e9:5d:9b:e4:7f:c7:44:db:f3:8b:46:43:80:24:60:c5: 4c:5a:22:7a:6a:f6:d7:49:39:c3:b6:29:50:13:e9:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7d:04:9d:a0:38:ae:f4:2a:c0:f8:22:83:40:6f:b3:24: c9:03:6d:b4:32:ff:57:a6:ea:32:f2:fe:32:63:d8:38: 62:92:34:83:ac:1e:0c:ed:be:ee:0c:83:87:bf:77:ee: 37:fc:85:1e:9a:d3:10:f7:ad:4c:8a:8c:0b:12:4b:9c: 1b:5f:b0:ff:96:10:65:f7:5a:f2:d2:5e:97:9f:fd:1d: 0e:a3:f9:58:6f:ed:b1:68:4a:d0:b5:0f:1a:a3:8a:8b: 6b:e9:14:88:9a:1f:46:1a:d9:6f:a3:b3:b4:51:4a:6b: ad:0e:3b:e5:ab:d6:77:b0:89:70:7c:a1:96:03:40:b0: f8:43:c8:2b:84:e0:96:3f:a4:fc:d2:d2:e6:44:96:4a: a3:3d:c3:b3:b3:4d:89:21:92:f7:ad:29:9d:1a:9e:3c: d1:c5:71:92:53:86:52:4f:d7:98:6c:08:61:fa:89:0b: 1b:7b:12:b8:f6:d9:fc:c7:32:e6:7d:c6:ff:dc:ca:5a: ce:0b:e3:a4:7b:1e:f7:3e:8a:da:c3:6d:7d:97:d8:3f: f8:68:78:4e:de:1d:c5:f1:34:00:f5:52:23:bd:d0:c9: dd:6e:d9:41:a2:62:37:2b:7b:b9:dd:3a:88:ab:59:ac: 74:47:45:48:2b:d0:1a:c8:c4:2c:c0:fb:52:e6:a8:3c Fingerprint (SHA-256): 51:1D:A5:13:26:B0:43:F4:6C:52:A9:4E:0B:2D:33:A0:FB:AB:A2:60:80:E7:3E:9E:AD:D2:ED:DB:EA:14:9C:9C Fingerprint (SHA1): E0:67:06:46:49:04:38:62:82:E5:66:B1:37:DF:F4:AE:DB:C9:3E:6F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #8691: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153835 (0x6724beb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Fri Jan 08 20:43:56 2016 Not After : Fri Jan 08 20:43:56 2066 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:71:12:5d:f7:09:87:38:17:b1:10:88:71:36:1f:75: d6:96:a5:72:10:7e:4e:eb:b4:49:01:02:66:58:47:12: 0c:0d:35:f1:98:00:cb:5f:7b:e0:3f:e1:3c:57:78:72: e7:27:a1:e5:ad:28:c1:56:20:63:da:ee:31:21:d1:2d: b1:78:ac:1d:1e:83:34:18:2f:a6:d6:fd:55:cf:fb:bd: 9b:40:6f:a1:b9:89:08:99:75:35:48:f9:b0:76:5d:6b: 5e:f2:ee:ec:99:66:53:44:8c:a9:5c:d2:20:67:9b:f4: 00:7c:b1:e2:e1:71:bd:18:23:ad:98:4f:63:de:31:ad: d8:9b:ca:61:63:68:05:4d:d1:4b:a7:da:3c:61:74:f5: b5:0a:08:ce:be:30:55:71:cd:cf:2e:e4:97:f6:3d:90: e0:e5:dc:20:16:9d:7b:8c:d5:8c:f2:e7:d4:c7:96:f5: b2:f3:e4:0e:dc:32:ff:be:dc:bf:bc:6b:cf:95:5e:3e: d8:ef:60:b4:16:ac:10:7b:5e:44:da:b0:8f:5b:fc:dd: 38:45:7e:82:9d:8d:48:0b:b3:94:a3:3f:36:58:1d:be: 3a:06:b5:35:2e:34:ca:44:3c:dc:31:ed:a8:c0:52:37: d2:e6:a4:8a:a5:c0:a8:a5:14:66:61:ea:c1:19:67:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bb:59:c0:cd:90:47:a1:ae:07:54:76:4a:07:77:24:5f: b4:b3:d9:3f:81:8c:bc:5c:56:e2:c4:7b:2f:ae:4e:bd: 6b:56:65:39:6b:c2:79:89:52:2d:65:ae:44:92:6b:ae: 86:2a:5e:9f:76:09:64:86:7b:41:69:16:52:fc:f7:40: f5:dc:a7:3c:db:ed:60:66:fb:8a:c0:14:d6:78:0e:a5: 1f:05:a7:49:ba:cb:d7:6a:bd:f1:65:fb:e2:b7:f3:cd: 41:79:e5:a5:30:78:f9:e4:0d:7d:69:d3:7f:32:9d:6b: e6:8a:52:bf:c1:e8:d5:93:77:80:ce:84:8b:76:47:64: 64:76:23:95:f1:b4:4e:8b:ef:92:85:d8:78:74:7f:da: 3b:7e:44:4d:70:3b:15:ed:9b:d6:5b:68:06:4e:19:ea: f7:dc:06:37:aa:3f:3a:83:2a:57:29:94:a1:19:1a:ed: 64:7e:e3:71:fd:e7:e3:05:84:a8:9e:04:f6:ee:71:b7: d4:b4:79:87:a7:6b:9b:52:1e:53:f5:df:0b:c5:10:6a: 9e:3e:fa:fa:6a:0b:20:7f:6e:a4:ea:cb:d3:b9:02:66: 44:db:9c:3c:d8:2c:3c:f9:b8:23:60:a2:c1:6c:c5:af: bf:9d:9f:b6:66:16:87:9d:e1:d5:3f:6a:dc:0b:4e:a2 Fingerprint (SHA-256): 44:D2:EB:AC:EA:5B:1A:BE:05:02:B8:94:75:89:46:FC:23:31:37:09:71:D2:3A:66:24:04:35:78:06:EC:62:80 Fingerprint (SHA1): DB:DE:3E:8C:38:89:51:59:8E:4B:40:6D:73:27:6D:32:E6:46:E2:D9 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #8692: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153836 (0x6724bec) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Fri Jan 08 20:43:59 2016 Not After : Fri Jan 08 20:43:59 2066 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:8f:6a:da:e8:20:38:73:33:43:4d:aa:08:e2:33:e6: 15:ff:94:11:1b:0f:8d:0d:4a:87:bf:35:40:06:4a:6f: d6:f0:06:99:7f:ea:27:78:dc:fa:88:a0:6e:b6:ba:c7: 05:31:54:aa:44:55:0c:e8:57:7d:83:be:72:19:76:cd: b2:c7:fb:06:5e:c7:06:2b:a3:bc:27:1b:38:f7:3a:17: 9e:5d:2f:66:bb:36:02:db:b4:03:98:45:5a:59:13:a1: 2a:82:94:2d:67:4b:05:c1:59:7c:9f:9b:3f:a7:33:b3: 47:d5:b0:5f:f5:de:4e:22:b9:4a:f8:78:6a:33:ad:eb: da:da:3c:33:12:af:8a:88:4d:da:2c:59:2f:02:b7:e3: 32:3d:75:9b:81:e5:98:67:71:96:68:ba:94:fb:60:b9: 5a:ca:09:91:a6:f0:bd:8f:e5:a2:50:54:60:48:1e:9a: 73:f4:b9:f3:a1:4b:1f:61:4f:d1:c2:db:71:a2:8d:33: 6b:b7:1c:c4:1e:44:7b:46:7e:03:99:c1:2d:6e:d9:c4: 88:0e:09:ea:22:b6:55:c6:8e:4d:10:f1:80:12:b6:9a: 8d:de:5f:d8:9c:e7:8f:e5:4b:16:26:9a:bb:09:6c:71: bc:27:94:05:e8:85:9e:4b:ee:c4:b5:c1:20:b5:76:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:f4:ea:8f:d9:4b:02:54:82:1d:28:de:6e:c5:4a:10: 6d:b0:92:2c:9f:93:13:b3:24:66:d2:00:83:0f:24:ca: fb:f6:93:2e:10:7b:43:45:45:3a:50:ed:db:78:b0:e8: 4d:a9:da:74:4d:44:1d:69:4f:db:0c:7b:43:13:7e:39: 64:2d:35:8b:ee:2b:79:3d:a0:ca:08:ba:a0:1b:d6:c3: 8d:e8:39:6d:df:df:f1:77:32:d0:3a:95:0f:14:ec:76: 37:44:46:4a:c0:04:07:fd:41:9f:60:2d:d9:36:45:c0: 66:fe:b3:f3:39:11:0e:54:1e:60:68:8c:ef:37:cb:76: 24:0e:15:d5:ef:c1:60:65:72:a3:68:40:b5:63:46:cf: c6:a3:fe:41:4f:31:a7:26:ba:69:28:f4:50:b5:22:a4: 1a:07:9a:98:63:b2:6d:11:04:c7:ec:ee:43:36:c0:51: 69:1d:c1:e8:ca:40:8a:cf:73:76:ad:80:ad:67:b6:96: 34:7b:93:69:64:f1:80:3b:74:cc:69:6f:4b:9c:50:e8: 0b:de:11:2d:0f:85:7f:c6:c3:b9:ef:73:5d:c1:6c:3a: 7e:dd:82:3c:2d:0c:cc:d5:1b:6e:67:cd:1d:cc:07:d1: 5c:37:41:74:b9:b9:4b:2c:cb:a6:e4:11:3d:20:e5:82 Fingerprint (SHA-256): 2A:F0:9E:90:21:85:6A:24:B6:77:E3:33:6C:27:57:E5:7F:2D:D0:AF:B2:76:6F:43:EE:FF:2C:1E:0E:72:AF:06 Fingerprint (SHA1): 52:08:BD:C0:B2:9B:7A:23:DB:42:5D:40:0B:60:77:2F:7F:C3:58:B7 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #8693: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153837 (0x6724bed) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Fri Jan 08 20:44:10 2016 Not After : Fri Jan 08 20:44:10 2066 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:df:1b:8a:fc:4a:13:11:e1:40:db:10:97:b2:3a:61: 39:93:94:af:6c:d3:2f:09:fd:d9:eb:e2:d6:9c:85:6c: e0:74:cd:73:0f:c9:43:bb:e7:d8:11:70:6d:68:dc:3f: 40:27:49:31:4f:72:e1:96:e6:25:f6:d3:b2:39:6f:12: eb:0c:11:0f:b6:07:f0:b4:69:90:66:20:c0:be:bf:a8: 86:ba:02:ae:35:c1:e4:7e:64:ce:33:4b:60:4e:2d:e4: f2:0b:a6:31:b5:e6:31:a5:1f:50:44:82:e5:87:fd:5c: d0:d0:f9:5c:27:d3:87:ff:ef:5e:53:ba:cf:25:16:4e: 3d:86:23:a7:a3:8c:35:b3:d6:76:10:ed:3d:56:76:c0: 45:d3:e1:92:dd:b2:7a:76:af:d6:ea:46:88:39:e7:81: cc:9d:46:59:c1:48:49:ba:44:dc:25:01:4d:a1:01:06: d3:a9:3b:ea:46:d7:7a:8c:44:7c:e7:3e:55:ed:17:84: 0a:05:ae:17:37:00:f2:a7:b4:e6:6d:93:32:c5:58:a7: 40:15:58:af:1a:67:be:14:87:8f:46:4e:de:fb:04:80: 22:4b:06:ab:4e:71:b1:16:de:16:3a:ad:bc:80:0b:29: 61:56:60:41:91:5d:b5:9c:b3:d2:b9:29:b8:24:db:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 92:05:70:89:db:d4:b3:96:30:78:c6:77:20:fb:75:15: 2d:84:47:e6:1d:3d:85:be:a1:5f:f6:64:b8:25:96:9a: 45:f5:a7:e5:aa:44:fa:e1:bc:3d:e0:2d:ac:e4:5f:d3: 98:96:dd:79:83:a8:45:bc:c5:9b:4e:01:b1:1f:f2:ea: c5:12:b6:9d:0f:c1:3b:01:19:91:2b:52:5b:d3:a8:7f: fa:a2:67:21:cf:22:53:d0:12:05:da:65:74:76:2f:96: 9c:64:5c:77:39:10:f5:8d:60:c2:a6:32:dd:7d:00:cd: 10:44:a1:d7:b6:70:a9:49:25:83:57:68:22:33:1f:56: 56:5a:32:28:19:94:7d:a9:23:8d:d0:3f:99:5a:c5:0f: b6:8d:43:49:79:5e:4b:26:38:be:a5:48:d6:a3:17:c2: 43:ee:f5:54:d9:ce:52:0c:ce:ec:fe:fc:cc:8a:db:0f: 6e:b3:32:55:38:46:f8:9d:ef:a3:61:82:e9:a9:2e:03: 20:92:14:41:46:d6:33:ab:07:bb:21:2d:de:af:64:e3: 8b:d8:a5:a2:83:1a:64:e2:07:ae:72:f5:af:06:f8:24: b2:dc:ae:b3:82:22:ad:c3:cc:05:a6:c2:cb:8c:5e:fc: ce:ed:2d:f8:65:a9:a4:e9:87:1e:8d:cf:f3:12:9e:30 Fingerprint (SHA-256): 24:9F:25:67:75:94:11:AC:B2:CB:57:73:B4:01:D6:D8:56:17:30:C6:EF:13:A6:B8:D6:C4:26:AE:1F:DD:DE:E6 Fingerprint (SHA1): 36:30:83:3C:89:C6:96:0A:B2:EA:35:E2:83:92:1E:AE:5C:38:F7:B5 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #8694: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153838 (0x6724bee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Fri Jan 08 20:44:23 2016 Not After : Fri Jan 08 20:44:23 2066 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:5c:e8:2f:c4:62:26:0c:cc:9c:eb:66:8e:67:41:82: fe:1d:09:6e:ac:38:a4:c2:7d:a9:24:0b:78:06:60:80: a4:68:ba:43:01:dd:be:cc:6f:b6:80:98:c6:9d:1a:5a: c8:f3:14:5b:10:e8:d7:bc:4c:7f:13:51:2f:af:4a:d2: d3:8e:52:5e:f5:8f:1b:cb:b3:93:d5:a4:1f:30:6d:d3: 97:dd:35:ad:b1:59:1c:d0:a1:5f:49:f7:0a:99:af:58: f7:04:e7:75:ba:aa:68:22:b5:37:e5:1d:8a:e4:72:f2: 74:24:9f:8e:db:f1:31:3f:e7:2a:9d:29:c7:87:d1:e9: 58:b6:6b:aa:ee:05:0c:a4:e4:5d:5d:13:b5:18:f7:26: 10:34:11:51:b9:68:5c:ee:92:e6:35:dc:51:46:00:fd: 13:3b:ec:77:a2:e2:4a:b6:08:a3:ed:3a:ff:f3:f2:4d: 58:ec:2a:1c:31:89:90:ee:30:c1:5e:4e:90:c2:37:c3: 2b:53:82:24:e3:bc:21:41:1b:f9:65:76:74:bc:fb:64: 2e:74:82:40:2f:f0:1b:3f:b2:36:14:1d:a9:4c:1c:b9: 9a:56:64:d9:8c:29:82:1f:d5:f6:81:7b:cb:cd:59:1a: a2:03:fa:61:05:3d:46:9d:db:d1:1c:53:70:82:ee:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:c3:4d:25:9b:4b:62:7e:5a:db:2a:b8:fa:46:d2:51: 3a:e0:64:94:eb:52:fb:64:8e:ba:c9:84:b3:ee:c1:72: f0:d0:41:25:9a:85:da:33:5b:f3:6a:03:0c:3c:28:66: 51:fe:20:9f:2a:03:bf:be:30:e3:96:7d:31:f0:62:48: 57:52:d5:b4:ce:4d:6d:7d:78:41:c2:1a:62:48:a7:01: 32:de:8f:b0:f4:22:74:7e:22:dd:ba:b7:6b:c4:41:68: 39:33:bc:29:47:79:f4:3c:24:0c:2a:3f:3e:db:e5:4f: 0e:3d:1d:7b:59:dc:f4:d0:6b:0f:d2:3b:68:4c:51:62: 4d:da:63:56:09:88:14:4b:6e:44:68:d9:20:e5:00:c9: b9:81:43:dd:bb:de:a6:75:a9:10:7e:75:64:96:4b:05: 35:da:05:b3:cb:27:5a:18:15:d6:c8:86:bf:77:6c:1a: 93:e1:e1:f8:20:15:4a:b4:0b:a2:f6:4a:d7:4c:f0:28: c8:2c:4f:3b:9b:f8:06:15:78:9d:63:1c:bd:86:2a:04: 53:15:bf:b1:3a:4b:fa:b6:c4:4f:8a:96:1b:db:c4:db: 39:5b:c7:16:c6:25:99:f7:38:1e:cd:24:92:ee:af:f6: 5c:1b:1f:03:83:38:07:10:26:e8:91:46:66:d8:ab:0c Fingerprint (SHA-256): D8:78:2A:6C:56:4A:C7:4B:50:86:DE:AB:B4:59:AD:F7:E8:EB:2A:3A:60:29:CA:C6:88:8B:7C:28:E9:F0:23:AE Fingerprint (SHA1): 9D:38:52:6B:21:9D:B1:51:24:7A:EB:9A:80:E9:52:88:F8:D9:9D:DF Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #8695: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #8696: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153853 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8697: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #8698: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8699: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8700: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108153854 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8701: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8702: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8703: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8704: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108153855 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8705: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8706: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #8707: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8708: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108153856 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8709: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8710: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8711: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153853 (0x6724bfd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 20:45:50 2016 Not After : Fri Jan 08 20:45:50 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:26:a3:24:30:cc:63:76:1c:a0:50:fe:3c:74:ba:89: c2:81:c8:20:8a:50:dd:a9:b0:1e:65:ef:09:6c:bc:85: 08:78:2f:81:f3:22:d9:ec:1c:67:2a:4b:36:f3:fd:55: 9d:d4:1f:df:80:a6:96:e9:7e:5e:d4:c6:33:01:08:68: 61:79:d0:70:51:b2:5b:66:6e:f6:88:79:c9:d5:86:10: 1f:56:17:49:3d:24:8b:0d:cc:0b:60:2d:1c:96:ec:b7: 3d:74:e7:08:70:d0:c1:a7:07:c1:0a:19:92:64:89:30: ef:3a:48:3f:ed:a5:05:23:2e:ce:45:fd:7d:88:55:44: 34:d1:82:56:c7:7c:cf:be:67:53:b4:f3:b8:2c:c4:32: c7:f2:f6:c4:8a:66:d8:5f:5b:f3:be:ec:3a:55:7b:a4: be:90:e4:48:74:69:85:8e:dc:48:79:4e:6e:c7:78:e9: bc:ad:0a:64:d5:ff:29:ad:ae:ed:18:06:8b:8a:eb:02: 3f:37:30:56:08:e6:5e:11:ef:c3:dd:fb:37:60:3c:f4: 48:05:94:b2:f6:94:85:43:c9:60:96:f2:00:a4:84:a6: b2:1c:45:e9:f1:12:12:b0:8e:3b:55:6c:17:e7:cb:cf: fd:3b:5d:0f:fe:9f:cd:b8:4e:9a:16:39:55:27:88:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:77:51:93:75:f0:c9:8a:06:a5:28:73:31:d3:a4:63: 26:4b:4a:7a:aa:2a:0d:ac:f6:db:07:89:24:db:a9:67: 10:dc:1b:2e:c8:d6:a7:2f:3f:59:fa:87:c3:b9:a1:f3: 42:9e:f2:4d:a2:31:5f:f7:5b:6b:37:0b:82:5b:4b:b6: af:ca:63:39:10:80:1c:fb:6b:50:47:bd:e1:f7:eb:0c: ee:f5:33:b1:a4:8b:65:75:28:4d:be:e4:fc:c5:26:91: b7:40:bc:8a:29:db:a2:fb:cf:0c:9a:a8:03:ef:28:a2: cd:e7:02:e4:db:fc:d8:0c:1e:22:3d:30:22:e2:3a:05: 7f:72:e2:8d:64:31:52:c9:2f:1e:b2:8f:79:f5:3e:c3: 2f:c4:20:85:a9:87:56:6a:e5:3c:ea:09:ac:c5:e5:18: 3e:26:88:9a:54:eb:50:0f:5c:d7:51:f7:5e:f6:22:8c: 40:02:34:2a:bd:73:35:d7:7a:a4:b9:e3:b5:e0:fb:e2: 44:d4:0d:86:c1:96:83:5e:93:2f:78:47:c5:ca:5c:f6: f9:8c:93:1a:95:de:47:01:d7:35:6f:ad:91:a7:5a:49: 50:f5:de:67:34:c2:61:7c:56:6a:0c:1e:71:90:09:36: c0:c2:54:b3:ff:a1:38:54:eb:18:00:5e:68:09:46:a1 Fingerprint (SHA-256): 71:74:B4:35:82:1E:FF:69:ED:BD:A9:C0:3C:4F:20:C8:F3:0A:83:9A:8E:A0:3A:6F:E1:C1:31:92:FA:1E:42:77 Fingerprint (SHA1): 90:CF:DE:AA:54:16:AC:38:3D:2E:A4:FF:AC:1C:39:F3:4D:B2:D6:98 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8712: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8713: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153854 (0x6724bfe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 20:46:04 2016 Not After : Fri Jan 08 20:46:04 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:1f:0a:1b:2b:13:95:db:2e:8d:45:80:81:2f:85:81: 51:96:53:99:b0:ac:5f:e3:49:3b:bd:9f:d9:b4:87:d4: 0e:d5:60:b9:ef:ec:d2:b9:b1:83:c5:1f:b7:b3:ad:9e: 0d:61:d9:b2:fd:56:36:53:0f:33:f1:58:f1:8b:9d:d3: 20:c8:52:89:91:6f:d7:5f:e5:2b:5f:27:41:10:e9:53: 77:97:f6:82:a0:40:60:a5:6a:f1:57:68:2e:b2:5f:ae: f2:58:19:66:ca:46:02:bb:cb:28:09:24:92:c3:5a:a5: 82:8c:48:21:7e:56:0e:a1:b3:bc:bb:ce:c4:18:19:2c: 30:f6:2c:1d:39:f5:43:13:3d:2f:44:9e:6b:54:46:6a: 2b:b1:ae:43:76:3d:10:c7:ec:92:22:e9:8b:98:11:72: 1d:81:53:16:be:0d:b8:3f:c3:c3:6d:28:eb:6d:54:da: 1a:bf:3a:52:c9:e1:36:10:14:29:55:a4:62:4a:46:50: e2:68:de:ad:7b:03:e5:94:78:29:fd:53:5e:4c:f3:91: a1:45:4c:ff:22:98:c1:d8:45:85:86:16:68:36:9e:09: dd:44:72:a4:df:cb:1a:f1:18:6c:da:e3:94:77:ed:5a: 09:fd:72:5e:73:17:1e:66:e3:a0:ef:d3:47:4a:e9:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 70:a8:f4:41:ec:db:81:ca:85:37:6a:94:95:7c:a3:ec: f7:0b:f3:d7:7c:56:17:87:28:85:86:1d:df:74:92:39: 29:de:09:7b:fb:25:e0:b2:ea:e3:35:e5:64:6e:d8:ee: 71:4e:d6:ad:73:6c:64:ce:f7:42:6a:2c:3d:76:17:b6: f3:bf:a1:ae:94:71:24:05:66:ad:ee:62:f5:04:70:9e: 14:ca:a5:05:d9:f2:d4:ac:9e:a2:8f:22:b0:fd:b7:74: 86:b0:a8:3d:a4:c4:1e:f1:d2:88:bb:84:96:30:33:a8: b2:8c:52:23:08:02:a0:37:14:0e:86:9b:43:8f:a1:9f: a3:ba:7e:ea:02:af:f9:90:9d:0e:c8:b0:8d:5f:2c:b4: df:27:85:90:3e:1e:ba:bb:20:59:a7:81:02:3d:be:08: 2d:62:6a:81:53:e8:41:35:2f:a4:fe:98:35:0b:cf:ee: be:33:2f:8b:0a:38:f6:3a:c3:59:f4:18:02:39:cb:8e: 51:72:ab:cc:20:c9:99:e2:84:b1:ac:df:6b:f2:5b:18: df:06:58:67:71:fe:eb:b5:35:3a:bf:eb:44:00:90:85: 2b:e3:b6:20:81:00:fc:a1:9a:d8:7b:f2:ec:ce:1a:51: 10:5e:e4:4e:63:3f:74:42:0b:75:da:8e:6f:da:66:84 Fingerprint (SHA-256): 0B:BE:3E:BC:B0:DB:E3:03:BD:9D:41:AB:1C:54:3C:44:B4:C8:75:39:63:89:F0:34:19:1D:10:CF:CB:FC:85:A5 Fingerprint (SHA1): 4C:CA:4B:C8:BF:06:58:C5:3C:78:9D:9F:2C:86:9D:6E:84:AE:2F:A1 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #8714: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8715: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153855 (0x6724bff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 20:46:12 2016 Not After : Fri Jan 08 20:46:12 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:92:b9:22:2e:18:0d:ca:35:a9:38:77:6f:96:7e:a3: 74:6f:21:92:58:9e:f0:86:92:71:cd:47:b8:78:57:59: a8:05:ab:35:c2:b8:3c:eb:75:2c:52:e2:7e:9d:1e:61: b8:50:93:9d:ec:05:c2:b3:d4:79:c3:ed:09:0e:38:66: 79:b9:ec:66:9a:4e:1a:c1:99:77:7c:67:93:6d:d9:ed: dd:12:3c:6f:48:10:47:d7:61:b7:72:fc:bf:da:40:67: e4:0d:19:23:d6:36:59:2b:30:3d:ef:ef:5c:e1:49:2e: 4d:cb:a2:2c:49:af:ba:5f:1d:56:31:8c:95:92:2d:3f: 78:e5:4a:b4:0c:43:1d:86:9f:1c:4b:f5:de:49:44:cc: 25:69:f6:93:02:55:5a:7f:60:e0:ef:cb:7f:b1:c7:3c: 92:08:09:d7:a4:c2:40:c7:de:e9:6d:8d:c5:7e:d9:16: 17:2a:cb:12:99:ea:47:40:11:4f:66:23:5a:eb:bd:9c: 47:92:ef:76:39:1d:d8:15:f0:a4:2a:59:df:16:26:b5: 0b:42:90:47:00:50:60:e5:e6:ba:ec:35:10:34:71:b1: 01:79:04:f7:e6:9e:f2:34:65:d9:60:a6:e1:f8:c1:86: 92:10:2c:ed:79:7b:9d:85:fd:bc:b2:9a:33:1f:10:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:9e:8a:10:80:5c:e2:12:9f:8d:cf:47:c8:40:ae:8e: f1:17:64:65:be:ad:b3:ec:ff:fb:0e:f5:02:26:70:f3: 94:e8:39:0e:13:48:e6:a7:22:69:81:31:44:95:18:b9: d1:2d:b1:41:35:e6:6e:22:68:11:f8:c8:54:ca:6c:09: 7f:2a:e8:f1:4f:be:27:fb:db:40:d4:4a:69:b5:32:47: 8c:aa:7e:05:1d:64:2c:ca:15:a0:c9:43:78:a7:f2:ab: b3:4d:6d:67:bf:e2:cc:3c:c8:ed:e0:95:98:83:e9:d6: 31:a9:e1:68:cc:fa:20:9c:95:83:66:26:9b:ca:c4:fd: 68:cf:f8:a6:50:79:fd:41:c0:93:56:97:4d:86:2e:57: 28:6c:86:f0:65:e3:ba:a9:19:8d:0a:a9:79:94:b1:4d: 1d:78:12:28:8e:0f:46:ee:0d:53:39:38:58:30:41:72: 17:47:96:d3:15:98:a5:fd:30:95:72:69:b3:c2:cd:39: 65:48:ac:22:6a:a6:ab:03:b5:d4:c5:05:63:b9:51:f9: e6:e6:55:17:09:ed:60:8f:9e:cd:f9:8a:da:a0:b2:d2: c1:78:8c:a1:86:f4:15:66:84:be:a3:3a:50:72:28:c5: 36:f3:61:01:dd:0a:2d:dc:af:68:77:5d:01:1c:9e:3e Fingerprint (SHA-256): 0D:B9:0C:D7:97:8A:21:EA:75:61:22:4B:5C:4B:73:51:12:81:43:ED:E6:1C:C1:15:DA:89:3B:CA:A4:2E:1D:B7 Fingerprint (SHA1): 22:B4:C1:78:0E:07:3F:6F:38:DB:FA:BB:3E:9E:E0:FC:87:EA:75:47 Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #8716: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8717: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #8718: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #8719: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #8720: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153853 (0x6724bfd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 20:45:50 2016 Not After : Fri Jan 08 20:45:50 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:26:a3:24:30:cc:63:76:1c:a0:50:fe:3c:74:ba:89: c2:81:c8:20:8a:50:dd:a9:b0:1e:65:ef:09:6c:bc:85: 08:78:2f:81:f3:22:d9:ec:1c:67:2a:4b:36:f3:fd:55: 9d:d4:1f:df:80:a6:96:e9:7e:5e:d4:c6:33:01:08:68: 61:79:d0:70:51:b2:5b:66:6e:f6:88:79:c9:d5:86:10: 1f:56:17:49:3d:24:8b:0d:cc:0b:60:2d:1c:96:ec:b7: 3d:74:e7:08:70:d0:c1:a7:07:c1:0a:19:92:64:89:30: ef:3a:48:3f:ed:a5:05:23:2e:ce:45:fd:7d:88:55:44: 34:d1:82:56:c7:7c:cf:be:67:53:b4:f3:b8:2c:c4:32: c7:f2:f6:c4:8a:66:d8:5f:5b:f3:be:ec:3a:55:7b:a4: be:90:e4:48:74:69:85:8e:dc:48:79:4e:6e:c7:78:e9: bc:ad:0a:64:d5:ff:29:ad:ae:ed:18:06:8b:8a:eb:02: 3f:37:30:56:08:e6:5e:11:ef:c3:dd:fb:37:60:3c:f4: 48:05:94:b2:f6:94:85:43:c9:60:96:f2:00:a4:84:a6: b2:1c:45:e9:f1:12:12:b0:8e:3b:55:6c:17:e7:cb:cf: fd:3b:5d:0f:fe:9f:cd:b8:4e:9a:16:39:55:27:88:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:77:51:93:75:f0:c9:8a:06:a5:28:73:31:d3:a4:63: 26:4b:4a:7a:aa:2a:0d:ac:f6:db:07:89:24:db:a9:67: 10:dc:1b:2e:c8:d6:a7:2f:3f:59:fa:87:c3:b9:a1:f3: 42:9e:f2:4d:a2:31:5f:f7:5b:6b:37:0b:82:5b:4b:b6: af:ca:63:39:10:80:1c:fb:6b:50:47:bd:e1:f7:eb:0c: ee:f5:33:b1:a4:8b:65:75:28:4d:be:e4:fc:c5:26:91: b7:40:bc:8a:29:db:a2:fb:cf:0c:9a:a8:03:ef:28:a2: cd:e7:02:e4:db:fc:d8:0c:1e:22:3d:30:22:e2:3a:05: 7f:72:e2:8d:64:31:52:c9:2f:1e:b2:8f:79:f5:3e:c3: 2f:c4:20:85:a9:87:56:6a:e5:3c:ea:09:ac:c5:e5:18: 3e:26:88:9a:54:eb:50:0f:5c:d7:51:f7:5e:f6:22:8c: 40:02:34:2a:bd:73:35:d7:7a:a4:b9:e3:b5:e0:fb:e2: 44:d4:0d:86:c1:96:83:5e:93:2f:78:47:c5:ca:5c:f6: f9:8c:93:1a:95:de:47:01:d7:35:6f:ad:91:a7:5a:49: 50:f5:de:67:34:c2:61:7c:56:6a:0c:1e:71:90:09:36: c0:c2:54:b3:ff:a1:38:54:eb:18:00:5e:68:09:46:a1 Fingerprint (SHA-256): 71:74:B4:35:82:1E:FF:69:ED:BD:A9:C0:3C:4F:20:C8:F3:0A:83:9A:8E:A0:3A:6F:E1:C1:31:92:FA:1E:42:77 Fingerprint (SHA1): 90:CF:DE:AA:54:16:AC:38:3D:2E:A4:FF:AC:1C:39:F3:4D:B2:D6:98 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8721: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8722: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153854 (0x6724bfe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 20:46:04 2016 Not After : Fri Jan 08 20:46:04 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:1f:0a:1b:2b:13:95:db:2e:8d:45:80:81:2f:85:81: 51:96:53:99:b0:ac:5f:e3:49:3b:bd:9f:d9:b4:87:d4: 0e:d5:60:b9:ef:ec:d2:b9:b1:83:c5:1f:b7:b3:ad:9e: 0d:61:d9:b2:fd:56:36:53:0f:33:f1:58:f1:8b:9d:d3: 20:c8:52:89:91:6f:d7:5f:e5:2b:5f:27:41:10:e9:53: 77:97:f6:82:a0:40:60:a5:6a:f1:57:68:2e:b2:5f:ae: f2:58:19:66:ca:46:02:bb:cb:28:09:24:92:c3:5a:a5: 82:8c:48:21:7e:56:0e:a1:b3:bc:bb:ce:c4:18:19:2c: 30:f6:2c:1d:39:f5:43:13:3d:2f:44:9e:6b:54:46:6a: 2b:b1:ae:43:76:3d:10:c7:ec:92:22:e9:8b:98:11:72: 1d:81:53:16:be:0d:b8:3f:c3:c3:6d:28:eb:6d:54:da: 1a:bf:3a:52:c9:e1:36:10:14:29:55:a4:62:4a:46:50: e2:68:de:ad:7b:03:e5:94:78:29:fd:53:5e:4c:f3:91: a1:45:4c:ff:22:98:c1:d8:45:85:86:16:68:36:9e:09: dd:44:72:a4:df:cb:1a:f1:18:6c:da:e3:94:77:ed:5a: 09:fd:72:5e:73:17:1e:66:e3:a0:ef:d3:47:4a:e9:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 70:a8:f4:41:ec:db:81:ca:85:37:6a:94:95:7c:a3:ec: f7:0b:f3:d7:7c:56:17:87:28:85:86:1d:df:74:92:39: 29:de:09:7b:fb:25:e0:b2:ea:e3:35:e5:64:6e:d8:ee: 71:4e:d6:ad:73:6c:64:ce:f7:42:6a:2c:3d:76:17:b6: f3:bf:a1:ae:94:71:24:05:66:ad:ee:62:f5:04:70:9e: 14:ca:a5:05:d9:f2:d4:ac:9e:a2:8f:22:b0:fd:b7:74: 86:b0:a8:3d:a4:c4:1e:f1:d2:88:bb:84:96:30:33:a8: b2:8c:52:23:08:02:a0:37:14:0e:86:9b:43:8f:a1:9f: a3:ba:7e:ea:02:af:f9:90:9d:0e:c8:b0:8d:5f:2c:b4: df:27:85:90:3e:1e:ba:bb:20:59:a7:81:02:3d:be:08: 2d:62:6a:81:53:e8:41:35:2f:a4:fe:98:35:0b:cf:ee: be:33:2f:8b:0a:38:f6:3a:c3:59:f4:18:02:39:cb:8e: 51:72:ab:cc:20:c9:99:e2:84:b1:ac:df:6b:f2:5b:18: df:06:58:67:71:fe:eb:b5:35:3a:bf:eb:44:00:90:85: 2b:e3:b6:20:81:00:fc:a1:9a:d8:7b:f2:ec:ce:1a:51: 10:5e:e4:4e:63:3f:74:42:0b:75:da:8e:6f:da:66:84 Fingerprint (SHA-256): 0B:BE:3E:BC:B0:DB:E3:03:BD:9D:41:AB:1C:54:3C:44:B4:C8:75:39:63:89:F0:34:19:1D:10:CF:CB:FC:85:A5 Fingerprint (SHA1): 4C:CA:4B:C8:BF:06:58:C5:3C:78:9D:9F:2C:86:9D:6E:84:AE:2F:A1 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #8723: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8724: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153855 (0x6724bff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 20:46:12 2016 Not After : Fri Jan 08 20:46:12 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:92:b9:22:2e:18:0d:ca:35:a9:38:77:6f:96:7e:a3: 74:6f:21:92:58:9e:f0:86:92:71:cd:47:b8:78:57:59: a8:05:ab:35:c2:b8:3c:eb:75:2c:52:e2:7e:9d:1e:61: b8:50:93:9d:ec:05:c2:b3:d4:79:c3:ed:09:0e:38:66: 79:b9:ec:66:9a:4e:1a:c1:99:77:7c:67:93:6d:d9:ed: dd:12:3c:6f:48:10:47:d7:61:b7:72:fc:bf:da:40:67: e4:0d:19:23:d6:36:59:2b:30:3d:ef:ef:5c:e1:49:2e: 4d:cb:a2:2c:49:af:ba:5f:1d:56:31:8c:95:92:2d:3f: 78:e5:4a:b4:0c:43:1d:86:9f:1c:4b:f5:de:49:44:cc: 25:69:f6:93:02:55:5a:7f:60:e0:ef:cb:7f:b1:c7:3c: 92:08:09:d7:a4:c2:40:c7:de:e9:6d:8d:c5:7e:d9:16: 17:2a:cb:12:99:ea:47:40:11:4f:66:23:5a:eb:bd:9c: 47:92:ef:76:39:1d:d8:15:f0:a4:2a:59:df:16:26:b5: 0b:42:90:47:00:50:60:e5:e6:ba:ec:35:10:34:71:b1: 01:79:04:f7:e6:9e:f2:34:65:d9:60:a6:e1:f8:c1:86: 92:10:2c:ed:79:7b:9d:85:fd:bc:b2:9a:33:1f:10:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:9e:8a:10:80:5c:e2:12:9f:8d:cf:47:c8:40:ae:8e: f1:17:64:65:be:ad:b3:ec:ff:fb:0e:f5:02:26:70:f3: 94:e8:39:0e:13:48:e6:a7:22:69:81:31:44:95:18:b9: d1:2d:b1:41:35:e6:6e:22:68:11:f8:c8:54:ca:6c:09: 7f:2a:e8:f1:4f:be:27:fb:db:40:d4:4a:69:b5:32:47: 8c:aa:7e:05:1d:64:2c:ca:15:a0:c9:43:78:a7:f2:ab: b3:4d:6d:67:bf:e2:cc:3c:c8:ed:e0:95:98:83:e9:d6: 31:a9:e1:68:cc:fa:20:9c:95:83:66:26:9b:ca:c4:fd: 68:cf:f8:a6:50:79:fd:41:c0:93:56:97:4d:86:2e:57: 28:6c:86:f0:65:e3:ba:a9:19:8d:0a:a9:79:94:b1:4d: 1d:78:12:28:8e:0f:46:ee:0d:53:39:38:58:30:41:72: 17:47:96:d3:15:98:a5:fd:30:95:72:69:b3:c2:cd:39: 65:48:ac:22:6a:a6:ab:03:b5:d4:c5:05:63:b9:51:f9: e6:e6:55:17:09:ed:60:8f:9e:cd:f9:8a:da:a0:b2:d2: c1:78:8c:a1:86:f4:15:66:84:be:a3:3a:50:72:28:c5: 36:f3:61:01:dd:0a:2d:dc:af:68:77:5d:01:1c:9e:3e Fingerprint (SHA-256): 0D:B9:0C:D7:97:8A:21:EA:75:61:22:4B:5C:4B:73:51:12:81:43:ED:E6:1C:C1:15:DA:89:3B:CA:A4:2E:1D:B7 Fingerprint (SHA1): 22:B4:C1:78:0E:07:3F:6F:38:DB:FA:BB:3E:9E:E0:FC:87:EA:75:47 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #8725: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8726: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #8727: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153857 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8728: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #8729: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8730: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8731: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108153858 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8732: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8733: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8734: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8735: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108153859 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8736: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8737: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #8738: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8739: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 108153860 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8740: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8741: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #8742: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8743: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 108153861 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8744: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8745: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8746: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153857 (0x6724c01) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 20:46:38 2016 Not After : Fri Jan 08 20:46:38 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:5c:e5:0a:ff:82:b6:79:b8:fe:73:46:29:80:58:4d: c6:74:62:c1:7e:25:74:ce:1b:e1:1b:d2:b3:f1:55:e8: 30:47:82:e0:f0:87:bf:c7:c1:69:4e:52:02:f9:22:1f: ca:9d:6f:e7:ef:06:ba:a7:30:0c:07:f6:47:b5:22:b0: a2:11:31:46:cc:8a:b2:70:d5:60:34:11:84:43:db:e0: 65:39:dd:a4:57:18:98:7e:f1:44:e0:ce:28:9b:bc:0e: 7b:ca:ed:f0:34:a8:91:0d:4e:a4:45:ec:e2:7f:72:ac: b9:f5:00:55:f2:88:f8:4c:09:71:b3:33:4c:12:ae:df: 70:db:f3:c8:1b:83:9b:86:a9:9f:b0:8d:52:d9:a8:63: bf:87:27:a6:32:28:1a:6a:d5:66:b1:a7:62:3c:f9:42: 0a:cf:6f:43:18:07:03:34:80:2d:c2:d2:4d:8f:d5:a0: 34:8a:df:59:6b:aa:a1:9b:74:60:6c:f8:32:aa:22:35: da:08:6f:74:cc:83:85:ae:cd:58:df:34:82:ed:56:6b: 36:ed:c2:5c:54:9b:39:cb:12:a9:83:8e:76:38:e6:2d: 70:60:c6:d4:1f:a4:f7:d4:12:74:8a:31:44:75:3b:59: 6e:2b:a3:0f:4b:e0:0f:63:a3:6d:ef:b5:04:e3:c8:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:a5:76:6e:2d:c4:06:97:26:8c:96:8b:07:ec:ba:ed: 23:99:ff:6d:30:cb:e5:d4:79:3e:3d:d2:5a:cc:45:ab: 9e:3e:05:9a:44:29:7c:92:e1:cc:1a:46:eb:d2:88:97: e8:b5:4b:1b:51:16:3b:7a:28:9e:69:2a:0e:2d:df:4e: 9d:16:53:b2:ce:4d:d4:2f:1f:45:56:20:48:4d:d5:ea: 0c:0c:9e:a2:01:45:c0:3a:21:49:0c:a6:9a:99:ac:ed: 94:cd:98:9d:73:7a:0b:33:03:bf:bf:3e:2d:f1:21:34: d6:47:c2:e6:80:76:9b:e4:8c:26:24:64:76:75:0b:68: e4:43:d0:59:4c:d2:61:f3:62:82:6a:68:f4:37:ab:a4: b5:0b:27:4b:41:5b:ba:31:18:f3:6b:5b:eb:12:28:43: ff:60:f5:6c:69:99:f0:c1:a5:45:ad:85:ef:a0:89:79: 40:95:be:c9:8b:92:a8:4e:e2:f3:85:e6:62:8d:5e:a5: b2:b0:6c:99:9f:8e:47:f9:cd:ed:5f:c5:4f:d4:45:22: 4b:83:60:bd:4f:aa:e2:ba:b0:9d:e9:73:52:06:b0:09: a6:a6:d0:60:b4:11:e8:b4:e6:b6:61:49:a3:4a:a9:14: 00:f3:26:bc:cf:1b:d5:76:44:41:c2:9c:dd:00:58:43 Fingerprint (SHA-256): E0:F6:03:F2:3E:E8:63:18:5C:30:9D:AE:A7:B5:74:9F:8C:AB:3C:A4:65:39:3F:70:A4:B2:B4:FD:8A:69:B1:FC Fingerprint (SHA1): 06:08:C1:67:66:78:5B:5F:8D:B3:B1:4A:93:ED:65:13:F2:B7:6F:04 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8747: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8748: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153858 (0x6724c02) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 20:46:49 2016 Not After : Fri Jan 08 20:46:49 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:fa:d6:74:63:0a:5f:fc:07:37:12:81:c7:6f:21:16: 53:1f:1e:f7:98:07:05:4e:89:b3:31:c9:a3:fc:a6:a2: 55:12:e5:df:e2:b2:32:c7:81:e4:02:86:03:1f:92:33: 11:2a:12:ae:a4:ac:e7:34:05:5a:0f:60:81:4d:ca:8c: fa:a8:c4:58:f8:21:71:ef:c7:ea:9c:70:3e:10:51:c5: 00:e4:55:7b:4d:19:bd:f3:81:85:67:97:0a:8d:cc:23: e8:04:2b:36:14:8d:06:51:1b:bd:70:6f:c7:99:be:0c: b6:63:22:bb:e2:19:2b:c5:a1:51:91:df:3f:db:e7:b7: 25:8f:76:c6:98:a2:38:79:02:2e:ef:e7:8d:a5:c5:23: 7e:7d:78:92:3e:28:6e:8d:34:b1:ec:b3:c8:2b:13:62: 8f:bc:9e:61:b9:7b:e3:cc:6e:80:b7:d5:dd:eb:ee:e3: 93:ed:c5:ad:31:ab:9c:5d:2b:4c:0c:76:0b:39:ba:ec: 52:4e:17:2d:69:96:d1:9d:a1:09:d4:07:4f:63:3c:d7: 66:58:c2:78:15:39:c4:a9:ac:ab:72:f1:99:15:59:14: a3:bc:26:7c:71:fd:92:76:a5:eb:31:f3:67:f5:e1:93: ea:23:30:69:26:31:13:00:30:4a:33:a5:97:2b:c0:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:f0:f8:24:f0:4c:e8:4b:1a:b4:b9:92:31:75:ee:e5: 50:84:0d:a5:b1:71:d6:9f:16:48:6e:98:94:47:9c:ab: 6b:44:b0:ce:e6:cd:c3:f2:dd:8b:c6:08:b7:4f:83:05: c9:ab:b9:a8:0f:e3:e9:2a:66:76:76:82:aa:70:c7:a1: 28:12:01:d8:23:fd:80:4a:8f:32:f9:07:bf:89:75:91: 83:0a:6f:39:92:88:bf:c0:38:50:50:29:41:84:83:4e: ed:51:9d:38:05:85:74:81:dd:6e:37:18:3c:19:6b:20: 40:5c:00:49:6d:15:02:fd:5b:ba:9e:6b:32:6b:e3:74: 46:52:30:d5:ce:e0:41:c0:c4:6b:ad:4c:9b:56:a4:34: 3e:1e:ed:35:d6:9f:7a:c3:5f:fd:79:48:a5:db:93:6e: 73:c7:e4:ab:bc:40:ce:42:bb:c6:d3:7f:a6:57:60:4d: e5:a6:f4:c3:90:f9:24:55:44:86:41:83:c9:45:a3:ed: 31:65:9d:4a:c2:79:38:dd:fa:82:4f:42:be:43:6f:10: ce:c4:5c:41:12:20:5b:c0:96:46:d7:cc:8c:19:0b:b8: 0f:91:67:c6:8a:22:b8:06:fb:e4:c5:4b:d4:49:3b:ef: 2b:90:eb:73:9f:07:27:e0:30:59:b0:a0:76:83:91:91 Fingerprint (SHA-256): 91:C8:98:D4:82:59:F3:22:AB:5F:F0:88:96:88:E9:56:A2:C5:8A:6C:8F:9E:A9:BB:AD:49:CC:2A:7A:06:77:A2 Fingerprint (SHA1): EE:45:E3:33:41:E0:64:63:AB:DC:A5:0C:22:49:D7:01:02:01:F4:B6 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #8749: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8750: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153859 (0x6724c03) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 20:46:55 2016 Not After : Fri Jan 08 20:46:55 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:ec:8f:33:41:c4:55:9e:83:1c:74:c8:da:7e:80:2e: 69:7b:55:1b:7a:62:70:3b:d2:75:63:91:26:14:29:41: 08:4b:65:98:7b:e8:1a:42:95:3b:10:15:71:d4:73:aa: f1:4f:92:c3:9a:20:99:ac:03:66:68:05:81:a0:45:91: fc:88:05:5b:d8:03:e5:e1:fa:5c:f2:68:ed:88:5d:28: e2:bb:f5:18:ab:d5:a2:8a:00:5c:b1:30:64:a5:f6:cf: 63:cc:e6:7b:03:f0:d1:71:c8:57:34:a2:a1:8a:01:85: 9c:b1:ee:e9:7d:57:b5:49:de:7a:18:48:f7:21:47:97: 9f:90:a0:74:29:e0:e1:99:c9:c6:c3:61:b3:e8:45:e3: e6:7d:1e:1b:9c:4b:f5:19:12:14:c2:8f:45:4f:94:b8: 8a:b2:db:35:41:bf:c6:93:e4:9a:49:15:32:8f:bb:a6: 3f:57:8d:21:20:af:0d:00:60:a5:bc:24:2b:95:d5:75: 09:1f:d4:e0:c2:55:d2:20:6d:91:8a:80:3b:05:c2:93: 6a:4c:3f:98:49:37:32:26:e6:d6:c4:12:e8:a4:24:a3: e3:26:76:a0:99:e3:79:df:d7:fb:e8:e2:8c:b2:42:a7: b9:df:71:01:76:c4:81:8b:b1:fe:90:92:34:c6:10:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: aa:82:bf:7f:b2:34:f9:3b:9d:38:59:e4:34:99:bd:f2: cb:91:e0:e4:03:f6:c9:f6:7c:3d:dd:4e:09:32:f3:58: 8c:9e:57:a9:5f:dc:5f:96:00:dc:d2:88:51:83:45:20: 81:57:aa:f4:e8:92:3c:14:4f:81:7f:14:e8:13:b7:18: 28:7a:85:0b:b2:26:4c:5f:74:7e:86:cc:34:9c:3d:6c: 0a:ba:6c:ab:85:5c:a0:5e:75:d6:9a:20:b0:8f:3e:af: e2:95:30:f4:6d:4b:bc:31:56:43:a6:6e:c5:27:c6:e6: d3:cd:87:ab:5d:50:e4:ae:b0:c7:ab:86:98:c8:d5:78: a6:e2:d0:fa:14:3d:80:63:fd:73:4a:d9:68:27:83:db: 92:26:2d:0a:7a:66:0e:92:37:4f:0e:df:ec:7a:83:e5: a8:f7:86:4a:ad:6a:fe:ea:c6:1d:d0:7f:75:83:bf:13: 06:a8:55:0f:86:05:2c:b9:61:15:c0:5c:a5:8e:bf:50: 86:e4:ce:7e:62:19:bf:d3:4a:47:81:ab:3f:14:9c:b0: 7d:7e:d1:cf:4b:49:b2:00:c2:f1:42:77:a5:a1:ce:e0: ae:ec:2e:20:11:37:74:70:b4:94:6e:27:e7:9e:5e:7a: fc:30:9f:02:37:ee:12:01:4f:da:f4:52:e2:27:52:dd Fingerprint (SHA-256): 7D:D8:1E:30:82:77:EE:4E:F1:00:D0:6B:87:63:7C:7C:62:C1:2C:9A:9E:A1:79:A8:67:3A:A9:94:DB:D3:ED:2C Fingerprint (SHA1): 36:E9:9E:40:59:CE:55:B1:EB:26:84:8B:E0:81:49:39:F1:5A:4D:B6 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #8751: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8752: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #8753: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #8754: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #8755: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153857 (0x6724c01) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 20:46:38 2016 Not After : Fri Jan 08 20:46:38 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:5c:e5:0a:ff:82:b6:79:b8:fe:73:46:29:80:58:4d: c6:74:62:c1:7e:25:74:ce:1b:e1:1b:d2:b3:f1:55:e8: 30:47:82:e0:f0:87:bf:c7:c1:69:4e:52:02:f9:22:1f: ca:9d:6f:e7:ef:06:ba:a7:30:0c:07:f6:47:b5:22:b0: a2:11:31:46:cc:8a:b2:70:d5:60:34:11:84:43:db:e0: 65:39:dd:a4:57:18:98:7e:f1:44:e0:ce:28:9b:bc:0e: 7b:ca:ed:f0:34:a8:91:0d:4e:a4:45:ec:e2:7f:72:ac: b9:f5:00:55:f2:88:f8:4c:09:71:b3:33:4c:12:ae:df: 70:db:f3:c8:1b:83:9b:86:a9:9f:b0:8d:52:d9:a8:63: bf:87:27:a6:32:28:1a:6a:d5:66:b1:a7:62:3c:f9:42: 0a:cf:6f:43:18:07:03:34:80:2d:c2:d2:4d:8f:d5:a0: 34:8a:df:59:6b:aa:a1:9b:74:60:6c:f8:32:aa:22:35: da:08:6f:74:cc:83:85:ae:cd:58:df:34:82:ed:56:6b: 36:ed:c2:5c:54:9b:39:cb:12:a9:83:8e:76:38:e6:2d: 70:60:c6:d4:1f:a4:f7:d4:12:74:8a:31:44:75:3b:59: 6e:2b:a3:0f:4b:e0:0f:63:a3:6d:ef:b5:04:e3:c8:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:a5:76:6e:2d:c4:06:97:26:8c:96:8b:07:ec:ba:ed: 23:99:ff:6d:30:cb:e5:d4:79:3e:3d:d2:5a:cc:45:ab: 9e:3e:05:9a:44:29:7c:92:e1:cc:1a:46:eb:d2:88:97: e8:b5:4b:1b:51:16:3b:7a:28:9e:69:2a:0e:2d:df:4e: 9d:16:53:b2:ce:4d:d4:2f:1f:45:56:20:48:4d:d5:ea: 0c:0c:9e:a2:01:45:c0:3a:21:49:0c:a6:9a:99:ac:ed: 94:cd:98:9d:73:7a:0b:33:03:bf:bf:3e:2d:f1:21:34: d6:47:c2:e6:80:76:9b:e4:8c:26:24:64:76:75:0b:68: e4:43:d0:59:4c:d2:61:f3:62:82:6a:68:f4:37:ab:a4: b5:0b:27:4b:41:5b:ba:31:18:f3:6b:5b:eb:12:28:43: ff:60:f5:6c:69:99:f0:c1:a5:45:ad:85:ef:a0:89:79: 40:95:be:c9:8b:92:a8:4e:e2:f3:85:e6:62:8d:5e:a5: b2:b0:6c:99:9f:8e:47:f9:cd:ed:5f:c5:4f:d4:45:22: 4b:83:60:bd:4f:aa:e2:ba:b0:9d:e9:73:52:06:b0:09: a6:a6:d0:60:b4:11:e8:b4:e6:b6:61:49:a3:4a:a9:14: 00:f3:26:bc:cf:1b:d5:76:44:41:c2:9c:dd:00:58:43 Fingerprint (SHA-256): E0:F6:03:F2:3E:E8:63:18:5C:30:9D:AE:A7:B5:74:9F:8C:AB:3C:A4:65:39:3F:70:A4:B2:B4:FD:8A:69:B1:FC Fingerprint (SHA1): 06:08:C1:67:66:78:5B:5F:8D:B3:B1:4A:93:ED:65:13:F2:B7:6F:04 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8756: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8757: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153858 (0x6724c02) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 20:46:49 2016 Not After : Fri Jan 08 20:46:49 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:fa:d6:74:63:0a:5f:fc:07:37:12:81:c7:6f:21:16: 53:1f:1e:f7:98:07:05:4e:89:b3:31:c9:a3:fc:a6:a2: 55:12:e5:df:e2:b2:32:c7:81:e4:02:86:03:1f:92:33: 11:2a:12:ae:a4:ac:e7:34:05:5a:0f:60:81:4d:ca:8c: fa:a8:c4:58:f8:21:71:ef:c7:ea:9c:70:3e:10:51:c5: 00:e4:55:7b:4d:19:bd:f3:81:85:67:97:0a:8d:cc:23: e8:04:2b:36:14:8d:06:51:1b:bd:70:6f:c7:99:be:0c: b6:63:22:bb:e2:19:2b:c5:a1:51:91:df:3f:db:e7:b7: 25:8f:76:c6:98:a2:38:79:02:2e:ef:e7:8d:a5:c5:23: 7e:7d:78:92:3e:28:6e:8d:34:b1:ec:b3:c8:2b:13:62: 8f:bc:9e:61:b9:7b:e3:cc:6e:80:b7:d5:dd:eb:ee:e3: 93:ed:c5:ad:31:ab:9c:5d:2b:4c:0c:76:0b:39:ba:ec: 52:4e:17:2d:69:96:d1:9d:a1:09:d4:07:4f:63:3c:d7: 66:58:c2:78:15:39:c4:a9:ac:ab:72:f1:99:15:59:14: a3:bc:26:7c:71:fd:92:76:a5:eb:31:f3:67:f5:e1:93: ea:23:30:69:26:31:13:00:30:4a:33:a5:97:2b:c0:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:f0:f8:24:f0:4c:e8:4b:1a:b4:b9:92:31:75:ee:e5: 50:84:0d:a5:b1:71:d6:9f:16:48:6e:98:94:47:9c:ab: 6b:44:b0:ce:e6:cd:c3:f2:dd:8b:c6:08:b7:4f:83:05: c9:ab:b9:a8:0f:e3:e9:2a:66:76:76:82:aa:70:c7:a1: 28:12:01:d8:23:fd:80:4a:8f:32:f9:07:bf:89:75:91: 83:0a:6f:39:92:88:bf:c0:38:50:50:29:41:84:83:4e: ed:51:9d:38:05:85:74:81:dd:6e:37:18:3c:19:6b:20: 40:5c:00:49:6d:15:02:fd:5b:ba:9e:6b:32:6b:e3:74: 46:52:30:d5:ce:e0:41:c0:c4:6b:ad:4c:9b:56:a4:34: 3e:1e:ed:35:d6:9f:7a:c3:5f:fd:79:48:a5:db:93:6e: 73:c7:e4:ab:bc:40:ce:42:bb:c6:d3:7f:a6:57:60:4d: e5:a6:f4:c3:90:f9:24:55:44:86:41:83:c9:45:a3:ed: 31:65:9d:4a:c2:79:38:dd:fa:82:4f:42:be:43:6f:10: ce:c4:5c:41:12:20:5b:c0:96:46:d7:cc:8c:19:0b:b8: 0f:91:67:c6:8a:22:b8:06:fb:e4:c5:4b:d4:49:3b:ef: 2b:90:eb:73:9f:07:27:e0:30:59:b0:a0:76:83:91:91 Fingerprint (SHA-256): 91:C8:98:D4:82:59:F3:22:AB:5F:F0:88:96:88:E9:56:A2:C5:8A:6C:8F:9E:A9:BB:AD:49:CC:2A:7A:06:77:A2 Fingerprint (SHA1): EE:45:E3:33:41:E0:64:63:AB:DC:A5:0C:22:49:D7:01:02:01:F4:B6 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #8758: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8759: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153859 (0x6724c03) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 20:46:55 2016 Not After : Fri Jan 08 20:46:55 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:ec:8f:33:41:c4:55:9e:83:1c:74:c8:da:7e:80:2e: 69:7b:55:1b:7a:62:70:3b:d2:75:63:91:26:14:29:41: 08:4b:65:98:7b:e8:1a:42:95:3b:10:15:71:d4:73:aa: f1:4f:92:c3:9a:20:99:ac:03:66:68:05:81:a0:45:91: fc:88:05:5b:d8:03:e5:e1:fa:5c:f2:68:ed:88:5d:28: e2:bb:f5:18:ab:d5:a2:8a:00:5c:b1:30:64:a5:f6:cf: 63:cc:e6:7b:03:f0:d1:71:c8:57:34:a2:a1:8a:01:85: 9c:b1:ee:e9:7d:57:b5:49:de:7a:18:48:f7:21:47:97: 9f:90:a0:74:29:e0:e1:99:c9:c6:c3:61:b3:e8:45:e3: e6:7d:1e:1b:9c:4b:f5:19:12:14:c2:8f:45:4f:94:b8: 8a:b2:db:35:41:bf:c6:93:e4:9a:49:15:32:8f:bb:a6: 3f:57:8d:21:20:af:0d:00:60:a5:bc:24:2b:95:d5:75: 09:1f:d4:e0:c2:55:d2:20:6d:91:8a:80:3b:05:c2:93: 6a:4c:3f:98:49:37:32:26:e6:d6:c4:12:e8:a4:24:a3: e3:26:76:a0:99:e3:79:df:d7:fb:e8:e2:8c:b2:42:a7: b9:df:71:01:76:c4:81:8b:b1:fe:90:92:34:c6:10:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: aa:82:bf:7f:b2:34:f9:3b:9d:38:59:e4:34:99:bd:f2: cb:91:e0:e4:03:f6:c9:f6:7c:3d:dd:4e:09:32:f3:58: 8c:9e:57:a9:5f:dc:5f:96:00:dc:d2:88:51:83:45:20: 81:57:aa:f4:e8:92:3c:14:4f:81:7f:14:e8:13:b7:18: 28:7a:85:0b:b2:26:4c:5f:74:7e:86:cc:34:9c:3d:6c: 0a:ba:6c:ab:85:5c:a0:5e:75:d6:9a:20:b0:8f:3e:af: e2:95:30:f4:6d:4b:bc:31:56:43:a6:6e:c5:27:c6:e6: d3:cd:87:ab:5d:50:e4:ae:b0:c7:ab:86:98:c8:d5:78: a6:e2:d0:fa:14:3d:80:63:fd:73:4a:d9:68:27:83:db: 92:26:2d:0a:7a:66:0e:92:37:4f:0e:df:ec:7a:83:e5: a8:f7:86:4a:ad:6a:fe:ea:c6:1d:d0:7f:75:83:bf:13: 06:a8:55:0f:86:05:2c:b9:61:15:c0:5c:a5:8e:bf:50: 86:e4:ce:7e:62:19:bf:d3:4a:47:81:ab:3f:14:9c:b0: 7d:7e:d1:cf:4b:49:b2:00:c2:f1:42:77:a5:a1:ce:e0: ae:ec:2e:20:11:37:74:70:b4:94:6e:27:e7:9e:5e:7a: fc:30:9f:02:37:ee:12:01:4f:da:f4:52:e2:27:52:dd Fingerprint (SHA-256): 7D:D8:1E:30:82:77:EE:4E:F1:00:D0:6B:87:63:7C:7C:62:C1:2C:9A:9E:A1:79:A8:67:3A:A9:94:DB:D3:ED:2C Fingerprint (SHA1): 36:E9:9E:40:59:CE:55:B1:EB:26:84:8B:E0:81:49:39:F1:5A:4D:B6 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #8760: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8761: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153857 (0x6724c01) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 20:46:38 2016 Not After : Fri Jan 08 20:46:38 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:5c:e5:0a:ff:82:b6:79:b8:fe:73:46:29:80:58:4d: c6:74:62:c1:7e:25:74:ce:1b:e1:1b:d2:b3:f1:55:e8: 30:47:82:e0:f0:87:bf:c7:c1:69:4e:52:02:f9:22:1f: ca:9d:6f:e7:ef:06:ba:a7:30:0c:07:f6:47:b5:22:b0: a2:11:31:46:cc:8a:b2:70:d5:60:34:11:84:43:db:e0: 65:39:dd:a4:57:18:98:7e:f1:44:e0:ce:28:9b:bc:0e: 7b:ca:ed:f0:34:a8:91:0d:4e:a4:45:ec:e2:7f:72:ac: b9:f5:00:55:f2:88:f8:4c:09:71:b3:33:4c:12:ae:df: 70:db:f3:c8:1b:83:9b:86:a9:9f:b0:8d:52:d9:a8:63: bf:87:27:a6:32:28:1a:6a:d5:66:b1:a7:62:3c:f9:42: 0a:cf:6f:43:18:07:03:34:80:2d:c2:d2:4d:8f:d5:a0: 34:8a:df:59:6b:aa:a1:9b:74:60:6c:f8:32:aa:22:35: da:08:6f:74:cc:83:85:ae:cd:58:df:34:82:ed:56:6b: 36:ed:c2:5c:54:9b:39:cb:12:a9:83:8e:76:38:e6:2d: 70:60:c6:d4:1f:a4:f7:d4:12:74:8a:31:44:75:3b:59: 6e:2b:a3:0f:4b:e0:0f:63:a3:6d:ef:b5:04:e3:c8:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:a5:76:6e:2d:c4:06:97:26:8c:96:8b:07:ec:ba:ed: 23:99:ff:6d:30:cb:e5:d4:79:3e:3d:d2:5a:cc:45:ab: 9e:3e:05:9a:44:29:7c:92:e1:cc:1a:46:eb:d2:88:97: e8:b5:4b:1b:51:16:3b:7a:28:9e:69:2a:0e:2d:df:4e: 9d:16:53:b2:ce:4d:d4:2f:1f:45:56:20:48:4d:d5:ea: 0c:0c:9e:a2:01:45:c0:3a:21:49:0c:a6:9a:99:ac:ed: 94:cd:98:9d:73:7a:0b:33:03:bf:bf:3e:2d:f1:21:34: d6:47:c2:e6:80:76:9b:e4:8c:26:24:64:76:75:0b:68: e4:43:d0:59:4c:d2:61:f3:62:82:6a:68:f4:37:ab:a4: b5:0b:27:4b:41:5b:ba:31:18:f3:6b:5b:eb:12:28:43: ff:60:f5:6c:69:99:f0:c1:a5:45:ad:85:ef:a0:89:79: 40:95:be:c9:8b:92:a8:4e:e2:f3:85:e6:62:8d:5e:a5: b2:b0:6c:99:9f:8e:47:f9:cd:ed:5f:c5:4f:d4:45:22: 4b:83:60:bd:4f:aa:e2:ba:b0:9d:e9:73:52:06:b0:09: a6:a6:d0:60:b4:11:e8:b4:e6:b6:61:49:a3:4a:a9:14: 00:f3:26:bc:cf:1b:d5:76:44:41:c2:9c:dd:00:58:43 Fingerprint (SHA-256): E0:F6:03:F2:3E:E8:63:18:5C:30:9D:AE:A7:B5:74:9F:8C:AB:3C:A4:65:39:3F:70:A4:B2:B4:FD:8A:69:B1:FC Fingerprint (SHA1): 06:08:C1:67:66:78:5B:5F:8D:B3:B1:4A:93:ED:65:13:F2:B7:6F:04 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8762: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153857 (0x6724c01) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 20:46:38 2016 Not After : Fri Jan 08 20:46:38 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:5c:e5:0a:ff:82:b6:79:b8:fe:73:46:29:80:58:4d: c6:74:62:c1:7e:25:74:ce:1b:e1:1b:d2:b3:f1:55:e8: 30:47:82:e0:f0:87:bf:c7:c1:69:4e:52:02:f9:22:1f: ca:9d:6f:e7:ef:06:ba:a7:30:0c:07:f6:47:b5:22:b0: a2:11:31:46:cc:8a:b2:70:d5:60:34:11:84:43:db:e0: 65:39:dd:a4:57:18:98:7e:f1:44:e0:ce:28:9b:bc:0e: 7b:ca:ed:f0:34:a8:91:0d:4e:a4:45:ec:e2:7f:72:ac: b9:f5:00:55:f2:88:f8:4c:09:71:b3:33:4c:12:ae:df: 70:db:f3:c8:1b:83:9b:86:a9:9f:b0:8d:52:d9:a8:63: bf:87:27:a6:32:28:1a:6a:d5:66:b1:a7:62:3c:f9:42: 0a:cf:6f:43:18:07:03:34:80:2d:c2:d2:4d:8f:d5:a0: 34:8a:df:59:6b:aa:a1:9b:74:60:6c:f8:32:aa:22:35: da:08:6f:74:cc:83:85:ae:cd:58:df:34:82:ed:56:6b: 36:ed:c2:5c:54:9b:39:cb:12:a9:83:8e:76:38:e6:2d: 70:60:c6:d4:1f:a4:f7:d4:12:74:8a:31:44:75:3b:59: 6e:2b:a3:0f:4b:e0:0f:63:a3:6d:ef:b5:04:e3:c8:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:a5:76:6e:2d:c4:06:97:26:8c:96:8b:07:ec:ba:ed: 23:99:ff:6d:30:cb:e5:d4:79:3e:3d:d2:5a:cc:45:ab: 9e:3e:05:9a:44:29:7c:92:e1:cc:1a:46:eb:d2:88:97: e8:b5:4b:1b:51:16:3b:7a:28:9e:69:2a:0e:2d:df:4e: 9d:16:53:b2:ce:4d:d4:2f:1f:45:56:20:48:4d:d5:ea: 0c:0c:9e:a2:01:45:c0:3a:21:49:0c:a6:9a:99:ac:ed: 94:cd:98:9d:73:7a:0b:33:03:bf:bf:3e:2d:f1:21:34: d6:47:c2:e6:80:76:9b:e4:8c:26:24:64:76:75:0b:68: e4:43:d0:59:4c:d2:61:f3:62:82:6a:68:f4:37:ab:a4: b5:0b:27:4b:41:5b:ba:31:18:f3:6b:5b:eb:12:28:43: ff:60:f5:6c:69:99:f0:c1:a5:45:ad:85:ef:a0:89:79: 40:95:be:c9:8b:92:a8:4e:e2:f3:85:e6:62:8d:5e:a5: b2:b0:6c:99:9f:8e:47:f9:cd:ed:5f:c5:4f:d4:45:22: 4b:83:60:bd:4f:aa:e2:ba:b0:9d:e9:73:52:06:b0:09: a6:a6:d0:60:b4:11:e8:b4:e6:b6:61:49:a3:4a:a9:14: 00:f3:26:bc:cf:1b:d5:76:44:41:c2:9c:dd:00:58:43 Fingerprint (SHA-256): E0:F6:03:F2:3E:E8:63:18:5C:30:9D:AE:A7:B5:74:9F:8C:AB:3C:A4:65:39:3F:70:A4:B2:B4:FD:8A:69:B1:FC Fingerprint (SHA1): 06:08:C1:67:66:78:5B:5F:8D:B3:B1:4A:93:ED:65:13:F2:B7:6F:04 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8763: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153858 (0x6724c02) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 20:46:49 2016 Not After : Fri Jan 08 20:46:49 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:fa:d6:74:63:0a:5f:fc:07:37:12:81:c7:6f:21:16: 53:1f:1e:f7:98:07:05:4e:89:b3:31:c9:a3:fc:a6:a2: 55:12:e5:df:e2:b2:32:c7:81:e4:02:86:03:1f:92:33: 11:2a:12:ae:a4:ac:e7:34:05:5a:0f:60:81:4d:ca:8c: fa:a8:c4:58:f8:21:71:ef:c7:ea:9c:70:3e:10:51:c5: 00:e4:55:7b:4d:19:bd:f3:81:85:67:97:0a:8d:cc:23: e8:04:2b:36:14:8d:06:51:1b:bd:70:6f:c7:99:be:0c: b6:63:22:bb:e2:19:2b:c5:a1:51:91:df:3f:db:e7:b7: 25:8f:76:c6:98:a2:38:79:02:2e:ef:e7:8d:a5:c5:23: 7e:7d:78:92:3e:28:6e:8d:34:b1:ec:b3:c8:2b:13:62: 8f:bc:9e:61:b9:7b:e3:cc:6e:80:b7:d5:dd:eb:ee:e3: 93:ed:c5:ad:31:ab:9c:5d:2b:4c:0c:76:0b:39:ba:ec: 52:4e:17:2d:69:96:d1:9d:a1:09:d4:07:4f:63:3c:d7: 66:58:c2:78:15:39:c4:a9:ac:ab:72:f1:99:15:59:14: a3:bc:26:7c:71:fd:92:76:a5:eb:31:f3:67:f5:e1:93: ea:23:30:69:26:31:13:00:30:4a:33:a5:97:2b:c0:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:f0:f8:24:f0:4c:e8:4b:1a:b4:b9:92:31:75:ee:e5: 50:84:0d:a5:b1:71:d6:9f:16:48:6e:98:94:47:9c:ab: 6b:44:b0:ce:e6:cd:c3:f2:dd:8b:c6:08:b7:4f:83:05: c9:ab:b9:a8:0f:e3:e9:2a:66:76:76:82:aa:70:c7:a1: 28:12:01:d8:23:fd:80:4a:8f:32:f9:07:bf:89:75:91: 83:0a:6f:39:92:88:bf:c0:38:50:50:29:41:84:83:4e: ed:51:9d:38:05:85:74:81:dd:6e:37:18:3c:19:6b:20: 40:5c:00:49:6d:15:02:fd:5b:ba:9e:6b:32:6b:e3:74: 46:52:30:d5:ce:e0:41:c0:c4:6b:ad:4c:9b:56:a4:34: 3e:1e:ed:35:d6:9f:7a:c3:5f:fd:79:48:a5:db:93:6e: 73:c7:e4:ab:bc:40:ce:42:bb:c6:d3:7f:a6:57:60:4d: e5:a6:f4:c3:90:f9:24:55:44:86:41:83:c9:45:a3:ed: 31:65:9d:4a:c2:79:38:dd:fa:82:4f:42:be:43:6f:10: ce:c4:5c:41:12:20:5b:c0:96:46:d7:cc:8c:19:0b:b8: 0f:91:67:c6:8a:22:b8:06:fb:e4:c5:4b:d4:49:3b:ef: 2b:90:eb:73:9f:07:27:e0:30:59:b0:a0:76:83:91:91 Fingerprint (SHA-256): 91:C8:98:D4:82:59:F3:22:AB:5F:F0:88:96:88:E9:56:A2:C5:8A:6C:8F:9E:A9:BB:AD:49:CC:2A:7A:06:77:A2 Fingerprint (SHA1): EE:45:E3:33:41:E0:64:63:AB:DC:A5:0C:22:49:D7:01:02:01:F4:B6 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #8764: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153858 (0x6724c02) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 20:46:49 2016 Not After : Fri Jan 08 20:46:49 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:fa:d6:74:63:0a:5f:fc:07:37:12:81:c7:6f:21:16: 53:1f:1e:f7:98:07:05:4e:89:b3:31:c9:a3:fc:a6:a2: 55:12:e5:df:e2:b2:32:c7:81:e4:02:86:03:1f:92:33: 11:2a:12:ae:a4:ac:e7:34:05:5a:0f:60:81:4d:ca:8c: fa:a8:c4:58:f8:21:71:ef:c7:ea:9c:70:3e:10:51:c5: 00:e4:55:7b:4d:19:bd:f3:81:85:67:97:0a:8d:cc:23: e8:04:2b:36:14:8d:06:51:1b:bd:70:6f:c7:99:be:0c: b6:63:22:bb:e2:19:2b:c5:a1:51:91:df:3f:db:e7:b7: 25:8f:76:c6:98:a2:38:79:02:2e:ef:e7:8d:a5:c5:23: 7e:7d:78:92:3e:28:6e:8d:34:b1:ec:b3:c8:2b:13:62: 8f:bc:9e:61:b9:7b:e3:cc:6e:80:b7:d5:dd:eb:ee:e3: 93:ed:c5:ad:31:ab:9c:5d:2b:4c:0c:76:0b:39:ba:ec: 52:4e:17:2d:69:96:d1:9d:a1:09:d4:07:4f:63:3c:d7: 66:58:c2:78:15:39:c4:a9:ac:ab:72:f1:99:15:59:14: a3:bc:26:7c:71:fd:92:76:a5:eb:31:f3:67:f5:e1:93: ea:23:30:69:26:31:13:00:30:4a:33:a5:97:2b:c0:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:f0:f8:24:f0:4c:e8:4b:1a:b4:b9:92:31:75:ee:e5: 50:84:0d:a5:b1:71:d6:9f:16:48:6e:98:94:47:9c:ab: 6b:44:b0:ce:e6:cd:c3:f2:dd:8b:c6:08:b7:4f:83:05: c9:ab:b9:a8:0f:e3:e9:2a:66:76:76:82:aa:70:c7:a1: 28:12:01:d8:23:fd:80:4a:8f:32:f9:07:bf:89:75:91: 83:0a:6f:39:92:88:bf:c0:38:50:50:29:41:84:83:4e: ed:51:9d:38:05:85:74:81:dd:6e:37:18:3c:19:6b:20: 40:5c:00:49:6d:15:02:fd:5b:ba:9e:6b:32:6b:e3:74: 46:52:30:d5:ce:e0:41:c0:c4:6b:ad:4c:9b:56:a4:34: 3e:1e:ed:35:d6:9f:7a:c3:5f:fd:79:48:a5:db:93:6e: 73:c7:e4:ab:bc:40:ce:42:bb:c6:d3:7f:a6:57:60:4d: e5:a6:f4:c3:90:f9:24:55:44:86:41:83:c9:45:a3:ed: 31:65:9d:4a:c2:79:38:dd:fa:82:4f:42:be:43:6f:10: ce:c4:5c:41:12:20:5b:c0:96:46:d7:cc:8c:19:0b:b8: 0f:91:67:c6:8a:22:b8:06:fb:e4:c5:4b:d4:49:3b:ef: 2b:90:eb:73:9f:07:27:e0:30:59:b0:a0:76:83:91:91 Fingerprint (SHA-256): 91:C8:98:D4:82:59:F3:22:AB:5F:F0:88:96:88:E9:56:A2:C5:8A:6C:8F:9E:A9:BB:AD:49:CC:2A:7A:06:77:A2 Fingerprint (SHA1): EE:45:E3:33:41:E0:64:63:AB:DC:A5:0C:22:49:D7:01:02:01:F4:B6 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #8765: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153859 (0x6724c03) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 20:46:55 2016 Not After : Fri Jan 08 20:46:55 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:ec:8f:33:41:c4:55:9e:83:1c:74:c8:da:7e:80:2e: 69:7b:55:1b:7a:62:70:3b:d2:75:63:91:26:14:29:41: 08:4b:65:98:7b:e8:1a:42:95:3b:10:15:71:d4:73:aa: f1:4f:92:c3:9a:20:99:ac:03:66:68:05:81:a0:45:91: fc:88:05:5b:d8:03:e5:e1:fa:5c:f2:68:ed:88:5d:28: e2:bb:f5:18:ab:d5:a2:8a:00:5c:b1:30:64:a5:f6:cf: 63:cc:e6:7b:03:f0:d1:71:c8:57:34:a2:a1:8a:01:85: 9c:b1:ee:e9:7d:57:b5:49:de:7a:18:48:f7:21:47:97: 9f:90:a0:74:29:e0:e1:99:c9:c6:c3:61:b3:e8:45:e3: e6:7d:1e:1b:9c:4b:f5:19:12:14:c2:8f:45:4f:94:b8: 8a:b2:db:35:41:bf:c6:93:e4:9a:49:15:32:8f:bb:a6: 3f:57:8d:21:20:af:0d:00:60:a5:bc:24:2b:95:d5:75: 09:1f:d4:e0:c2:55:d2:20:6d:91:8a:80:3b:05:c2:93: 6a:4c:3f:98:49:37:32:26:e6:d6:c4:12:e8:a4:24:a3: e3:26:76:a0:99:e3:79:df:d7:fb:e8:e2:8c:b2:42:a7: b9:df:71:01:76:c4:81:8b:b1:fe:90:92:34:c6:10:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: aa:82:bf:7f:b2:34:f9:3b:9d:38:59:e4:34:99:bd:f2: cb:91:e0:e4:03:f6:c9:f6:7c:3d:dd:4e:09:32:f3:58: 8c:9e:57:a9:5f:dc:5f:96:00:dc:d2:88:51:83:45:20: 81:57:aa:f4:e8:92:3c:14:4f:81:7f:14:e8:13:b7:18: 28:7a:85:0b:b2:26:4c:5f:74:7e:86:cc:34:9c:3d:6c: 0a:ba:6c:ab:85:5c:a0:5e:75:d6:9a:20:b0:8f:3e:af: e2:95:30:f4:6d:4b:bc:31:56:43:a6:6e:c5:27:c6:e6: d3:cd:87:ab:5d:50:e4:ae:b0:c7:ab:86:98:c8:d5:78: a6:e2:d0:fa:14:3d:80:63:fd:73:4a:d9:68:27:83:db: 92:26:2d:0a:7a:66:0e:92:37:4f:0e:df:ec:7a:83:e5: a8:f7:86:4a:ad:6a:fe:ea:c6:1d:d0:7f:75:83:bf:13: 06:a8:55:0f:86:05:2c:b9:61:15:c0:5c:a5:8e:bf:50: 86:e4:ce:7e:62:19:bf:d3:4a:47:81:ab:3f:14:9c:b0: 7d:7e:d1:cf:4b:49:b2:00:c2:f1:42:77:a5:a1:ce:e0: ae:ec:2e:20:11:37:74:70:b4:94:6e:27:e7:9e:5e:7a: fc:30:9f:02:37:ee:12:01:4f:da:f4:52:e2:27:52:dd Fingerprint (SHA-256): 7D:D8:1E:30:82:77:EE:4E:F1:00:D0:6B:87:63:7C:7C:62:C1:2C:9A:9E:A1:79:A8:67:3A:A9:94:DB:D3:ED:2C Fingerprint (SHA1): 36:E9:9E:40:59:CE:55:B1:EB:26:84:8B:E0:81:49:39:F1:5A:4D:B6 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #8766: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153859 (0x6724c03) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 20:46:55 2016 Not After : Fri Jan 08 20:46:55 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:ec:8f:33:41:c4:55:9e:83:1c:74:c8:da:7e:80:2e: 69:7b:55:1b:7a:62:70:3b:d2:75:63:91:26:14:29:41: 08:4b:65:98:7b:e8:1a:42:95:3b:10:15:71:d4:73:aa: f1:4f:92:c3:9a:20:99:ac:03:66:68:05:81:a0:45:91: fc:88:05:5b:d8:03:e5:e1:fa:5c:f2:68:ed:88:5d:28: e2:bb:f5:18:ab:d5:a2:8a:00:5c:b1:30:64:a5:f6:cf: 63:cc:e6:7b:03:f0:d1:71:c8:57:34:a2:a1:8a:01:85: 9c:b1:ee:e9:7d:57:b5:49:de:7a:18:48:f7:21:47:97: 9f:90:a0:74:29:e0:e1:99:c9:c6:c3:61:b3:e8:45:e3: e6:7d:1e:1b:9c:4b:f5:19:12:14:c2:8f:45:4f:94:b8: 8a:b2:db:35:41:bf:c6:93:e4:9a:49:15:32:8f:bb:a6: 3f:57:8d:21:20:af:0d:00:60:a5:bc:24:2b:95:d5:75: 09:1f:d4:e0:c2:55:d2:20:6d:91:8a:80:3b:05:c2:93: 6a:4c:3f:98:49:37:32:26:e6:d6:c4:12:e8:a4:24:a3: e3:26:76:a0:99:e3:79:df:d7:fb:e8:e2:8c:b2:42:a7: b9:df:71:01:76:c4:81:8b:b1:fe:90:92:34:c6:10:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: aa:82:bf:7f:b2:34:f9:3b:9d:38:59:e4:34:99:bd:f2: cb:91:e0:e4:03:f6:c9:f6:7c:3d:dd:4e:09:32:f3:58: 8c:9e:57:a9:5f:dc:5f:96:00:dc:d2:88:51:83:45:20: 81:57:aa:f4:e8:92:3c:14:4f:81:7f:14:e8:13:b7:18: 28:7a:85:0b:b2:26:4c:5f:74:7e:86:cc:34:9c:3d:6c: 0a:ba:6c:ab:85:5c:a0:5e:75:d6:9a:20:b0:8f:3e:af: e2:95:30:f4:6d:4b:bc:31:56:43:a6:6e:c5:27:c6:e6: d3:cd:87:ab:5d:50:e4:ae:b0:c7:ab:86:98:c8:d5:78: a6:e2:d0:fa:14:3d:80:63:fd:73:4a:d9:68:27:83:db: 92:26:2d:0a:7a:66:0e:92:37:4f:0e:df:ec:7a:83:e5: a8:f7:86:4a:ad:6a:fe:ea:c6:1d:d0:7f:75:83:bf:13: 06:a8:55:0f:86:05:2c:b9:61:15:c0:5c:a5:8e:bf:50: 86:e4:ce:7e:62:19:bf:d3:4a:47:81:ab:3f:14:9c:b0: 7d:7e:d1:cf:4b:49:b2:00:c2:f1:42:77:a5:a1:ce:e0: ae:ec:2e:20:11:37:74:70:b4:94:6e:27:e7:9e:5e:7a: fc:30:9f:02:37:ee:12:01:4f:da:f4:52:e2:27:52:dd Fingerprint (SHA-256): 7D:D8:1E:30:82:77:EE:4E:F1:00:D0:6B:87:63:7C:7C:62:C1:2C:9A:9E:A1:79:A8:67:3A:A9:94:DB:D3:ED:2C Fingerprint (SHA1): 36:E9:9E:40:59:CE:55:B1:EB:26:84:8B:E0:81:49:39:F1:5A:4D:B6 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #8767: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #8768: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153862 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8769: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #8770: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8771: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8772: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108153863 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8773: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8774: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8775: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8776: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108153864 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #8777: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8778: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #8779: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8780: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 108153865 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8781: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8782: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #8783: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8784: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 108153866 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8785: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8786: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #8787: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8788: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 108153867 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8789: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8790: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #8791: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8792: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 108153868 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8793: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8794: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8795: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #8796: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #8797: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #8798: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #8799: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153862 (0x6724c06) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 20:47:32 2016 Not After : Fri Jan 08 20:47:32 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:94:06:ac:2f:bf:e2:ed:21:f1:2c:77:1a:88:36:ce: 74:26:bb:8a:b9:90:13:6c:f7:71:aa:af:da:3f:4b:94: c0:49:9e:95:9c:2c:58:d6:25:76:b5:8b:27:44:69:88: 3d:96:12:62:36:23:e8:64:13:49:22:ab:fc:5b:08:3a: 23:b0:8b:70:1e:b8:06:45:c9:80:9e:fb:e6:56:d3:17: a8:c2:c2:d2:42:5a:19:e3:15:eb:cd:4f:e0:e9:ea:55: 7e:a5:59:d7:86:85:40:10:00:c3:7d:b8:f4:da:5a:11: 49:e0:c6:2f:a0:d4:82:01:12:54:ac:ac:57:30:6c:57: 31:2c:7a:1c:08:29:8e:c6:d0:c8:64:73:60:c8:f3:10: f3:e5:bb:6c:39:15:ba:22:21:c1:4a:cb:a3:a5:03:97: b8:0b:e0:9d:a5:88:22:1f:8b:47:ea:c9:2c:4e:1c:56: 91:e9:df:85:53:82:54:56:e1:a4:a6:8a:6e:8c:e9:bb: 13:b3:68:72:3e:48:54:59:49:3d:77:b1:97:0b:57:f3: fd:86:17:27:fc:cd:f2:dc:b6:a8:fa:ea:10:d8:02:4e: ec:fa:c6:30:72:d8:3f:a4:7c:5b:b6:70:d8:e3:5a:41: 97:47:ad:c9:cf:0a:b5:cb:06:39:55:21:dd:25:35:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ca:c9:5e:2e:d4:06:92:d9:79:fe:bd:5a:ed:ef:3f:8e: 15:d9:4c:28:f7:5e:85:83:e1:a2:cd:17:38:1a:1b:f2: 80:52:5c:12:0f:ee:d3:5d:80:61:42:d2:b9:85:b6:4c: 29:b0:2f:8d:8c:c1:fa:e7:3e:18:1b:0d:6a:f1:3b:f7: 3c:80:85:48:ba:d3:d6:3a:59:e9:e5:6d:32:8a:91:47: 57:ee:d9:a5:ca:a6:56:68:75:16:da:73:6c:04:29:77: 46:97:9d:42:70:f1:d1:3a:b6:57:a7:2a:b4:bb:57:ab: d2:30:74:7c:1d:96:38:4a:77:31:f5:45:64:c3:10:aa: 1d:08:bb:22:cd:78:47:4c:3f:0d:d6:9e:06:36:31:f9: 57:64:da:fb:64:29:e7:14:62:e5:77:08:f9:54:d9:46: 96:ba:a1:48:e8:32:8b:c9:92:c0:a2:e2:62:a8:0a:d8: 3d:36:26:c3:76:34:63:13:2d:52:9b:f8:d5:15:e2:75: 29:da:a1:7c:c4:3c:0f:9c:d1:63:a0:ae:3b:37:06:46: 5a:5c:b9:05:b5:38:86:df:4d:d0:19:65:f0:57:a5:8f: 5a:76:64:56:72:5b:32:72:4f:0a:1e:78:0b:eb:52:ea: a1:34:c4:c8:b3:4d:73:53:60:13:53:2e:04:ca:17:d0 Fingerprint (SHA-256): 1A:25:CB:F3:08:B0:65:75:DD:64:FD:59:88:89:4F:78:CE:D3:EE:39:ED:83:E7:45:53:00:CB:F2:9B:F0:73:DF Fingerprint (SHA1): 8C:FC:63:B1:4C:12:66:45:28:DA:4D:32:39:F0:38:7D:03:4F:80:CE Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8800: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8801: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8802: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8803: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153862 (0x6724c06) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 20:47:32 2016 Not After : Fri Jan 08 20:47:32 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:94:06:ac:2f:bf:e2:ed:21:f1:2c:77:1a:88:36:ce: 74:26:bb:8a:b9:90:13:6c:f7:71:aa:af:da:3f:4b:94: c0:49:9e:95:9c:2c:58:d6:25:76:b5:8b:27:44:69:88: 3d:96:12:62:36:23:e8:64:13:49:22:ab:fc:5b:08:3a: 23:b0:8b:70:1e:b8:06:45:c9:80:9e:fb:e6:56:d3:17: a8:c2:c2:d2:42:5a:19:e3:15:eb:cd:4f:e0:e9:ea:55: 7e:a5:59:d7:86:85:40:10:00:c3:7d:b8:f4:da:5a:11: 49:e0:c6:2f:a0:d4:82:01:12:54:ac:ac:57:30:6c:57: 31:2c:7a:1c:08:29:8e:c6:d0:c8:64:73:60:c8:f3:10: f3:e5:bb:6c:39:15:ba:22:21:c1:4a:cb:a3:a5:03:97: b8:0b:e0:9d:a5:88:22:1f:8b:47:ea:c9:2c:4e:1c:56: 91:e9:df:85:53:82:54:56:e1:a4:a6:8a:6e:8c:e9:bb: 13:b3:68:72:3e:48:54:59:49:3d:77:b1:97:0b:57:f3: fd:86:17:27:fc:cd:f2:dc:b6:a8:fa:ea:10:d8:02:4e: ec:fa:c6:30:72:d8:3f:a4:7c:5b:b6:70:d8:e3:5a:41: 97:47:ad:c9:cf:0a:b5:cb:06:39:55:21:dd:25:35:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ca:c9:5e:2e:d4:06:92:d9:79:fe:bd:5a:ed:ef:3f:8e: 15:d9:4c:28:f7:5e:85:83:e1:a2:cd:17:38:1a:1b:f2: 80:52:5c:12:0f:ee:d3:5d:80:61:42:d2:b9:85:b6:4c: 29:b0:2f:8d:8c:c1:fa:e7:3e:18:1b:0d:6a:f1:3b:f7: 3c:80:85:48:ba:d3:d6:3a:59:e9:e5:6d:32:8a:91:47: 57:ee:d9:a5:ca:a6:56:68:75:16:da:73:6c:04:29:77: 46:97:9d:42:70:f1:d1:3a:b6:57:a7:2a:b4:bb:57:ab: d2:30:74:7c:1d:96:38:4a:77:31:f5:45:64:c3:10:aa: 1d:08:bb:22:cd:78:47:4c:3f:0d:d6:9e:06:36:31:f9: 57:64:da:fb:64:29:e7:14:62:e5:77:08:f9:54:d9:46: 96:ba:a1:48:e8:32:8b:c9:92:c0:a2:e2:62:a8:0a:d8: 3d:36:26:c3:76:34:63:13:2d:52:9b:f8:d5:15:e2:75: 29:da:a1:7c:c4:3c:0f:9c:d1:63:a0:ae:3b:37:06:46: 5a:5c:b9:05:b5:38:86:df:4d:d0:19:65:f0:57:a5:8f: 5a:76:64:56:72:5b:32:72:4f:0a:1e:78:0b:eb:52:ea: a1:34:c4:c8:b3:4d:73:53:60:13:53:2e:04:ca:17:d0 Fingerprint (SHA-256): 1A:25:CB:F3:08:B0:65:75:DD:64:FD:59:88:89:4F:78:CE:D3:EE:39:ED:83:E7:45:53:00:CB:F2:9B:F0:73:DF Fingerprint (SHA1): 8C:FC:63:B1:4C:12:66:45:28:DA:4D:32:39:F0:38:7D:03:4F:80:CE Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8804: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8805: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #8806: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153869 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8807: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #8808: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8809: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8810: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108153870 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #8811: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8812: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #8813: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8814: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 108153871 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8815: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8816: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #8817: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8818: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 108153872 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8819: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8820: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #8821: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8822: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 108153873 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8823: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8824: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #8825: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8826: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 108153874 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8827: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8828: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #8829: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8830: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 108153875 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8831: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8832: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #8833: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8834: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 108153876 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8835: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8836: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #8837: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8838: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 108153877 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #8839: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8840: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #8841: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8842: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 108153878 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8843: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8844: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #8845: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8846: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 108153879 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8847: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8848: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #8849: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8850: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 108153880 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8851: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8852: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #8853: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8854: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 108153881 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8855: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8856: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #8857: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8858: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 108153882 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8859: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8860: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #8861: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8862: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 108153883 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8863: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8864: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #8865: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8866: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 108153884 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8867: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8868: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #8869: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8870: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 108153885 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8871: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8872: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #8873: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8874: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 108153886 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #8875: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8876: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #8877: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8878: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 108153887 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8879: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8880: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #8881: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8882: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 108153888 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8883: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8884: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #8885: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8886: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 108153889 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8887: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8888: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #8889: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8890: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 108153890 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8891: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8892: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #8893: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8894: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 108153891 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8895: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8896: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #8897: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8898: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 108153892 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8899: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8900: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #8901: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8902: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 108153893 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8903: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8904: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #8905: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8906: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 108153894 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8907: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8908: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #8909: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8910: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 108153895 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8911: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8912: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #8913: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8914: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 108153896 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8915: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8916: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #8917: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8918: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 108153897 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8919: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8920: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #8921: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8922: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 108153898 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8923: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8924: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8925: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153869 (0x6724c0d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 20:49:19 2016 Not After : Fri Jan 08 20:49:19 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:8c:a2:cf:f6:7d:5f:3c:58:3d:d9:e3:8e:bc:02:a3: d1:92:b2:98:b7:e1:4b:22:a4:12:d2:ff:1d:55:41:e0: 8b:17:94:7e:69:3b:5e:a3:30:d8:67:c6:1a:d3:91:b2: 4f:e8:cf:73:01:6c:d1:c4:cc:41:38:8a:40:48:c1:7a: aa:47:f4:94:00:a6:c5:f9:ba:30:ad:e1:61:f9:63:d3: 74:25:ee:0d:87:da:9a:e4:b8:d8:b5:ab:dc:47:99:04: aa:5b:c4:23:73:d7:e6:29:dc:7e:3f:67:da:7b:b2:04: f8:50:92:2b:62:95:c9:56:1e:8a:24:6e:80:12:63:fc: 6c:fa:c6:4b:2a:aa:81:c6:71:7f:68:0c:4a:eb:d2:0a: db:64:63:01:fc:56:c2:08:3f:95:1d:19:d7:f2:7f:d7: c4:b1:f0:8d:90:7e:2c:e8:28:44:ff:43:e6:87:f3:a9: 88:e1:aa:f3:cc:40:0b:51:21:75:2c:0a:c9:ef:3a:41: e6:6c:45:09:62:51:e1:b5:a3:e3:69:54:4b:0a:e3:99: 14:f7:98:2e:6a:ba:3d:ea:cb:74:df:0a:e8:45:3d:d5: 9f:52:6b:1d:93:c8:eb:e0:59:5a:8d:57:08:de:07:e5: 3a:25:9d:26:a5:54:fb:42:8c:5b:cb:9c:97:50:1a:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:f3:d9:d3:f6:e1:40:8d:c8:2d:bb:68:be:c7:5b:b1: eb:45:69:c6:a1:af:00:7a:02:6a:3e:82:1e:5d:76:fd: cf:9a:9c:03:4e:72:d8:52:cb:4c:8d:49:fa:14:92:cd: 21:c5:67:8b:b9:51:d0:41:de:17:f9:5f:ae:14:b9:da: 4b:4e:bd:c4:0f:7e:4e:2f:61:ab:a8:e5:a9:89:e1:78: 81:67:b3:6c:5b:9a:f5:f4:ad:ad:3f:b0:a1:f8:2d:6f: 7d:cd:3d:22:c5:fe:45:5f:eb:0c:5b:08:c6:bb:29:95: be:f5:5c:21:a7:01:db:e2:02:7f:64:f6:68:4e:0a:12: 22:82:09:8a:ae:e7:06:e9:6f:26:36:4b:ff:ec:ea:4f: bf:0c:fa:08:e9:c0:1c:9f:e9:d6:b5:f4:b6:ae:68:4f: bc:a3:26:52:ca:60:ce:c9:74:03:32:eb:6a:d5:ba:35: 2a:e0:b3:f0:64:b7:4a:00:2c:7b:e9:2e:67:e7:e1:8f: 2b:d3:2a:93:81:25:66:05:fa:bd:68:6c:c7:19:1a:c5: 56:32:d0:8b:7c:bd:05:32:b5:c4:68:cb:09:14:fd:df: 3d:7b:4a:0e:6c:f1:5f:ea:73:c5:68:c5:87:4c:c6:40: 76:25:21:0e:71:c4:f0:8f:a9:08:7e:4a:fc:e3:3b:1d Fingerprint (SHA-256): B8:DC:6F:E1:51:C3:0C:E3:5A:78:66:B1:B8:00:F2:4F:2A:16:1A:17:FD:73:E3:BB:F5:C0:F0:17:75:FE:DC:3B Fingerprint (SHA1): AF:07:9D:9F:08:2D:E0:5C:85:BF:6B:9A:A2:B4:38:4E:6F:F9:4E:96 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8926: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8927: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153869 (0x6724c0d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 20:49:19 2016 Not After : Fri Jan 08 20:49:19 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:8c:a2:cf:f6:7d:5f:3c:58:3d:d9:e3:8e:bc:02:a3: d1:92:b2:98:b7:e1:4b:22:a4:12:d2:ff:1d:55:41:e0: 8b:17:94:7e:69:3b:5e:a3:30:d8:67:c6:1a:d3:91:b2: 4f:e8:cf:73:01:6c:d1:c4:cc:41:38:8a:40:48:c1:7a: aa:47:f4:94:00:a6:c5:f9:ba:30:ad:e1:61:f9:63:d3: 74:25:ee:0d:87:da:9a:e4:b8:d8:b5:ab:dc:47:99:04: aa:5b:c4:23:73:d7:e6:29:dc:7e:3f:67:da:7b:b2:04: f8:50:92:2b:62:95:c9:56:1e:8a:24:6e:80:12:63:fc: 6c:fa:c6:4b:2a:aa:81:c6:71:7f:68:0c:4a:eb:d2:0a: db:64:63:01:fc:56:c2:08:3f:95:1d:19:d7:f2:7f:d7: c4:b1:f0:8d:90:7e:2c:e8:28:44:ff:43:e6:87:f3:a9: 88:e1:aa:f3:cc:40:0b:51:21:75:2c:0a:c9:ef:3a:41: e6:6c:45:09:62:51:e1:b5:a3:e3:69:54:4b:0a:e3:99: 14:f7:98:2e:6a:ba:3d:ea:cb:74:df:0a:e8:45:3d:d5: 9f:52:6b:1d:93:c8:eb:e0:59:5a:8d:57:08:de:07:e5: 3a:25:9d:26:a5:54:fb:42:8c:5b:cb:9c:97:50:1a:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:f3:d9:d3:f6:e1:40:8d:c8:2d:bb:68:be:c7:5b:b1: eb:45:69:c6:a1:af:00:7a:02:6a:3e:82:1e:5d:76:fd: cf:9a:9c:03:4e:72:d8:52:cb:4c:8d:49:fa:14:92:cd: 21:c5:67:8b:b9:51:d0:41:de:17:f9:5f:ae:14:b9:da: 4b:4e:bd:c4:0f:7e:4e:2f:61:ab:a8:e5:a9:89:e1:78: 81:67:b3:6c:5b:9a:f5:f4:ad:ad:3f:b0:a1:f8:2d:6f: 7d:cd:3d:22:c5:fe:45:5f:eb:0c:5b:08:c6:bb:29:95: be:f5:5c:21:a7:01:db:e2:02:7f:64:f6:68:4e:0a:12: 22:82:09:8a:ae:e7:06:e9:6f:26:36:4b:ff:ec:ea:4f: bf:0c:fa:08:e9:c0:1c:9f:e9:d6:b5:f4:b6:ae:68:4f: bc:a3:26:52:ca:60:ce:c9:74:03:32:eb:6a:d5:ba:35: 2a:e0:b3:f0:64:b7:4a:00:2c:7b:e9:2e:67:e7:e1:8f: 2b:d3:2a:93:81:25:66:05:fa:bd:68:6c:c7:19:1a:c5: 56:32:d0:8b:7c:bd:05:32:b5:c4:68:cb:09:14:fd:df: 3d:7b:4a:0e:6c:f1:5f:ea:73:c5:68:c5:87:4c:c6:40: 76:25:21:0e:71:c4:f0:8f:a9:08:7e:4a:fc:e3:3b:1d Fingerprint (SHA-256): B8:DC:6F:E1:51:C3:0C:E3:5A:78:66:B1:B8:00:F2:4F:2A:16:1A:17:FD:73:E3:BB:F5:C0:F0:17:75:FE:DC:3B Fingerprint (SHA1): AF:07:9D:9F:08:2D:E0:5C:85:BF:6B:9A:A2:B4:38:4E:6F:F9:4E:96 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8928: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8929: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8930: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8931: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153869 (0x6724c0d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 20:49:19 2016 Not After : Fri Jan 08 20:49:19 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:8c:a2:cf:f6:7d:5f:3c:58:3d:d9:e3:8e:bc:02:a3: d1:92:b2:98:b7:e1:4b:22:a4:12:d2:ff:1d:55:41:e0: 8b:17:94:7e:69:3b:5e:a3:30:d8:67:c6:1a:d3:91:b2: 4f:e8:cf:73:01:6c:d1:c4:cc:41:38:8a:40:48:c1:7a: aa:47:f4:94:00:a6:c5:f9:ba:30:ad:e1:61:f9:63:d3: 74:25:ee:0d:87:da:9a:e4:b8:d8:b5:ab:dc:47:99:04: aa:5b:c4:23:73:d7:e6:29:dc:7e:3f:67:da:7b:b2:04: f8:50:92:2b:62:95:c9:56:1e:8a:24:6e:80:12:63:fc: 6c:fa:c6:4b:2a:aa:81:c6:71:7f:68:0c:4a:eb:d2:0a: db:64:63:01:fc:56:c2:08:3f:95:1d:19:d7:f2:7f:d7: c4:b1:f0:8d:90:7e:2c:e8:28:44:ff:43:e6:87:f3:a9: 88:e1:aa:f3:cc:40:0b:51:21:75:2c:0a:c9:ef:3a:41: e6:6c:45:09:62:51:e1:b5:a3:e3:69:54:4b:0a:e3:99: 14:f7:98:2e:6a:ba:3d:ea:cb:74:df:0a:e8:45:3d:d5: 9f:52:6b:1d:93:c8:eb:e0:59:5a:8d:57:08:de:07:e5: 3a:25:9d:26:a5:54:fb:42:8c:5b:cb:9c:97:50:1a:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:f3:d9:d3:f6:e1:40:8d:c8:2d:bb:68:be:c7:5b:b1: eb:45:69:c6:a1:af:00:7a:02:6a:3e:82:1e:5d:76:fd: cf:9a:9c:03:4e:72:d8:52:cb:4c:8d:49:fa:14:92:cd: 21:c5:67:8b:b9:51:d0:41:de:17:f9:5f:ae:14:b9:da: 4b:4e:bd:c4:0f:7e:4e:2f:61:ab:a8:e5:a9:89:e1:78: 81:67:b3:6c:5b:9a:f5:f4:ad:ad:3f:b0:a1:f8:2d:6f: 7d:cd:3d:22:c5:fe:45:5f:eb:0c:5b:08:c6:bb:29:95: be:f5:5c:21:a7:01:db:e2:02:7f:64:f6:68:4e:0a:12: 22:82:09:8a:ae:e7:06:e9:6f:26:36:4b:ff:ec:ea:4f: bf:0c:fa:08:e9:c0:1c:9f:e9:d6:b5:f4:b6:ae:68:4f: bc:a3:26:52:ca:60:ce:c9:74:03:32:eb:6a:d5:ba:35: 2a:e0:b3:f0:64:b7:4a:00:2c:7b:e9:2e:67:e7:e1:8f: 2b:d3:2a:93:81:25:66:05:fa:bd:68:6c:c7:19:1a:c5: 56:32:d0:8b:7c:bd:05:32:b5:c4:68:cb:09:14:fd:df: 3d:7b:4a:0e:6c:f1:5f:ea:73:c5:68:c5:87:4c:c6:40: 76:25:21:0e:71:c4:f0:8f:a9:08:7e:4a:fc:e3:3b:1d Fingerprint (SHA-256): B8:DC:6F:E1:51:C3:0C:E3:5A:78:66:B1:B8:00:F2:4F:2A:16:1A:17:FD:73:E3:BB:F5:C0:F0:17:75:FE:DC:3B Fingerprint (SHA1): AF:07:9D:9F:08:2D:E0:5C:85:BF:6B:9A:A2:B4:38:4E:6F:F9:4E:96 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8932: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8933: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8934: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8935: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153869 (0x6724c0d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 20:49:19 2016 Not After : Fri Jan 08 20:49:19 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:8c:a2:cf:f6:7d:5f:3c:58:3d:d9:e3:8e:bc:02:a3: d1:92:b2:98:b7:e1:4b:22:a4:12:d2:ff:1d:55:41:e0: 8b:17:94:7e:69:3b:5e:a3:30:d8:67:c6:1a:d3:91:b2: 4f:e8:cf:73:01:6c:d1:c4:cc:41:38:8a:40:48:c1:7a: aa:47:f4:94:00:a6:c5:f9:ba:30:ad:e1:61:f9:63:d3: 74:25:ee:0d:87:da:9a:e4:b8:d8:b5:ab:dc:47:99:04: aa:5b:c4:23:73:d7:e6:29:dc:7e:3f:67:da:7b:b2:04: f8:50:92:2b:62:95:c9:56:1e:8a:24:6e:80:12:63:fc: 6c:fa:c6:4b:2a:aa:81:c6:71:7f:68:0c:4a:eb:d2:0a: db:64:63:01:fc:56:c2:08:3f:95:1d:19:d7:f2:7f:d7: c4:b1:f0:8d:90:7e:2c:e8:28:44:ff:43:e6:87:f3:a9: 88:e1:aa:f3:cc:40:0b:51:21:75:2c:0a:c9:ef:3a:41: e6:6c:45:09:62:51:e1:b5:a3:e3:69:54:4b:0a:e3:99: 14:f7:98:2e:6a:ba:3d:ea:cb:74:df:0a:e8:45:3d:d5: 9f:52:6b:1d:93:c8:eb:e0:59:5a:8d:57:08:de:07:e5: 3a:25:9d:26:a5:54:fb:42:8c:5b:cb:9c:97:50:1a:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:f3:d9:d3:f6:e1:40:8d:c8:2d:bb:68:be:c7:5b:b1: eb:45:69:c6:a1:af:00:7a:02:6a:3e:82:1e:5d:76:fd: cf:9a:9c:03:4e:72:d8:52:cb:4c:8d:49:fa:14:92:cd: 21:c5:67:8b:b9:51:d0:41:de:17:f9:5f:ae:14:b9:da: 4b:4e:bd:c4:0f:7e:4e:2f:61:ab:a8:e5:a9:89:e1:78: 81:67:b3:6c:5b:9a:f5:f4:ad:ad:3f:b0:a1:f8:2d:6f: 7d:cd:3d:22:c5:fe:45:5f:eb:0c:5b:08:c6:bb:29:95: be:f5:5c:21:a7:01:db:e2:02:7f:64:f6:68:4e:0a:12: 22:82:09:8a:ae:e7:06:e9:6f:26:36:4b:ff:ec:ea:4f: bf:0c:fa:08:e9:c0:1c:9f:e9:d6:b5:f4:b6:ae:68:4f: bc:a3:26:52:ca:60:ce:c9:74:03:32:eb:6a:d5:ba:35: 2a:e0:b3:f0:64:b7:4a:00:2c:7b:e9:2e:67:e7:e1:8f: 2b:d3:2a:93:81:25:66:05:fa:bd:68:6c:c7:19:1a:c5: 56:32:d0:8b:7c:bd:05:32:b5:c4:68:cb:09:14:fd:df: 3d:7b:4a:0e:6c:f1:5f:ea:73:c5:68:c5:87:4c:c6:40: 76:25:21:0e:71:c4:f0:8f:a9:08:7e:4a:fc:e3:3b:1d Fingerprint (SHA-256): B8:DC:6F:E1:51:C3:0C:E3:5A:78:66:B1:B8:00:F2:4F:2A:16:1A:17:FD:73:E3:BB:F5:C0:F0:17:75:FE:DC:3B Fingerprint (SHA1): AF:07:9D:9F:08:2D:E0:5C:85:BF:6B:9A:A2:B4:38:4E:6F:F9:4E:96 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8936: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153869 (0x6724c0d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 20:49:19 2016 Not After : Fri Jan 08 20:49:19 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:8c:a2:cf:f6:7d:5f:3c:58:3d:d9:e3:8e:bc:02:a3: d1:92:b2:98:b7:e1:4b:22:a4:12:d2:ff:1d:55:41:e0: 8b:17:94:7e:69:3b:5e:a3:30:d8:67:c6:1a:d3:91:b2: 4f:e8:cf:73:01:6c:d1:c4:cc:41:38:8a:40:48:c1:7a: aa:47:f4:94:00:a6:c5:f9:ba:30:ad:e1:61:f9:63:d3: 74:25:ee:0d:87:da:9a:e4:b8:d8:b5:ab:dc:47:99:04: aa:5b:c4:23:73:d7:e6:29:dc:7e:3f:67:da:7b:b2:04: f8:50:92:2b:62:95:c9:56:1e:8a:24:6e:80:12:63:fc: 6c:fa:c6:4b:2a:aa:81:c6:71:7f:68:0c:4a:eb:d2:0a: db:64:63:01:fc:56:c2:08:3f:95:1d:19:d7:f2:7f:d7: c4:b1:f0:8d:90:7e:2c:e8:28:44:ff:43:e6:87:f3:a9: 88:e1:aa:f3:cc:40:0b:51:21:75:2c:0a:c9:ef:3a:41: e6:6c:45:09:62:51:e1:b5:a3:e3:69:54:4b:0a:e3:99: 14:f7:98:2e:6a:ba:3d:ea:cb:74:df:0a:e8:45:3d:d5: 9f:52:6b:1d:93:c8:eb:e0:59:5a:8d:57:08:de:07:e5: 3a:25:9d:26:a5:54:fb:42:8c:5b:cb:9c:97:50:1a:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:f3:d9:d3:f6:e1:40:8d:c8:2d:bb:68:be:c7:5b:b1: eb:45:69:c6:a1:af:00:7a:02:6a:3e:82:1e:5d:76:fd: cf:9a:9c:03:4e:72:d8:52:cb:4c:8d:49:fa:14:92:cd: 21:c5:67:8b:b9:51:d0:41:de:17:f9:5f:ae:14:b9:da: 4b:4e:bd:c4:0f:7e:4e:2f:61:ab:a8:e5:a9:89:e1:78: 81:67:b3:6c:5b:9a:f5:f4:ad:ad:3f:b0:a1:f8:2d:6f: 7d:cd:3d:22:c5:fe:45:5f:eb:0c:5b:08:c6:bb:29:95: be:f5:5c:21:a7:01:db:e2:02:7f:64:f6:68:4e:0a:12: 22:82:09:8a:ae:e7:06:e9:6f:26:36:4b:ff:ec:ea:4f: bf:0c:fa:08:e9:c0:1c:9f:e9:d6:b5:f4:b6:ae:68:4f: bc:a3:26:52:ca:60:ce:c9:74:03:32:eb:6a:d5:ba:35: 2a:e0:b3:f0:64:b7:4a:00:2c:7b:e9:2e:67:e7:e1:8f: 2b:d3:2a:93:81:25:66:05:fa:bd:68:6c:c7:19:1a:c5: 56:32:d0:8b:7c:bd:05:32:b5:c4:68:cb:09:14:fd:df: 3d:7b:4a:0e:6c:f1:5f:ea:73:c5:68:c5:87:4c:c6:40: 76:25:21:0e:71:c4:f0:8f:a9:08:7e:4a:fc:e3:3b:1d Fingerprint (SHA-256): B8:DC:6F:E1:51:C3:0C:E3:5A:78:66:B1:B8:00:F2:4F:2A:16:1A:17:FD:73:E3:BB:F5:C0:F0:17:75:FE:DC:3B Fingerprint (SHA1): AF:07:9D:9F:08:2D:E0:5C:85:BF:6B:9A:A2:B4:38:4E:6F:F9:4E:96 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8937: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8938: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153869 (0x6724c0d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 20:49:19 2016 Not After : Fri Jan 08 20:49:19 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:8c:a2:cf:f6:7d:5f:3c:58:3d:d9:e3:8e:bc:02:a3: d1:92:b2:98:b7:e1:4b:22:a4:12:d2:ff:1d:55:41:e0: 8b:17:94:7e:69:3b:5e:a3:30:d8:67:c6:1a:d3:91:b2: 4f:e8:cf:73:01:6c:d1:c4:cc:41:38:8a:40:48:c1:7a: aa:47:f4:94:00:a6:c5:f9:ba:30:ad:e1:61:f9:63:d3: 74:25:ee:0d:87:da:9a:e4:b8:d8:b5:ab:dc:47:99:04: aa:5b:c4:23:73:d7:e6:29:dc:7e:3f:67:da:7b:b2:04: f8:50:92:2b:62:95:c9:56:1e:8a:24:6e:80:12:63:fc: 6c:fa:c6:4b:2a:aa:81:c6:71:7f:68:0c:4a:eb:d2:0a: db:64:63:01:fc:56:c2:08:3f:95:1d:19:d7:f2:7f:d7: c4:b1:f0:8d:90:7e:2c:e8:28:44:ff:43:e6:87:f3:a9: 88:e1:aa:f3:cc:40:0b:51:21:75:2c:0a:c9:ef:3a:41: e6:6c:45:09:62:51:e1:b5:a3:e3:69:54:4b:0a:e3:99: 14:f7:98:2e:6a:ba:3d:ea:cb:74:df:0a:e8:45:3d:d5: 9f:52:6b:1d:93:c8:eb:e0:59:5a:8d:57:08:de:07:e5: 3a:25:9d:26:a5:54:fb:42:8c:5b:cb:9c:97:50:1a:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:f3:d9:d3:f6:e1:40:8d:c8:2d:bb:68:be:c7:5b:b1: eb:45:69:c6:a1:af:00:7a:02:6a:3e:82:1e:5d:76:fd: cf:9a:9c:03:4e:72:d8:52:cb:4c:8d:49:fa:14:92:cd: 21:c5:67:8b:b9:51:d0:41:de:17:f9:5f:ae:14:b9:da: 4b:4e:bd:c4:0f:7e:4e:2f:61:ab:a8:e5:a9:89:e1:78: 81:67:b3:6c:5b:9a:f5:f4:ad:ad:3f:b0:a1:f8:2d:6f: 7d:cd:3d:22:c5:fe:45:5f:eb:0c:5b:08:c6:bb:29:95: be:f5:5c:21:a7:01:db:e2:02:7f:64:f6:68:4e:0a:12: 22:82:09:8a:ae:e7:06:e9:6f:26:36:4b:ff:ec:ea:4f: bf:0c:fa:08:e9:c0:1c:9f:e9:d6:b5:f4:b6:ae:68:4f: bc:a3:26:52:ca:60:ce:c9:74:03:32:eb:6a:d5:ba:35: 2a:e0:b3:f0:64:b7:4a:00:2c:7b:e9:2e:67:e7:e1:8f: 2b:d3:2a:93:81:25:66:05:fa:bd:68:6c:c7:19:1a:c5: 56:32:d0:8b:7c:bd:05:32:b5:c4:68:cb:09:14:fd:df: 3d:7b:4a:0e:6c:f1:5f:ea:73:c5:68:c5:87:4c:c6:40: 76:25:21:0e:71:c4:f0:8f:a9:08:7e:4a:fc:e3:3b:1d Fingerprint (SHA-256): B8:DC:6F:E1:51:C3:0C:E3:5A:78:66:B1:B8:00:F2:4F:2A:16:1A:17:FD:73:E3:BB:F5:C0:F0:17:75:FE:DC:3B Fingerprint (SHA1): AF:07:9D:9F:08:2D:E0:5C:85:BF:6B:9A:A2:B4:38:4E:6F:F9:4E:96 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8939: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8940: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8941: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8942: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153869 (0x6724c0d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 20:49:19 2016 Not After : Fri Jan 08 20:49:19 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:8c:a2:cf:f6:7d:5f:3c:58:3d:d9:e3:8e:bc:02:a3: d1:92:b2:98:b7:e1:4b:22:a4:12:d2:ff:1d:55:41:e0: 8b:17:94:7e:69:3b:5e:a3:30:d8:67:c6:1a:d3:91:b2: 4f:e8:cf:73:01:6c:d1:c4:cc:41:38:8a:40:48:c1:7a: aa:47:f4:94:00:a6:c5:f9:ba:30:ad:e1:61:f9:63:d3: 74:25:ee:0d:87:da:9a:e4:b8:d8:b5:ab:dc:47:99:04: aa:5b:c4:23:73:d7:e6:29:dc:7e:3f:67:da:7b:b2:04: f8:50:92:2b:62:95:c9:56:1e:8a:24:6e:80:12:63:fc: 6c:fa:c6:4b:2a:aa:81:c6:71:7f:68:0c:4a:eb:d2:0a: db:64:63:01:fc:56:c2:08:3f:95:1d:19:d7:f2:7f:d7: c4:b1:f0:8d:90:7e:2c:e8:28:44:ff:43:e6:87:f3:a9: 88:e1:aa:f3:cc:40:0b:51:21:75:2c:0a:c9:ef:3a:41: e6:6c:45:09:62:51:e1:b5:a3:e3:69:54:4b:0a:e3:99: 14:f7:98:2e:6a:ba:3d:ea:cb:74:df:0a:e8:45:3d:d5: 9f:52:6b:1d:93:c8:eb:e0:59:5a:8d:57:08:de:07:e5: 3a:25:9d:26:a5:54:fb:42:8c:5b:cb:9c:97:50:1a:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:f3:d9:d3:f6:e1:40:8d:c8:2d:bb:68:be:c7:5b:b1: eb:45:69:c6:a1:af:00:7a:02:6a:3e:82:1e:5d:76:fd: cf:9a:9c:03:4e:72:d8:52:cb:4c:8d:49:fa:14:92:cd: 21:c5:67:8b:b9:51:d0:41:de:17:f9:5f:ae:14:b9:da: 4b:4e:bd:c4:0f:7e:4e:2f:61:ab:a8:e5:a9:89:e1:78: 81:67:b3:6c:5b:9a:f5:f4:ad:ad:3f:b0:a1:f8:2d:6f: 7d:cd:3d:22:c5:fe:45:5f:eb:0c:5b:08:c6:bb:29:95: be:f5:5c:21:a7:01:db:e2:02:7f:64:f6:68:4e:0a:12: 22:82:09:8a:ae:e7:06:e9:6f:26:36:4b:ff:ec:ea:4f: bf:0c:fa:08:e9:c0:1c:9f:e9:d6:b5:f4:b6:ae:68:4f: bc:a3:26:52:ca:60:ce:c9:74:03:32:eb:6a:d5:ba:35: 2a:e0:b3:f0:64:b7:4a:00:2c:7b:e9:2e:67:e7:e1:8f: 2b:d3:2a:93:81:25:66:05:fa:bd:68:6c:c7:19:1a:c5: 56:32:d0:8b:7c:bd:05:32:b5:c4:68:cb:09:14:fd:df: 3d:7b:4a:0e:6c:f1:5f:ea:73:c5:68:c5:87:4c:c6:40: 76:25:21:0e:71:c4:f0:8f:a9:08:7e:4a:fc:e3:3b:1d Fingerprint (SHA-256): B8:DC:6F:E1:51:C3:0C:E3:5A:78:66:B1:B8:00:F2:4F:2A:16:1A:17:FD:73:E3:BB:F5:C0:F0:17:75:FE:DC:3B Fingerprint (SHA1): AF:07:9D:9F:08:2D:E0:5C:85:BF:6B:9A:A2:B4:38:4E:6F:F9:4E:96 Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8943: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153869 (0x6724c0d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 20:49:19 2016 Not After : Fri Jan 08 20:49:19 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:8c:a2:cf:f6:7d:5f:3c:58:3d:d9:e3:8e:bc:02:a3: d1:92:b2:98:b7:e1:4b:22:a4:12:d2:ff:1d:55:41:e0: 8b:17:94:7e:69:3b:5e:a3:30:d8:67:c6:1a:d3:91:b2: 4f:e8:cf:73:01:6c:d1:c4:cc:41:38:8a:40:48:c1:7a: aa:47:f4:94:00:a6:c5:f9:ba:30:ad:e1:61:f9:63:d3: 74:25:ee:0d:87:da:9a:e4:b8:d8:b5:ab:dc:47:99:04: aa:5b:c4:23:73:d7:e6:29:dc:7e:3f:67:da:7b:b2:04: f8:50:92:2b:62:95:c9:56:1e:8a:24:6e:80:12:63:fc: 6c:fa:c6:4b:2a:aa:81:c6:71:7f:68:0c:4a:eb:d2:0a: db:64:63:01:fc:56:c2:08:3f:95:1d:19:d7:f2:7f:d7: c4:b1:f0:8d:90:7e:2c:e8:28:44:ff:43:e6:87:f3:a9: 88:e1:aa:f3:cc:40:0b:51:21:75:2c:0a:c9:ef:3a:41: e6:6c:45:09:62:51:e1:b5:a3:e3:69:54:4b:0a:e3:99: 14:f7:98:2e:6a:ba:3d:ea:cb:74:df:0a:e8:45:3d:d5: 9f:52:6b:1d:93:c8:eb:e0:59:5a:8d:57:08:de:07:e5: 3a:25:9d:26:a5:54:fb:42:8c:5b:cb:9c:97:50:1a:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:f3:d9:d3:f6:e1:40:8d:c8:2d:bb:68:be:c7:5b:b1: eb:45:69:c6:a1:af:00:7a:02:6a:3e:82:1e:5d:76:fd: cf:9a:9c:03:4e:72:d8:52:cb:4c:8d:49:fa:14:92:cd: 21:c5:67:8b:b9:51:d0:41:de:17:f9:5f:ae:14:b9:da: 4b:4e:bd:c4:0f:7e:4e:2f:61:ab:a8:e5:a9:89:e1:78: 81:67:b3:6c:5b:9a:f5:f4:ad:ad:3f:b0:a1:f8:2d:6f: 7d:cd:3d:22:c5:fe:45:5f:eb:0c:5b:08:c6:bb:29:95: be:f5:5c:21:a7:01:db:e2:02:7f:64:f6:68:4e:0a:12: 22:82:09:8a:ae:e7:06:e9:6f:26:36:4b:ff:ec:ea:4f: bf:0c:fa:08:e9:c0:1c:9f:e9:d6:b5:f4:b6:ae:68:4f: bc:a3:26:52:ca:60:ce:c9:74:03:32:eb:6a:d5:ba:35: 2a:e0:b3:f0:64:b7:4a:00:2c:7b:e9:2e:67:e7:e1:8f: 2b:d3:2a:93:81:25:66:05:fa:bd:68:6c:c7:19:1a:c5: 56:32:d0:8b:7c:bd:05:32:b5:c4:68:cb:09:14:fd:df: 3d:7b:4a:0e:6c:f1:5f:ea:73:c5:68:c5:87:4c:c6:40: 76:25:21:0e:71:c4:f0:8f:a9:08:7e:4a:fc:e3:3b:1d Fingerprint (SHA-256): B8:DC:6F:E1:51:C3:0C:E3:5A:78:66:B1:B8:00:F2:4F:2A:16:1A:17:FD:73:E3:BB:F5:C0:F0:17:75:FE:DC:3B Fingerprint (SHA1): AF:07:9D:9F:08:2D:E0:5C:85:BF:6B:9A:A2:B4:38:4E:6F:F9:4E:96 Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #8944: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153869 (0x6724c0d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 20:49:19 2016 Not After : Fri Jan 08 20:49:19 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:8c:a2:cf:f6:7d:5f:3c:58:3d:d9:e3:8e:bc:02:a3: d1:92:b2:98:b7:e1:4b:22:a4:12:d2:ff:1d:55:41:e0: 8b:17:94:7e:69:3b:5e:a3:30:d8:67:c6:1a:d3:91:b2: 4f:e8:cf:73:01:6c:d1:c4:cc:41:38:8a:40:48:c1:7a: aa:47:f4:94:00:a6:c5:f9:ba:30:ad:e1:61:f9:63:d3: 74:25:ee:0d:87:da:9a:e4:b8:d8:b5:ab:dc:47:99:04: aa:5b:c4:23:73:d7:e6:29:dc:7e:3f:67:da:7b:b2:04: f8:50:92:2b:62:95:c9:56:1e:8a:24:6e:80:12:63:fc: 6c:fa:c6:4b:2a:aa:81:c6:71:7f:68:0c:4a:eb:d2:0a: db:64:63:01:fc:56:c2:08:3f:95:1d:19:d7:f2:7f:d7: c4:b1:f0:8d:90:7e:2c:e8:28:44:ff:43:e6:87:f3:a9: 88:e1:aa:f3:cc:40:0b:51:21:75:2c:0a:c9:ef:3a:41: e6:6c:45:09:62:51:e1:b5:a3:e3:69:54:4b:0a:e3:99: 14:f7:98:2e:6a:ba:3d:ea:cb:74:df:0a:e8:45:3d:d5: 9f:52:6b:1d:93:c8:eb:e0:59:5a:8d:57:08:de:07:e5: 3a:25:9d:26:a5:54:fb:42:8c:5b:cb:9c:97:50:1a:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:f3:d9:d3:f6:e1:40:8d:c8:2d:bb:68:be:c7:5b:b1: eb:45:69:c6:a1:af:00:7a:02:6a:3e:82:1e:5d:76:fd: cf:9a:9c:03:4e:72:d8:52:cb:4c:8d:49:fa:14:92:cd: 21:c5:67:8b:b9:51:d0:41:de:17:f9:5f:ae:14:b9:da: 4b:4e:bd:c4:0f:7e:4e:2f:61:ab:a8:e5:a9:89:e1:78: 81:67:b3:6c:5b:9a:f5:f4:ad:ad:3f:b0:a1:f8:2d:6f: 7d:cd:3d:22:c5:fe:45:5f:eb:0c:5b:08:c6:bb:29:95: be:f5:5c:21:a7:01:db:e2:02:7f:64:f6:68:4e:0a:12: 22:82:09:8a:ae:e7:06:e9:6f:26:36:4b:ff:ec:ea:4f: bf:0c:fa:08:e9:c0:1c:9f:e9:d6:b5:f4:b6:ae:68:4f: bc:a3:26:52:ca:60:ce:c9:74:03:32:eb:6a:d5:ba:35: 2a:e0:b3:f0:64:b7:4a:00:2c:7b:e9:2e:67:e7:e1:8f: 2b:d3:2a:93:81:25:66:05:fa:bd:68:6c:c7:19:1a:c5: 56:32:d0:8b:7c:bd:05:32:b5:c4:68:cb:09:14:fd:df: 3d:7b:4a:0e:6c:f1:5f:ea:73:c5:68:c5:87:4c:c6:40: 76:25:21:0e:71:c4:f0:8f:a9:08:7e:4a:fc:e3:3b:1d Fingerprint (SHA-256): B8:DC:6F:E1:51:C3:0C:E3:5A:78:66:B1:B8:00:F2:4F:2A:16:1A:17:FD:73:E3:BB:F5:C0:F0:17:75:FE:DC:3B Fingerprint (SHA1): AF:07:9D:9F:08:2D:E0:5C:85:BF:6B:9A:A2:B4:38:4E:6F:F9:4E:96 Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #8945: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153869 (0x6724c0d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 20:49:19 2016 Not After : Fri Jan 08 20:49:19 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:8c:a2:cf:f6:7d:5f:3c:58:3d:d9:e3:8e:bc:02:a3: d1:92:b2:98:b7:e1:4b:22:a4:12:d2:ff:1d:55:41:e0: 8b:17:94:7e:69:3b:5e:a3:30:d8:67:c6:1a:d3:91:b2: 4f:e8:cf:73:01:6c:d1:c4:cc:41:38:8a:40:48:c1:7a: aa:47:f4:94:00:a6:c5:f9:ba:30:ad:e1:61:f9:63:d3: 74:25:ee:0d:87:da:9a:e4:b8:d8:b5:ab:dc:47:99:04: aa:5b:c4:23:73:d7:e6:29:dc:7e:3f:67:da:7b:b2:04: f8:50:92:2b:62:95:c9:56:1e:8a:24:6e:80:12:63:fc: 6c:fa:c6:4b:2a:aa:81:c6:71:7f:68:0c:4a:eb:d2:0a: db:64:63:01:fc:56:c2:08:3f:95:1d:19:d7:f2:7f:d7: c4:b1:f0:8d:90:7e:2c:e8:28:44:ff:43:e6:87:f3:a9: 88:e1:aa:f3:cc:40:0b:51:21:75:2c:0a:c9:ef:3a:41: e6:6c:45:09:62:51:e1:b5:a3:e3:69:54:4b:0a:e3:99: 14:f7:98:2e:6a:ba:3d:ea:cb:74:df:0a:e8:45:3d:d5: 9f:52:6b:1d:93:c8:eb:e0:59:5a:8d:57:08:de:07:e5: 3a:25:9d:26:a5:54:fb:42:8c:5b:cb:9c:97:50:1a:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:f3:d9:d3:f6:e1:40:8d:c8:2d:bb:68:be:c7:5b:b1: eb:45:69:c6:a1:af:00:7a:02:6a:3e:82:1e:5d:76:fd: cf:9a:9c:03:4e:72:d8:52:cb:4c:8d:49:fa:14:92:cd: 21:c5:67:8b:b9:51:d0:41:de:17:f9:5f:ae:14:b9:da: 4b:4e:bd:c4:0f:7e:4e:2f:61:ab:a8:e5:a9:89:e1:78: 81:67:b3:6c:5b:9a:f5:f4:ad:ad:3f:b0:a1:f8:2d:6f: 7d:cd:3d:22:c5:fe:45:5f:eb:0c:5b:08:c6:bb:29:95: be:f5:5c:21:a7:01:db:e2:02:7f:64:f6:68:4e:0a:12: 22:82:09:8a:ae:e7:06:e9:6f:26:36:4b:ff:ec:ea:4f: bf:0c:fa:08:e9:c0:1c:9f:e9:d6:b5:f4:b6:ae:68:4f: bc:a3:26:52:ca:60:ce:c9:74:03:32:eb:6a:d5:ba:35: 2a:e0:b3:f0:64:b7:4a:00:2c:7b:e9:2e:67:e7:e1:8f: 2b:d3:2a:93:81:25:66:05:fa:bd:68:6c:c7:19:1a:c5: 56:32:d0:8b:7c:bd:05:32:b5:c4:68:cb:09:14:fd:df: 3d:7b:4a:0e:6c:f1:5f:ea:73:c5:68:c5:87:4c:c6:40: 76:25:21:0e:71:c4:f0:8f:a9:08:7e:4a:fc:e3:3b:1d Fingerprint (SHA-256): B8:DC:6F:E1:51:C3:0C:E3:5A:78:66:B1:B8:00:F2:4F:2A:16:1A:17:FD:73:E3:BB:F5:C0:F0:17:75:FE:DC:3B Fingerprint (SHA1): AF:07:9D:9F:08:2D:E0:5C:85:BF:6B:9A:A2:B4:38:4E:6F:F9:4E:96 Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #8946: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153869 (0x6724c0d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 20:49:19 2016 Not After : Fri Jan 08 20:49:19 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:8c:a2:cf:f6:7d:5f:3c:58:3d:d9:e3:8e:bc:02:a3: d1:92:b2:98:b7:e1:4b:22:a4:12:d2:ff:1d:55:41:e0: 8b:17:94:7e:69:3b:5e:a3:30:d8:67:c6:1a:d3:91:b2: 4f:e8:cf:73:01:6c:d1:c4:cc:41:38:8a:40:48:c1:7a: aa:47:f4:94:00:a6:c5:f9:ba:30:ad:e1:61:f9:63:d3: 74:25:ee:0d:87:da:9a:e4:b8:d8:b5:ab:dc:47:99:04: aa:5b:c4:23:73:d7:e6:29:dc:7e:3f:67:da:7b:b2:04: f8:50:92:2b:62:95:c9:56:1e:8a:24:6e:80:12:63:fc: 6c:fa:c6:4b:2a:aa:81:c6:71:7f:68:0c:4a:eb:d2:0a: db:64:63:01:fc:56:c2:08:3f:95:1d:19:d7:f2:7f:d7: c4:b1:f0:8d:90:7e:2c:e8:28:44:ff:43:e6:87:f3:a9: 88:e1:aa:f3:cc:40:0b:51:21:75:2c:0a:c9:ef:3a:41: e6:6c:45:09:62:51:e1:b5:a3:e3:69:54:4b:0a:e3:99: 14:f7:98:2e:6a:ba:3d:ea:cb:74:df:0a:e8:45:3d:d5: 9f:52:6b:1d:93:c8:eb:e0:59:5a:8d:57:08:de:07:e5: 3a:25:9d:26:a5:54:fb:42:8c:5b:cb:9c:97:50:1a:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:f3:d9:d3:f6:e1:40:8d:c8:2d:bb:68:be:c7:5b:b1: eb:45:69:c6:a1:af:00:7a:02:6a:3e:82:1e:5d:76:fd: cf:9a:9c:03:4e:72:d8:52:cb:4c:8d:49:fa:14:92:cd: 21:c5:67:8b:b9:51:d0:41:de:17:f9:5f:ae:14:b9:da: 4b:4e:bd:c4:0f:7e:4e:2f:61:ab:a8:e5:a9:89:e1:78: 81:67:b3:6c:5b:9a:f5:f4:ad:ad:3f:b0:a1:f8:2d:6f: 7d:cd:3d:22:c5:fe:45:5f:eb:0c:5b:08:c6:bb:29:95: be:f5:5c:21:a7:01:db:e2:02:7f:64:f6:68:4e:0a:12: 22:82:09:8a:ae:e7:06:e9:6f:26:36:4b:ff:ec:ea:4f: bf:0c:fa:08:e9:c0:1c:9f:e9:d6:b5:f4:b6:ae:68:4f: bc:a3:26:52:ca:60:ce:c9:74:03:32:eb:6a:d5:ba:35: 2a:e0:b3:f0:64:b7:4a:00:2c:7b:e9:2e:67:e7:e1:8f: 2b:d3:2a:93:81:25:66:05:fa:bd:68:6c:c7:19:1a:c5: 56:32:d0:8b:7c:bd:05:32:b5:c4:68:cb:09:14:fd:df: 3d:7b:4a:0e:6c:f1:5f:ea:73:c5:68:c5:87:4c:c6:40: 76:25:21:0e:71:c4:f0:8f:a9:08:7e:4a:fc:e3:3b:1d Fingerprint (SHA-256): B8:DC:6F:E1:51:C3:0C:E3:5A:78:66:B1:B8:00:F2:4F:2A:16:1A:17:FD:73:E3:BB:F5:C0:F0:17:75:FE:DC:3B Fingerprint (SHA1): AF:07:9D:9F:08:2D:E0:5C:85:BF:6B:9A:A2:B4:38:4E:6F:F9:4E:96 Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #8947: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153869 (0x6724c0d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 20:49:19 2016 Not After : Fri Jan 08 20:49:19 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:8c:a2:cf:f6:7d:5f:3c:58:3d:d9:e3:8e:bc:02:a3: d1:92:b2:98:b7:e1:4b:22:a4:12:d2:ff:1d:55:41:e0: 8b:17:94:7e:69:3b:5e:a3:30:d8:67:c6:1a:d3:91:b2: 4f:e8:cf:73:01:6c:d1:c4:cc:41:38:8a:40:48:c1:7a: aa:47:f4:94:00:a6:c5:f9:ba:30:ad:e1:61:f9:63:d3: 74:25:ee:0d:87:da:9a:e4:b8:d8:b5:ab:dc:47:99:04: aa:5b:c4:23:73:d7:e6:29:dc:7e:3f:67:da:7b:b2:04: f8:50:92:2b:62:95:c9:56:1e:8a:24:6e:80:12:63:fc: 6c:fa:c6:4b:2a:aa:81:c6:71:7f:68:0c:4a:eb:d2:0a: db:64:63:01:fc:56:c2:08:3f:95:1d:19:d7:f2:7f:d7: c4:b1:f0:8d:90:7e:2c:e8:28:44:ff:43:e6:87:f3:a9: 88:e1:aa:f3:cc:40:0b:51:21:75:2c:0a:c9:ef:3a:41: e6:6c:45:09:62:51:e1:b5:a3:e3:69:54:4b:0a:e3:99: 14:f7:98:2e:6a:ba:3d:ea:cb:74:df:0a:e8:45:3d:d5: 9f:52:6b:1d:93:c8:eb:e0:59:5a:8d:57:08:de:07:e5: 3a:25:9d:26:a5:54:fb:42:8c:5b:cb:9c:97:50:1a:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:f3:d9:d3:f6:e1:40:8d:c8:2d:bb:68:be:c7:5b:b1: eb:45:69:c6:a1:af:00:7a:02:6a:3e:82:1e:5d:76:fd: cf:9a:9c:03:4e:72:d8:52:cb:4c:8d:49:fa:14:92:cd: 21:c5:67:8b:b9:51:d0:41:de:17:f9:5f:ae:14:b9:da: 4b:4e:bd:c4:0f:7e:4e:2f:61:ab:a8:e5:a9:89:e1:78: 81:67:b3:6c:5b:9a:f5:f4:ad:ad:3f:b0:a1:f8:2d:6f: 7d:cd:3d:22:c5:fe:45:5f:eb:0c:5b:08:c6:bb:29:95: be:f5:5c:21:a7:01:db:e2:02:7f:64:f6:68:4e:0a:12: 22:82:09:8a:ae:e7:06:e9:6f:26:36:4b:ff:ec:ea:4f: bf:0c:fa:08:e9:c0:1c:9f:e9:d6:b5:f4:b6:ae:68:4f: bc:a3:26:52:ca:60:ce:c9:74:03:32:eb:6a:d5:ba:35: 2a:e0:b3:f0:64:b7:4a:00:2c:7b:e9:2e:67:e7:e1:8f: 2b:d3:2a:93:81:25:66:05:fa:bd:68:6c:c7:19:1a:c5: 56:32:d0:8b:7c:bd:05:32:b5:c4:68:cb:09:14:fd:df: 3d:7b:4a:0e:6c:f1:5f:ea:73:c5:68:c5:87:4c:c6:40: 76:25:21:0e:71:c4:f0:8f:a9:08:7e:4a:fc:e3:3b:1d Fingerprint (SHA-256): B8:DC:6F:E1:51:C3:0C:E3:5A:78:66:B1:B8:00:F2:4F:2A:16:1A:17:FD:73:E3:BB:F5:C0:F0:17:75:FE:DC:3B Fingerprint (SHA1): AF:07:9D:9F:08:2D:E0:5C:85:BF:6B:9A:A2:B4:38:4E:6F:F9:4E:96 Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #8948: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8949: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #8950: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153899 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8951: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #8952: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #8953: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8954: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 108153900 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8955: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8956: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #8957: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8958: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 108153901 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8959: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8960: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #8961: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8962: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 108153902 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8963: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8964: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #8965: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8966: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 108153903 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8967: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8968: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #8969: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8970: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 108153904 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8971: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8972: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #8973: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8974: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 108153905 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8975: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8976: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8977: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153899 (0x6724c2b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 20:55:11 2016 Not After : Fri Jan 08 20:55:11 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:42:da:9c:bc:0c:b5:f7:5f:be:84:23:b3:a8:24:09: 8e:23:41:15:6d:da:23:85:58:c0:5d:d2:26:8b:c4:5b: 49:4e:2f:5d:ac:bf:99:ab:3d:40:b7:9f:8a:b6:e9:ed: c0:7c:88:ac:09:d3:05:87:b4:f9:ef:0d:5c:1b:55:a8: 48:44:75:9d:f8:93:59:45:e4:36:c9:1d:ef:8c:d9:28: f7:93:4f:bd:b7:31:4c:33:de:7e:64:6f:86:c7:18:8f: c6:63:01:0b:55:b1:ba:4c:02:95:35:7f:aa:38:b6:31: b3:25:26:1c:2d:97:1b:a8:69:e1:d3:c0:2b:e2:a9:85: e9:e6:54:b3:c4:3c:10:60:78:3d:7d:ea:d4:ec:76:93: b7:f7:7b:7f:26:ad:23:15:8c:a6:93:a2:d0:07:d2:b2: f8:c4:76:df:ae:80:ac:60:82:13:b3:ce:b9:07:82:d3: 5c:79:4f:87:c8:ff:52:f5:a9:42:38:00:4d:11:47:2a: ae:7e:3a:b1:84:28:da:38:5b:fe:98:1c:22:a4:5c:b7: 29:fa:8b:1a:fb:ae:e8:a0:60:2e:6b:73:a1:b7:cd:cb: 83:48:23:98:73:ad:30:5e:44:0d:8c:7e:bd:6d:15:47: 89:20:7d:37:e9:14:9a:5c:bc:3a:57:ec:d4:1e:dd:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:f9:16:05:ec:1a:08:3d:49:02:95:15:37:e2:d8:84: a7:7d:42:aa:8c:53:37:58:a9:1b:fd:99:3f:b3:37:44: bb:25:f8:2a:70:89:65:b7:30:7c:7b:b3:43:00:60:db: 1c:74:95:c7:9f:0a:0b:d9:49:da:00:15:0e:c8:7c:5a: 6d:38:73:ef:e4:e1:84:a6:88:73:95:67:dc:b1:88:2a: 43:b2:f7:37:08:60:b9:ca:49:54:d5:fd:18:35:8f:2f: e3:9c:81:d5:ef:35:a6:c3:0d:b2:ac:15:64:70:f3:03: 6f:a0:ca:6f:cb:7e:1c:89:50:5d:6a:42:1d:2f:91:4d: a2:02:21:69:3a:53:ae:83:8e:a8:f0:b6:a6:48:41:c6: 60:d6:c9:da:61:9b:a5:04:64:c0:b4:f8:bc:4d:43:32: 12:c9:cc:ae:7f:ed:18:72:69:1b:12:e5:5a:dd:51:fd: 93:7e:09:a8:29:ac:4d:09:1d:0a:f2:b4:26:cc:a1:6d: 4c:ed:02:9b:31:fe:4f:94:0f:bc:d4:bd:d0:2c:3f:85: 74:1d:2d:85:be:99:0b:27:fe:43:8d:0f:b5:3d:31:48: 0e:c8:a5:8f:5f:e9:53:4b:c8:e5:f3:49:df:d7:a9:67: 5b:05:a1:bd:f3:10:b7:7d:6f:4d:61:bb:2a:82:a5:cb Fingerprint (SHA-256): E3:9C:A9:70:4D:28:05:E0:05:7F:6E:51:CF:C9:7F:09:D6:3E:EA:A7:A8:61:A4:5D:D8:78:17:D0:6F:8D:BD:7B Fingerprint (SHA1): A1:34:40:F2:2A:53:62:37:EB:3F:76:3A:2F:3F:D7:63:F6:91:CB:D5 Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #8978: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8979: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8980: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #8981: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153899 (0x6724c2b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 20:55:11 2016 Not After : Fri Jan 08 20:55:11 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:42:da:9c:bc:0c:b5:f7:5f:be:84:23:b3:a8:24:09: 8e:23:41:15:6d:da:23:85:58:c0:5d:d2:26:8b:c4:5b: 49:4e:2f:5d:ac:bf:99:ab:3d:40:b7:9f:8a:b6:e9:ed: c0:7c:88:ac:09:d3:05:87:b4:f9:ef:0d:5c:1b:55:a8: 48:44:75:9d:f8:93:59:45:e4:36:c9:1d:ef:8c:d9:28: f7:93:4f:bd:b7:31:4c:33:de:7e:64:6f:86:c7:18:8f: c6:63:01:0b:55:b1:ba:4c:02:95:35:7f:aa:38:b6:31: b3:25:26:1c:2d:97:1b:a8:69:e1:d3:c0:2b:e2:a9:85: e9:e6:54:b3:c4:3c:10:60:78:3d:7d:ea:d4:ec:76:93: b7:f7:7b:7f:26:ad:23:15:8c:a6:93:a2:d0:07:d2:b2: f8:c4:76:df:ae:80:ac:60:82:13:b3:ce:b9:07:82:d3: 5c:79:4f:87:c8:ff:52:f5:a9:42:38:00:4d:11:47:2a: ae:7e:3a:b1:84:28:da:38:5b:fe:98:1c:22:a4:5c:b7: 29:fa:8b:1a:fb:ae:e8:a0:60:2e:6b:73:a1:b7:cd:cb: 83:48:23:98:73:ad:30:5e:44:0d:8c:7e:bd:6d:15:47: 89:20:7d:37:e9:14:9a:5c:bc:3a:57:ec:d4:1e:dd:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:f9:16:05:ec:1a:08:3d:49:02:95:15:37:e2:d8:84: a7:7d:42:aa:8c:53:37:58:a9:1b:fd:99:3f:b3:37:44: bb:25:f8:2a:70:89:65:b7:30:7c:7b:b3:43:00:60:db: 1c:74:95:c7:9f:0a:0b:d9:49:da:00:15:0e:c8:7c:5a: 6d:38:73:ef:e4:e1:84:a6:88:73:95:67:dc:b1:88:2a: 43:b2:f7:37:08:60:b9:ca:49:54:d5:fd:18:35:8f:2f: e3:9c:81:d5:ef:35:a6:c3:0d:b2:ac:15:64:70:f3:03: 6f:a0:ca:6f:cb:7e:1c:89:50:5d:6a:42:1d:2f:91:4d: a2:02:21:69:3a:53:ae:83:8e:a8:f0:b6:a6:48:41:c6: 60:d6:c9:da:61:9b:a5:04:64:c0:b4:f8:bc:4d:43:32: 12:c9:cc:ae:7f:ed:18:72:69:1b:12:e5:5a:dd:51:fd: 93:7e:09:a8:29:ac:4d:09:1d:0a:f2:b4:26:cc:a1:6d: 4c:ed:02:9b:31:fe:4f:94:0f:bc:d4:bd:d0:2c:3f:85: 74:1d:2d:85:be:99:0b:27:fe:43:8d:0f:b5:3d:31:48: 0e:c8:a5:8f:5f:e9:53:4b:c8:e5:f3:49:df:d7:a9:67: 5b:05:a1:bd:f3:10:b7:7d:6f:4d:61:bb:2a:82:a5:cb Fingerprint (SHA-256): E3:9C:A9:70:4D:28:05:E0:05:7F:6E:51:CF:C9:7F:09:D6:3E:EA:A7:A8:61:A4:5D:D8:78:17:D0:6F:8D:BD:7B Fingerprint (SHA1): A1:34:40:F2:2A:53:62:37:EB:3F:76:3A:2F:3F:D7:63:F6:91:CB:D5 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #8982: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8983: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8984: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #8985: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153906 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8986: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #8987: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8988: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8989: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108153907 --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #8990: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8991: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8992: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8993: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108153908 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8994: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8995: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #8996: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8997: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108153909 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8998: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8999: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #9000: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #9001: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #9002: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #9003: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153906 (0x6724c32) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 20:56:35 2016 Not After : Fri Jan 08 20:56:35 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:2a:2e:3e:66:ad:bd:0f:f9:64:92:74:0d:d3:8a:69: d9:2f:ce:b7:ed:24:78:1f:61:db:7d:61:37:69:2d:a2: ee:eb:f9:47:e7:06:d8:b4:9b:3d:c6:51:d5:df:9a:ec: dc:5c:b9:8c:89:e7:1c:16:0a:c0:d8:7b:27:85:31:da: 68:bf:cf:9c:b5:ff:10:9b:37:ef:c0:6f:0c:d8:4f:2f: b4:23:cd:81:d1:e4:f2:58:c1:d9:0a:70:96:a9:ac:8d: 9b:d0:09:12:fb:ab:72:b7:be:1f:58:6a:40:1a:29:8a: 95:1f:b1:7e:5c:b3:79:9c:6e:38:68:80:e7:43:4b:f6: a7:bf:cf:0d:e0:03:42:be:6f:91:49:2c:8b:c1:48:2a: 42:0d:37:eb:d1:4d:f6:38:eb:9b:8c:57:ae:d5:01:f0: 56:98:8a:37:d1:c8:10:c1:0a:df:be:de:13:14:14:ea: f7:e3:aa:3a:73:24:48:54:df:24:a4:a5:ab:55:4a:63: 3c:36:1a:a1:3b:00:0b:68:13:16:2f:ef:8e:8c:d8:59: 04:d7:9e:d0:55:d2:65:23:0b:52:27:46:9a:ea:21:db: ed:77:05:1e:e6:57:e4:ca:e5:61:e3:09:60:8b:4b:c4: d9:14:35:dc:9f:e4:89:a3:0f:25:44:21:c8:f4:87:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:1f:37:11:c5:5f:5e:7a:78:77:c2:b0:91:ef:8a:c7: fd:e9:36:d1:56:8c:48:be:25:8a:34:2c:d7:4e:a1:ef: 5a:b1:18:82:6e:35:41:49:85:ae:01:fb:e7:00:57:17: 85:ab:89:82:b2:74:e2:23:ac:2d:fc:32:7b:23:b7:55: 3c:3c:5e:f8:84:b6:11:02:0e:2e:e4:ce:e5:45:0f:4c: 6d:08:8e:96:09:e5:cd:ff:ab:57:eb:0b:75:d1:af:e6: c7:ae:1d:d6:54:a0:4f:93:38:21:86:4d:aa:c4:3e:f1: dc:81:ef:52:10:26:e2:b6:ea:aa:a6:9a:2d:1c:f5:93: 66:ea:ff:a2:69:c9:da:9a:72:4a:6e:ab:a7:bf:82:9a: 59:0c:44:20:16:86:8c:92:2b:1c:19:b5:0e:e9:1c:f5: e7:d4:e6:aa:46:30:1b:8b:ca:51:e6:db:38:e7:da:f6: 38:49:e7:8d:a5:78:6d:c4:5a:18:92:06:0c:ca:c9:da: de:4f:4f:4c:18:20:8c:cd:88:5c:4b:42:89:24:ed:fd: b0:86:7a:67:13:f3:a2:be:f0:e9:9a:e1:41:3c:d5:92: ad:cd:bd:9b:e9:aa:11:c2:5f:bf:7c:1e:81:b4:eb:d5: 05:12:30:20:90:f8:68:9e:26:39:ab:2e:18:69:c2:d7 Fingerprint (SHA-256): FE:42:C4:65:9C:FC:5C:6F:79:62:62:DA:A2:EB:4A:E6:FB:5E:37:F9:07:4E:CE:AD:85:75:81:B2:6D:6E:40:24 Fingerprint (SHA1): 46:A8:88:CC:59:2D:4B:02:13:07:BC:51:DE:46:DD:6E:35:B9:C7:E8 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9004: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9005: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9006: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153907 (0x6724c33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 20:56:45 2016 Not After : Fri Jan 08 20:56:45 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ef:f7:77:e5:cd:76:ae:b3:ab:98:55:86:85:96:ec:45: 6d:0b:bb:ac:a9:01:7c:09:e4:c4:93:2b:9b:ca:d6:91: be:56:d0:55:dc:6e:9c:2a:d7:3d:31:81:a3:d7:df:e5: 93:bd:66:a9:ad:1f:d1:86:60:1f:76:79:07:e9:d3:93: db:47:3f:7f:6c:84:f8:8d:f3:aa:30:b4:f3:58:a4:f7: a0:bf:00:1b:a8:e5:55:a3:7d:a0:96:83:68:55:3a:77: 0d:ec:11:c4:ad:3f:8b:44:cc:5a:55:1f:1a:36:5b:a6: 4d:73:05:1f:dc:b2:f0:16:4c:1c:59:4c:cc:b2:0b:0f: 4d:b8:41:b5:07:0b:99:4a:79:95:1d:f1:e8:f6:3b:b4: 7f:be:d1:cf:d3:74:4e:93:2c:a3:9f:e5:b7:d2:77:5b: af:e3:e1:45:9c:9f:b6:53:ca:6c:1e:e9:61:8a:b6:f1: cb:c4:76:b5:95:d8:9a:79:91:77:53:83:40:e2:1f:d8: d5:d6:fa:dc:6d:12:22:ae:61:c0:f9:1d:e3:d2:7f:97: d1:94:e3:e5:1c:fd:89:81:a8:e5:87:5b:a5:1c:68:e8: 3c:b4:17:48:5d:a4:d7:f2:1c:2f:b3:97:74:21:ac:95: d1:17:1c:1b:e5:9a:a1:22:cf:36:f3:0a:94:b9:e7:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:5e:b7:f0:c3:e1:bf:a6:9b:f6:56:f6:6f:b5:0b:77: 9d:a6:be:cb:28:8f:7b:14:56:15:d4:16:6d:5d:df:84: 2c:53:e6:85:fb:63:0b:29:7a:5a:27:2d:8c:05:97:12: 60:18:6a:a8:0a:f0:a6:18:66:ff:4d:2c:ca:f8:30:2b: 4f:f1:0b:46:95:2d:cb:50:1b:38:cd:fa:c9:ec:63:ca: 71:0d:27:63:97:9a:b2:fb:a0:b3:21:1b:34:f8:e7:c9: e1:c5:0f:df:02:bb:6f:a5:fa:4c:9b:ec:ae:4d:b1:5c: 7e:5c:45:04:ee:37:bc:d3:37:71:61:67:1c:00:dc:98: 7c:78:2f:39:a0:47:4a:8c:8a:a3:4a:56:77:4c:f1:3d: 2e:d4:22:6f:01:08:c4:1a:95:44:8d:4a:cf:8a:e2:42: d3:c8:fc:da:35:4a:a8:54:4b:13:0b:4b:cf:1a:06:77: a8:b1:52:cd:a7:09:89:de:15:da:75:05:d8:40:d9:63: b2:48:55:05:1b:29:55:9d:7c:e9:7d:6e:4a:17:64:bc: 63:54:26:3a:18:8a:d6:2e:f8:f7:d3:1e:2b:2a:f7:fc: 12:52:a2:e2:fa:53:cb:9f:15:ef:73:68:b1:c4:68:e9: 09:2c:cd:17:5f:3d:03:03:dd:78:65:75:7a:f3:80:6d Fingerprint (SHA-256): 48:EB:67:74:4A:93:49:D8:6E:72:96:1F:5C:4C:51:C3:DA:21:7C:C4:25:E0:E5:A0:13:73:6A:87:7C:C8:22:39 Fingerprint (SHA1): F3:8F:58:17:DC:0C:B5:DB:56:08:79:9C:6F:2E:6D:1F:D4:8B:BA:BC Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #9007: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9008: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153908 (0x6724c34) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 20:56:59 2016 Not After : Fri Jan 08 20:56:59 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:17:3f:cb:5c:8d:dd:55:55:47:a2:ff:9a:6a:a3:9f: 95:2b:28:cc:60:5b:4b:3f:d9:ec:32:50:c8:8a:6f:14: 3e:7c:99:09:46:0c:2d:4d:56:09:e0:98:d9:58:11:57: 05:0a:25:29:53:e3:d5:31:fb:0c:65:0b:fb:e9:cc:26: b4:dd:a3:ab:38:26:bc:a5:9e:91:d5:cb:90:ae:c6:06: 74:9f:e9:10:d2:06:6e:c9:10:d3:21:b4:f9:8d:b7:9e: 55:bb:37:c9:ae:36:63:a1:a1:ef:b2:54:27:e7:13:2a: f9:a9:3b:b4:22:e2:70:dd:bc:7f:a8:25:ba:02:6c:ac: 28:33:f3:9d:c3:4f:e3:6d:41:87:8d:92:09:1a:98:a6: 6e:de:ad:e6:f5:0b:fd:9b:1f:6c:fb:c8:87:ae:e2:80: f6:9d:52:ed:a7:b4:54:8c:cc:b9:38:ef:5a:69:19:99: b0:19:9a:46:ba:98:af:b4:bb:7b:d9:3d:59:0c:d9:15: 3c:2b:ee:9e:f9:41:f0:9d:6d:03:15:17:5e:58:15:55: 59:8f:9c:4e:3f:4c:26:5a:05:75:5b:01:b1:31:c3:77: a3:31:4e:db:1f:41:7b:cc:b0:22:92:b5:7a:0a:bd:ca: 2b:5f:9b:da:55:50:47:17:74:32:7d:73:af:d3:29:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 13:a7:e6:73:10:c6:0f:ad:66:d5:6f:8c:6e:da:4b:41: 08:d8:73:85:92:5f:47:4e:7a:7d:bb:13:d1:c4:9e:01: e9:b3:ce:a3:c7:45:a2:04:94:cc:62:a7:6f:1f:bb:b9: 17:61:f2:fe:f1:29:46:e4:67:71:4f:5a:90:f9:b9:53: fd:f5:b1:ec:19:55:4c:c5:6f:18:6d:cc:7a:d6:d9:b3: 7d:e3:60:bb:4b:e1:d8:35:ce:c3:73:35:34:82:9d:e0: 48:67:62:ae:6e:15:4c:cb:57:9e:a8:36:40:70:4c:eb: ce:20:90:60:0c:e6:8f:be:fa:46:8c:90:76:24:81:68: ac:71:e0:62:4a:4e:2b:24:ac:4c:d5:f3:a9:ae:1b:a3: c4:86:ba:09:1e:86:71:75:92:91:6d:18:03:e2:a2:9f: 48:df:ed:6b:de:0a:ec:1e:46:40:86:5c:63:13:bf:9e: 3a:b1:e1:c1:5f:b6:68:a6:66:54:18:22:80:3e:08:0c: 1f:87:03:c8:7b:a1:9d:f5:b8:a2:f4:dd:f1:24:78:b3: d6:83:e2:2b:7c:02:64:97:e5:23:3a:21:4d:ac:30:2f: 26:cc:27:06:e4:82:7a:ed:83:0b:64:10:4c:7a:4c:66: 0a:e2:b9:45:d6:02:74:17:9b:99:9d:93:3f:8a:f6:9d Fingerprint (SHA-256): B7:14:52:99:78:F7:76:9E:62:A7:B3:F5:77:68:B9:83:07:37:7E:90:10:C5:DE:9E:DD:68:C5:5D:91:BB:1B:FA Fingerprint (SHA1): B0:60:AA:56:EF:18:AA:59:8C:F9:FF:B9:66:7C:10:4E:47:8A:14:47 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #9009: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #9010: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153910 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9011: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #9012: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9013: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9014: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108153911 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9015: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9016: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #9017: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9018: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108153912 --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #9019: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9020: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #9021: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9022: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 108153913 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9023: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9024: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #9025: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9026: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 108153914 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9027: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9028: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #9029: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #9030: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #9031: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #9032: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #9033: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153910 (0x6724c36) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 20:57:21 2016 Not After : Fri Jan 08 20:57:21 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:19:c3:a8:2a:83:a4:e2:bc:b6:fc:fa:c5:30:05:08: de:c7:93:49:88:dc:3c:c6:44:76:93:66:aa:5c:02:f4: df:e3:64:0f:b3:35:2b:54:df:47:48:b5:98:9e:63:0d: e9:e3:2f:b2:38:91:af:1a:de:67:a4:a9:db:55:f4:90: f6:c2:55:58:c9:bf:0b:c6:55:ac:52:e1:75:7c:ad:a2: 1c:eb:c0:bf:6a:62:36:8f:fe:f6:0e:d2:93:94:ab:a6: 97:33:d8:6d:ab:c1:5c:e0:bb:eb:40:a8:8d:ef:de:54: bc:a0:de:a0:87:da:b7:ff:60:98:0f:b0:e9:f3:64:3c: b1:5c:1b:75:40:a4:f8:47:5b:6f:ed:bd:89:2d:c1:9a: 4e:3c:fc:59:67:3e:ec:58:ef:ec:9f:d2:cb:4b:51:2d: 07:9b:a3:be:c6:18:97:05:3d:ec:34:5a:7e:70:51:61: 89:46:97:e2:06:e5:8c:dd:c6:90:3e:ad:e8:80:0c:43: 6f:57:ef:4b:c2:4a:25:cb:8a:17:75:d1:d0:a4:c5:cb: 77:b9:01:3c:03:6d:24:e7:f9:32:01:e9:7e:3b:c3:6e: a8:ca:a8:b9:06:9e:c6:c7:98:46:c4:22:10:a7:f3:88: 85:ed:50:87:72:fd:b1:5b:3e:f3:62:c5:91:45:b2:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:43:9d:89:9d:bc:dd:68:6b:c5:f9:fc:84:e9:d1:bf: 65:35:f1:6c:f8:7d:df:1e:cc:bb:e4:d6:9b:3c:3d:da: be:6e:82:75:97:e1:e2:25:68:ff:29:3a:bf:c2:7c:6b: 12:73:2a:c0:fd:36:b8:df:c5:39:6e:8f:a2:8b:c0:9d: 96:97:7d:20:f9:bb:f9:b5:aa:6c:d2:a3:04:09:70:21: 03:a9:a1:8a:78:b0:9c:d4:f5:88:98:14:a4:10:9b:86: 04:56:49:40:11:2f:a2:ff:27:34:83:55:41:bb:00:13: 9a:d4:79:92:4c:7c:11:ee:af:88:22:d6:62:fc:21:de: 70:d3:9e:e5:7c:39:e4:32:cc:66:4a:97:8d:ad:05:6d: 73:b9:c5:59:0b:93:26:e9:02:2a:54:8c:d8:f4:bc:88: 97:53:11:c5:a0:48:fa:4d:ea:35:05:43:a5:8d:46:3a: bc:15:f8:1d:1b:02:b9:1e:e6:fe:29:55:de:38:ce:87: 3f:ca:5b:14:2d:e0:77:85:77:4d:ec:ae:2a:c8:45:66: df:a0:3c:ea:76:1b:31:86:cb:f6:da:44:6c:61:50:66: 1a:f0:8f:31:36:fe:64:6f:66:7e:4f:08:15:85:72:59: ad:bf:04:2a:11:f9:32:35:3a:92:49:63:b4:c9:48:ea Fingerprint (SHA-256): EF:65:71:10:E2:E9:B2:87:8C:42:25:F0:87:7A:CE:9B:EE:34:8D:FF:69:17:5C:CE:AE:45:4E:65:20:28:2E:8A Fingerprint (SHA1): 79:3F:86:96:E9:20:63:7E:78:B6:48:43:F2:C2:FD:3B:FA:48:C4:9F Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9034: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9035: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153911 (0x6724c37) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 20:57:33 2016 Not After : Fri Jan 08 20:57:33 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:86:42:d4:11:97:c9:50:21:00:49:52:2f:62:cb:5a: 0b:cd:8a:f0:4f:c9:2b:9e:ee:8a:3a:b7:03:d2:0e:99: a1:02:74:b3:a0:0c:8c:f7:c6:c7:56:16:f4:30:49:34: de:1e:07:30:77:fa:cc:8e:60:38:fe:a2:20:83:3d:27: 46:87:bd:5a:de:58:59:55:10:63:48:ee:45:d4:82:a7: b9:4b:08:fe:86:4e:d4:03:ca:03:c0:f7:10:83:5a:f0: 5d:12:80:c3:18:cb:1f:51:5c:01:dc:ab:5c:76:c9:17: 2a:b2:0e:41:3f:5c:b2:9c:38:8c:ef:5c:0e:cd:95:2f: 60:bd:b8:f0:1b:45:71:83:37:7d:da:a7:3d:8e:ed:2a: 97:58:e9:44:54:fc:0d:29:1e:46:5d:cf:e0:01:56:22: 6e:2f:e8:f9:d3:77:ab:78:94:5a:91:f0:f5:4c:01:22: 81:6d:e3:e5:01:55:6f:c3:70:f2:1d:57:fe:de:e1:da: 45:42:07:59:ba:91:c1:b6:5d:39:ff:e8:97:8f:dc:17: 3b:a4:0a:4f:41:90:29:0f:36:58:81:94:01:83:92:4d: 6a:44:69:89:01:8f:52:34:0f:ee:3f:0a:b3:02:44:06: e4:f3:4c:f8:fc:9b:59:e0:47:3f:45:29:61:f1:4c:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:e3:f9:ee:ab:0d:73:ce:96:94:55:75:c2:43:a5:2b: e9:07:35:78:25:e9:7c:07:78:32:fc:bb:c5:c9:51:9e: f1:8f:f1:a5:25:75:cd:c7:c7:45:c7:2e:c0:1a:12:d4: 7d:90:cf:6b:ed:a7:59:af:2a:55:b2:61:a8:86:e5:42: 96:84:9a:73:01:4f:dd:03:0d:fc:32:23:a5:fa:3e:b3: 83:26:7b:18:ee:e7:f5:3b:68:3b:87:1c:64:b9:ec:4e: 09:0e:ae:08:cb:e8:9b:9b:28:8d:67:be:12:05:a7:b7: 34:3d:2e:b2:b7:e3:7f:84:7a:63:46:70:2b:97:68:36: 02:b3:d6:22:95:2d:89:aa:2e:b1:1c:35:de:37:b6:b7: af:93:82:ef:e2:55:b4:8e:ad:34:98:6d:b3:58:d3:60: 62:1d:2d:36:ee:dc:69:8b:05:bf:04:d6:b5:9c:35:b2: 8d:f5:b4:2a:ab:0e:91:0d:e6:7d:c5:80:c1:17:98:4b: b7:05:0a:31:c8:4a:f3:c8:e0:01:c0:ce:16:6d:31:f6: d9:e1:a0:92:9c:bb:27:56:f7:73:73:f3:d9:35:f4:1e: 50:2f:a0:fa:ab:da:da:ba:7f:d4:aa:c8:de:5f:a7:74: 66:81:c8:37:ed:cf:a1:06:d0:74:0c:b1:70:13:e3:48 Fingerprint (SHA-256): 85:0C:50:AD:EC:E3:44:A3:6C:77:3C:EE:EB:6D:EA:EA:7E:DB:3E:A5:82:A7:6C:91:5A:1A:F3:7A:FE:00:18:E0 Fingerprint (SHA1): 97:B5:85:61:5B:57:1E:2E:D0:8A:49:77:49:4C:93:33:24:1F:00:B7 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #9036: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9037: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9038: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153912 (0x6724c38) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 20:57:40 2016 Not After : Fri Jan 08 20:57:40 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:e6:6f:13:99:38:ae:f7:4b:55:be:91:22:e6:a8:63: fb:b1:ea:4f:0a:41:99:ba:a7:36:8c:a2:67:5e:a1:6a: 1b:f8:5b:0c:c7:0e:30:a3:c7:4a:84:76:b8:c9:88:d5: c7:04:6c:f7:c9:c6:c7:fe:f9:e2:3f:33:36:4b:11:f8: 43:71:f1:ae:ce:f3:06:1d:bd:47:7a:0a:65:1e:9c:c1: 4d:eb:95:c6:14:e0:6c:06:1a:39:e6:4e:83:95:4b:10: 35:4c:bc:da:26:73:4c:06:d7:41:e1:08:c8:f7:82:0f: 2c:52:05:5d:c1:3e:37:e1:3a:17:7d:1a:f2:62:4e:77: e9:cc:05:f0:10:22:a7:d7:0c:f0:55:52:7a:5d:ad:b0: c6:6d:ce:7a:b2:6b:0b:72:57:b9:e3:ec:2a:43:c8:26: 13:bb:7d:6b:c2:b7:57:14:7e:c7:8d:f8:18:a7:65:32: af:bc:b3:1e:90:70:68:f8:07:50:7c:dd:24:b5:99:6b: 99:50:3e:9e:84:ab:cd:4d:2c:3d:df:7e:01:4a:e1:a1: 4b:3e:68:10:f8:ef:c4:2c:04:e1:e3:46:a1:53:07:04: 07:3d:83:68:22:9b:d9:b9:b9:65:8a:93:bc:cd:7a:5d: 0a:f0:e1:24:d1:14:5c:7a:17:cc:10:fd:8c:c7:ee:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:cc:a2:da:a2:43:6c:e8:9c:df:a4:22:eb:a2:b1:41: f8:54:4b:42:c7:35:00:db:bb:47:a8:17:d0:32:ad:04: f9:01:a8:cd:24:d3:9f:ab:79:81:8e:d6:b8:f2:a2:3d: f9:22:3b:9d:05:d1:24:cd:1b:13:4c:de:5a:ba:f4:a4: ec:00:18:f2:69:26:1a:32:43:6d:db:4a:cb:47:d5:70: ff:59:86:2c:0a:be:0a:61:71:c9:68:4c:96:d0:7a:12: 60:9c:c8:d8:5e:bd:ce:ad:82:e3:a1:a8:6a:ff:56:8f: e4:c4:c8:82:0f:72:1f:be:1c:8e:1e:54:09:fd:f1:6e: 42:3f:d4:5b:4e:79:d0:52:74:e4:63:3d:f7:11:e0:76: b0:69:c5:e0:ed:1b:c0:e2:d8:db:4d:6e:af:ae:17:7f: 3e:11:d5:81:22:36:9f:ab:5f:c8:be:ce:32:15:6c:42: 9d:5a:36:2d:6c:a1:31:6a:2b:5d:63:87:7d:dc:39:a8: 42:3d:61:64:bc:c7:24:88:b7:54:29:90:79:8f:01:a0: be:fe:33:3b:4e:b9:6f:01:45:f5:cb:5b:7b:a1:34:f9: 24:50:f6:0b:93:e1:bf:cf:17:99:ed:76:1e:79:7d:f1: e7:e8:8f:86:3a:e1:b8:82:74:59:9f:ef:80:88:e2:c0 Fingerprint (SHA-256): 0A:02:53:32:90:1C:8F:84:F1:BE:7D:6E:45:8D:C4:89:85:11:B0:52:78:81:7F:08:CA:09:22:BD:FA:90:F3:BA Fingerprint (SHA1): FE:B5:80:EC:79:DB:63:01:89:AC:0A:1D:2B:28:1F:C9:63:09:79:42 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #9039: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #9040: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153915 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9041: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #9042: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9043: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9044: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108153916 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9045: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9046: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #9047: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9048: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108153917 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA1Root-108153824.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #9049: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9050: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #9051: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9052: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108153918 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9053: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9054: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #9055: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153915 (0x6724c3b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 20:58:19 2016 Not After : Fri Jan 08 20:58:19 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:0e:2a:3a:7d:fd:bb:7a:a8:d0:bb:e3:e0:62:a3:74: c7:4b:19:40:02:c4:58:98:ad:4a:d4:68:46:31:5e:25: b2:79:2f:71:40:47:e7:26:4a:fd:3e:87:04:03:fc:2d: ec:83:7f:ff:ea:78:e5:41:ff:5d:05:00:59:9a:e9:42: ef:3f:81:25:a5:e7:3d:49:4e:5f:5e:97:15:6f:60:4d: 81:a9:5d:a7:35:27:80:84:89:d2:a8:a5:71:5b:01:f8: d3:f1:5d:74:10:46:8c:27:95:04:67:b1:67:43:96:f8: ea:f0:62:a7:13:f3:3c:99:37:85:5e:71:c5:a1:a1:78: 2b:50:3e:a8:00:ff:68:41:26:64:79:cc:c7:e0:47:e1: dc:2f:24:1f:e1:17:1d:9d:ec:52:83:25:4f:e1:5d:82: fc:db:8f:b7:6d:c0:88:53:3e:ae:2c:0d:af:a1:99:3c: 8c:05:9d:5f:b6:21:42:cf:aa:3d:1a:14:af:34:4d:db: a2:33:b1:4d:8d:0a:1a:a0:f1:e6:5a:45:3e:c0:c2:eb: ef:65:f3:73:69:c0:21:c8:d3:b0:be:f4:bf:9f:1d:a8: 5f:76:e3:0e:90:d1:55:77:09:cb:ff:22:7e:d0:af:13: 04:08:3b:18:ec:e3:31:53:75:68:26:99:1f:da:f7:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c4:c3:9d:03:11:d8:c4:49:11:0c:ea:77:10:74:35:e4: 6d:1d:1b:ea:30:12:1a:8c:38:db:18:44:f5:f6:fe:7b: ad:52:e7:a0:2f:8c:e6:95:18:2e:bc:e6:7e:61:09:e8: 7b:89:a2:e4:6d:3d:90:e5:33:08:4d:63:7e:5d:85:84: e5:4e:e4:1e:af:7c:74:c4:38:2c:db:c7:33:b4:71:03: 6a:52:50:7c:71:59:75:5c:eb:48:0b:d3:3e:f6:5b:92: 07:e3:04:bc:16:f7:41:ae:31:07:e0:3c:9c:3b:71:d6: 1d:37:e3:37:3c:db:39:59:3e:60:c7:b9:2d:23:55:85: 95:16:7b:45:13:bd:e5:e4:c9:a3:c9:f8:cb:a6:99:6e: c4:5e:95:04:a2:81:7b:83:3d:de:54:5d:96:f7:8c:87: d0:56:f4:79:3b:90:a6:1d:04:cc:2a:40:c9:b2:75:86: 9f:55:0b:ad:4e:c8:dc:95:6a:e6:59:12:3a:23:6c:46: 4c:12:40:3d:0b:f8:ee:69:51:a3:79:08:f0:1d:5c:1b: d3:69:f9:04:fa:cf:02:81:6f:22:5d:cd:5c:a8:8f:57: 92:ec:62:78:98:20:e8:6a:e1:d2:21:5f:80:2d:11:cb: 8b:c7:41:ad:26:23:9e:54:6b:03:2a:30:83:63:5c:72 Fingerprint (SHA-256): 47:FF:4B:33:60:DA:91:48:D6:F7:32:AA:5F:06:0D:EA:0D:95:D6:79:77:53:FC:E8:7F:FF:78:39:42:7B:2B:FE Fingerprint (SHA1): 07:54:37:39:1C:B6:84:F3:41:B6:1F:47:8C:40:F1:F7:08:C2:DA:34 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9056: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #9057: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153919 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9058: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #9059: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #9060: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153920 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9061: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #9062: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #9063: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9064: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108153921 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9065: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9066: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108153922 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9067: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9068: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #9069: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9070: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9071: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108153923 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-Bridge-108153825.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #9072: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9073: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #9074: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9075: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108153924 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9076: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9077: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #9078: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #9079: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153920 (0x6724c40) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 20:59:18 2016 Not After : Fri Jan 08 20:59:18 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:97:e9:0c:e9:5d:24:26:e5:26:6b:73:66:8c:f9:a9: b5:fa:98:53:c9:12:20:6b:1b:c0:c5:cf:03:0e:b2:23: dc:cb:81:61:4b:88:fd:2d:74:ce:06:53:86:5b:9b:e2: 8b:db:52:b6:6a:86:2a:d4:77:c5:c9:e9:bd:3f:ff:60: 43:14:5e:4a:24:4e:d7:f9:71:cb:ef:b4:ef:fb:f3:b3: 0a:79:02:0c:58:ea:98:74:2e:cf:22:59:21:1d:8f:31: a0:e2:58:03:18:00:79:a5:93:58:66:50:b3:cb:be:e2: f5:76:f5:9d:3c:c8:7a:3f:d1:de:12:7d:79:24:98:49: 79:3b:45:bd:2c:46:16:4f:ec:4c:1e:56:e4:e4:0c:eb: 27:94:80:89:04:8c:7b:6d:10:d5:15:58:de:1b:6b:f5: d7:41:6d:79:e5:5e:00:98:eb:d3:9d:6a:4f:67:5b:d7: a2:eb:6a:ea:3f:27:15:2b:8d:cc:52:ed:4f:9d:29:ca: 25:17:a6:c1:e0:7f:50:06:39:b8:f3:16:12:5d:ce:52: ae:a9:27:fa:07:1a:9c:e6:29:c9:93:b1:87:88:cd:b7: 5c:0e:c0:b9:93:77:c4:d2:46:6c:c7:98:92:1f:8c:68: 2f:1d:b9:4f:ae:2a:c5:f0:33:88:07:7b:62:5e:c9:f7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:4c:46:dc:b2:a1:14:38:af:5e:10:f3:43:2f:0c:03: c5:2e:e0:e9:ee:21:7a:1b:f9:2a:ae:5d:58:cf:1e:ad: 81:1b:83:bf:51:b3:d6:c0:e6:5a:55:43:86:6e:9d:34: 87:ab:be:6a:bd:34:8e:ea:0a:a8:a0:92:5b:7c:35:66: a0:b0:aa:c7:54:e2:06:6f:50:bc:09:63:09:aa:f7:bb: 3a:49:f1:27:4c:18:7e:be:de:ae:99:f3:7d:0d:3a:4d: 59:2a:fc:92:9a:50:b7:f3:18:91:02:df:20:36:bc:e3: b2:65:93:6f:49:63:3f:22:2c:a7:e5:d0:c6:3c:e4:58: 82:f4:ea:09:97:58:c2:84:11:04:33:75:cf:0d:07:3c: 8a:1d:15:b1:22:07:72:26:7a:b0:0e:e3:b2:85:bc:05: 2c:81:9e:ad:7c:40:2b:da:84:63:7f:54:7c:30:09:8c: d3:17:5e:73:21:9f:99:a9:2a:12:22:f8:38:4a:35:ec: fe:69:32:72:10:d3:9a:c4:e7:b3:00:f4:cb:15:77:6e: cc:b8:11:bd:a9:72:2e:67:4b:85:56:b7:fd:85:3b:d8: 56:82:47:69:e1:c6:f0:67:13:4a:51:db:e4:cd:2e:47: b6:47:fb:16:ed:77:07:e3:82:65:08:af:61:65:22:76 Fingerprint (SHA-256): 42:90:72:8E:59:52:92:E7:FD:C2:AD:7C:74:66:47:19:03:B9:FA:A3:35:0E:99:18:91:99:92:3B:D8:FF:F7:81 Fingerprint (SHA1): FC:14:73:D4:F0:98:35:DB:6C:9B:3A:54:56:F7:C5:3C:67:A9:F3:72 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9080: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153920 (0x6724c40) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 20:59:18 2016 Not After : Fri Jan 08 20:59:18 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:97:e9:0c:e9:5d:24:26:e5:26:6b:73:66:8c:f9:a9: b5:fa:98:53:c9:12:20:6b:1b:c0:c5:cf:03:0e:b2:23: dc:cb:81:61:4b:88:fd:2d:74:ce:06:53:86:5b:9b:e2: 8b:db:52:b6:6a:86:2a:d4:77:c5:c9:e9:bd:3f:ff:60: 43:14:5e:4a:24:4e:d7:f9:71:cb:ef:b4:ef:fb:f3:b3: 0a:79:02:0c:58:ea:98:74:2e:cf:22:59:21:1d:8f:31: a0:e2:58:03:18:00:79:a5:93:58:66:50:b3:cb:be:e2: f5:76:f5:9d:3c:c8:7a:3f:d1:de:12:7d:79:24:98:49: 79:3b:45:bd:2c:46:16:4f:ec:4c:1e:56:e4:e4:0c:eb: 27:94:80:89:04:8c:7b:6d:10:d5:15:58:de:1b:6b:f5: d7:41:6d:79:e5:5e:00:98:eb:d3:9d:6a:4f:67:5b:d7: a2:eb:6a:ea:3f:27:15:2b:8d:cc:52:ed:4f:9d:29:ca: 25:17:a6:c1:e0:7f:50:06:39:b8:f3:16:12:5d:ce:52: ae:a9:27:fa:07:1a:9c:e6:29:c9:93:b1:87:88:cd:b7: 5c:0e:c0:b9:93:77:c4:d2:46:6c:c7:98:92:1f:8c:68: 2f:1d:b9:4f:ae:2a:c5:f0:33:88:07:7b:62:5e:c9:f7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:4c:46:dc:b2:a1:14:38:af:5e:10:f3:43:2f:0c:03: c5:2e:e0:e9:ee:21:7a:1b:f9:2a:ae:5d:58:cf:1e:ad: 81:1b:83:bf:51:b3:d6:c0:e6:5a:55:43:86:6e:9d:34: 87:ab:be:6a:bd:34:8e:ea:0a:a8:a0:92:5b:7c:35:66: a0:b0:aa:c7:54:e2:06:6f:50:bc:09:63:09:aa:f7:bb: 3a:49:f1:27:4c:18:7e:be:de:ae:99:f3:7d:0d:3a:4d: 59:2a:fc:92:9a:50:b7:f3:18:91:02:df:20:36:bc:e3: b2:65:93:6f:49:63:3f:22:2c:a7:e5:d0:c6:3c:e4:58: 82:f4:ea:09:97:58:c2:84:11:04:33:75:cf:0d:07:3c: 8a:1d:15:b1:22:07:72:26:7a:b0:0e:e3:b2:85:bc:05: 2c:81:9e:ad:7c:40:2b:da:84:63:7f:54:7c:30:09:8c: d3:17:5e:73:21:9f:99:a9:2a:12:22:f8:38:4a:35:ec: fe:69:32:72:10:d3:9a:c4:e7:b3:00:f4:cb:15:77:6e: cc:b8:11:bd:a9:72:2e:67:4b:85:56:b7:fd:85:3b:d8: 56:82:47:69:e1:c6:f0:67:13:4a:51:db:e4:cd:2e:47: b6:47:fb:16:ed:77:07:e3:82:65:08:af:61:65:22:76 Fingerprint (SHA-256): 42:90:72:8E:59:52:92:E7:FD:C2:AD:7C:74:66:47:19:03:B9:FA:A3:35:0E:99:18:91:99:92:3B:D8:FF:F7:81 Fingerprint (SHA1): FC:14:73:D4:F0:98:35:DB:6C:9B:3A:54:56:F7:C5:3C:67:A9:F3:72 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9081: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #9082: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153925 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9083: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #9084: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #9085: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153926 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9086: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #9087: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #9088: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9089: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108153927 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9090: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9091: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108153928 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9092: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9093: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #9094: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9095: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9096: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108153929 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-Bridge-108153826.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #9097: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9098: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #9099: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9100: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108153930 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9101: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9102: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #9103: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9104: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 108153931 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-BridgeNavy-108153827.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #9105: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9106: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #9107: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9108: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108153932 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9109: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9110: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #9111: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #9112: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153926 (0x6724c46) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 21:00:28 2016 Not After : Fri Jan 08 21:00:28 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:5c:3d:62:3d:bf:08:79:69:75:d8:fe:fb:61:49:a3: 13:07:0f:7f:44:4c:d1:bc:ae:8e:17:04:3a:25:b7:10: 8f:2f:16:f0:eb:0c:dd:f1:3f:fb:54:8c:f5:a0:94:de: 7b:4a:b2:c1:9a:3a:51:cb:e5:2b:14:1c:cb:83:39:4d: ae:2c:63:58:80:f4:1a:76:6b:44:e8:81:ed:c2:61:99: f3:83:14:7c:d3:de:b0:0d:f9:12:eb:c4:26:aa:c5:71: 03:f3:a5:4e:6f:e1:af:b8:86:fa:8b:e7:e2:ac:47:64: ad:ba:30:22:ab:7b:82:dd:f1:7d:33:c4:b7:8b:e0:97: 24:60:33:22:97:c3:d0:22:e4:43:c0:5f:1d:89:8b:86: 8a:49:8d:7a:8c:fc:f8:49:89:df:c6:a2:09:1d:b1:70: dd:7e:31:9d:99:97:b6:5d:de:51:39:c9:3f:d8:7c:2a: fb:11:20:62:59:19:76:56:1a:59:b8:e2:fa:99:03:74: 74:7b:1d:31:09:ae:09:73:f8:05:98:4c:52:75:31:44: 97:6c:af:b6:37:75:af:ad:84:4c:d1:3d:30:ba:6a:37: 13:1b:39:b8:26:df:e4:6f:1a:b7:4a:1b:eb:8e:e8:e0: ff:50:65:62:b5:74:ac:7d:92:b4:eb:77:da:bd:93:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:21:cc:f7:55:62:35:f2:e4:a1:b1:51:bb:7b:de:b0: 2b:38:5a:5d:29:e9:cc:13:ea:1b:df:bc:44:3f:4c:ee: 2d:06:5b:45:16:d7:4b:55:7c:9b:33:3f:c7:bc:16:2a: 6f:ee:26:0b:7c:d5:cf:ae:0e:f8:9c:00:3b:e9:43:8f: 1b:03:c6:a9:2d:ad:0a:cd:bf:de:81:77:62:fa:06:56: 70:1a:cf:7a:3c:20:79:1e:ee:b4:e9:ce:fd:13:b9:05: fd:2b:5f:d8:83:91:97:2b:75:70:46:37:a2:56:f7:71: 59:ed:3e:7f:34:3f:ee:76:3f:07:ad:a8:8e:22:5c:cb: 11:87:3f:7d:35:2c:bb:62:38:30:ba:3e:f7:7c:c1:9d: 1a:63:73:a4:3f:66:bd:a3:81:6d:03:ee:44:3a:d4:52: 14:c3:bb:e4:d1:e8:34:f9:c2:7a:9f:39:0f:59:41:b7: b9:5e:24:62:68:2d:9b:fb:ca:dc:5f:7d:ab:9b:0a:eb: 78:9f:e2:68:e5:ca:33:e9:1b:4a:28:8e:3c:e7:f2:ba: a5:38:71:55:24:0e:0d:c9:8c:15:07:4e:15:81:36:8e: ec:76:4d:5b:20:d9:02:06:fc:ce:8c:e1:48:3e:eb:5b: 20:2d:a9:b8:04:d2:75:d6:99:c5:48:0e:cc:bc:c5:ba Fingerprint (SHA-256): 5C:97:43:ED:71:3D:A2:E3:03:EC:D4:86:F9:6F:F7:B7:B2:38:BC:C1:EB:7F:6C:4A:ED:B1:9C:D7:54:F0:AC:22 Fingerprint (SHA1): 12:A7:04:7E:CF:DD:03:49:82:BD:89:A3:11:D4:F3:ED:3C:9B:7E:BC Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9113: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153926 (0x6724c46) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 21:00:28 2016 Not After : Fri Jan 08 21:00:28 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:5c:3d:62:3d:bf:08:79:69:75:d8:fe:fb:61:49:a3: 13:07:0f:7f:44:4c:d1:bc:ae:8e:17:04:3a:25:b7:10: 8f:2f:16:f0:eb:0c:dd:f1:3f:fb:54:8c:f5:a0:94:de: 7b:4a:b2:c1:9a:3a:51:cb:e5:2b:14:1c:cb:83:39:4d: ae:2c:63:58:80:f4:1a:76:6b:44:e8:81:ed:c2:61:99: f3:83:14:7c:d3:de:b0:0d:f9:12:eb:c4:26:aa:c5:71: 03:f3:a5:4e:6f:e1:af:b8:86:fa:8b:e7:e2:ac:47:64: ad:ba:30:22:ab:7b:82:dd:f1:7d:33:c4:b7:8b:e0:97: 24:60:33:22:97:c3:d0:22:e4:43:c0:5f:1d:89:8b:86: 8a:49:8d:7a:8c:fc:f8:49:89:df:c6:a2:09:1d:b1:70: dd:7e:31:9d:99:97:b6:5d:de:51:39:c9:3f:d8:7c:2a: fb:11:20:62:59:19:76:56:1a:59:b8:e2:fa:99:03:74: 74:7b:1d:31:09:ae:09:73:f8:05:98:4c:52:75:31:44: 97:6c:af:b6:37:75:af:ad:84:4c:d1:3d:30:ba:6a:37: 13:1b:39:b8:26:df:e4:6f:1a:b7:4a:1b:eb:8e:e8:e0: ff:50:65:62:b5:74:ac:7d:92:b4:eb:77:da:bd:93:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:21:cc:f7:55:62:35:f2:e4:a1:b1:51:bb:7b:de:b0: 2b:38:5a:5d:29:e9:cc:13:ea:1b:df:bc:44:3f:4c:ee: 2d:06:5b:45:16:d7:4b:55:7c:9b:33:3f:c7:bc:16:2a: 6f:ee:26:0b:7c:d5:cf:ae:0e:f8:9c:00:3b:e9:43:8f: 1b:03:c6:a9:2d:ad:0a:cd:bf:de:81:77:62:fa:06:56: 70:1a:cf:7a:3c:20:79:1e:ee:b4:e9:ce:fd:13:b9:05: fd:2b:5f:d8:83:91:97:2b:75:70:46:37:a2:56:f7:71: 59:ed:3e:7f:34:3f:ee:76:3f:07:ad:a8:8e:22:5c:cb: 11:87:3f:7d:35:2c:bb:62:38:30:ba:3e:f7:7c:c1:9d: 1a:63:73:a4:3f:66:bd:a3:81:6d:03:ee:44:3a:d4:52: 14:c3:bb:e4:d1:e8:34:f9:c2:7a:9f:39:0f:59:41:b7: b9:5e:24:62:68:2d:9b:fb:ca:dc:5f:7d:ab:9b:0a:eb: 78:9f:e2:68:e5:ca:33:e9:1b:4a:28:8e:3c:e7:f2:ba: a5:38:71:55:24:0e:0d:c9:8c:15:07:4e:15:81:36:8e: ec:76:4d:5b:20:d9:02:06:fc:ce:8c:e1:48:3e:eb:5b: 20:2d:a9:b8:04:d2:75:d6:99:c5:48:0e:cc:bc:c5:ba Fingerprint (SHA-256): 5C:97:43:ED:71:3D:A2:E3:03:EC:D4:86:F9:6F:F7:B7:B2:38:BC:C1:EB:7F:6C:4A:ED:B1:9C:D7:54:F0:AC:22 Fingerprint (SHA1): 12:A7:04:7E:CF:DD:03:49:82:BD:89:A3:11:D4:F3:ED:3C:9B:7E:BC Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9114: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #9115: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153925 (0x6724c45) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 21:00:18 2016 Not After : Fri Jan 08 21:00:18 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:ce:73:bb:2e:84:e3:eb:d4:67:44:ee:19:b7:ec:dc: 5c:5d:47:16:f4:f0:28:47:c0:41:5f:1d:9b:2a:ee:d6: 72:37:88:71:72:f0:62:74:8d:f0:e9:3a:8e:77:37:7b: a5:d4:47:f1:25:55:ad:64:16:a1:84:42:69:f6:fe:80: 84:86:e6:02:d9:67:cd:54:e9:1c:eb:95:8f:9d:51:c8: 5c:da:18:e7:99:a3:37:c4:96:5c:42:25:09:52:f5:97: a5:d8:a6:bc:67:e6:1f:94:50:b0:8f:ad:36:2d:0d:d9: 2a:35:25:d4:82:cc:61:35:79:11:ec:43:06:68:19:20: 48:5c:8a:65:63:91:bd:93:7f:e2:fb:d7:b3:aa:8b:d0: 7f:e3:ce:16:17:6e:22:f8:bc:09:b4:b3:8e:bb:15:f6: e0:8c:af:68:66:89:eb:df:b4:dd:74:31:33:aa:d4:d1: 72:39:bb:6e:8b:20:42:d2:15:1c:08:69:89:74:1d:04: 61:41:10:76:8c:dc:0f:df:bc:b1:6c:3b:27:69:0e:a1: 2b:5f:d8:5e:54:67:ee:f8:3f:d6:01:8f:df:07:06:ee: e0:26:e3:33:c0:3b:96:4f:85:93:87:e2:38:94:0c:dc: d0:b2:dd:4a:59:d5:1b:dc:07:4e:51:d2:76:d6:4e:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ad:0b:e8:f0:e0:84:53:ef:1a:1f:2a:22:19:19:b1:b0: 80:a6:b0:10:eb:c4:ac:39:34:c0:68:12:88:56:52:21: 92:d3:9f:f7:0f:18:0b:37:66:9f:2b:1b:17:62:34:a0: 2f:62:18:ae:7c:f5:00:42:4c:bc:4e:02:34:d6:7e:59: 97:74:e2:5d:ff:3a:0f:ab:55:09:3f:a7:d5:33:45:c9: 43:8e:5d:b3:47:2a:40:af:93:d3:d0:9c:a2:a6:b6:49: 9a:54:ca:28:17:37:60:1f:4a:bb:9c:f7:c8:97:c6:a7: e8:73:ab:98:6c:c6:d6:86:7b:20:bf:9b:1a:e5:36:e0: 08:87:ab:7d:e8:74:44:d8:b8:d1:0f:35:fa:5f:e3:95: 9b:69:d7:40:cb:76:b1:f8:96:46:65:ce:7e:25:6f:f9: f1:cc:63:4d:88:7e:ca:7d:0f:7d:56:49:fc:5d:b3:b8: 2b:a2:a9:21:c4:76:2f:f5:ed:d5:05:ea:b9:08:ca:76: 98:54:53:78:06:25:27:a2:c3:e5:8f:00:3c:f7:a4:a8: f5:8d:c1:2a:df:d6:73:44:6a:d0:60:a8:90:44:6f:9d: 93:9b:7e:75:db:2f:98:fc:97:5b:be:f5:42:31:10:4b: 75:3f:5c:65:f6:db:ce:95:de:32:c2:2f:5e:a2:7d:76 Fingerprint (SHA-256): 47:35:C9:4A:4A:F2:2D:02:73:62:CF:D5:71:C0:7B:9D:5A:5D:D2:59:D6:D6:85:37:CC:CB:28:6B:17:80:89:1C Fingerprint (SHA1): 29:7F:54:26:C0:ED:0B:75:4C:2E:25:6E:2E:05:73:CD:73:0C:D2:60 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9116: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153926 (0x6724c46) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 21:00:28 2016 Not After : Fri Jan 08 21:00:28 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:5c:3d:62:3d:bf:08:79:69:75:d8:fe:fb:61:49:a3: 13:07:0f:7f:44:4c:d1:bc:ae:8e:17:04:3a:25:b7:10: 8f:2f:16:f0:eb:0c:dd:f1:3f:fb:54:8c:f5:a0:94:de: 7b:4a:b2:c1:9a:3a:51:cb:e5:2b:14:1c:cb:83:39:4d: ae:2c:63:58:80:f4:1a:76:6b:44:e8:81:ed:c2:61:99: f3:83:14:7c:d3:de:b0:0d:f9:12:eb:c4:26:aa:c5:71: 03:f3:a5:4e:6f:e1:af:b8:86:fa:8b:e7:e2:ac:47:64: ad:ba:30:22:ab:7b:82:dd:f1:7d:33:c4:b7:8b:e0:97: 24:60:33:22:97:c3:d0:22:e4:43:c0:5f:1d:89:8b:86: 8a:49:8d:7a:8c:fc:f8:49:89:df:c6:a2:09:1d:b1:70: dd:7e:31:9d:99:97:b6:5d:de:51:39:c9:3f:d8:7c:2a: fb:11:20:62:59:19:76:56:1a:59:b8:e2:fa:99:03:74: 74:7b:1d:31:09:ae:09:73:f8:05:98:4c:52:75:31:44: 97:6c:af:b6:37:75:af:ad:84:4c:d1:3d:30:ba:6a:37: 13:1b:39:b8:26:df:e4:6f:1a:b7:4a:1b:eb:8e:e8:e0: ff:50:65:62:b5:74:ac:7d:92:b4:eb:77:da:bd:93:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:21:cc:f7:55:62:35:f2:e4:a1:b1:51:bb:7b:de:b0: 2b:38:5a:5d:29:e9:cc:13:ea:1b:df:bc:44:3f:4c:ee: 2d:06:5b:45:16:d7:4b:55:7c:9b:33:3f:c7:bc:16:2a: 6f:ee:26:0b:7c:d5:cf:ae:0e:f8:9c:00:3b:e9:43:8f: 1b:03:c6:a9:2d:ad:0a:cd:bf:de:81:77:62:fa:06:56: 70:1a:cf:7a:3c:20:79:1e:ee:b4:e9:ce:fd:13:b9:05: fd:2b:5f:d8:83:91:97:2b:75:70:46:37:a2:56:f7:71: 59:ed:3e:7f:34:3f:ee:76:3f:07:ad:a8:8e:22:5c:cb: 11:87:3f:7d:35:2c:bb:62:38:30:ba:3e:f7:7c:c1:9d: 1a:63:73:a4:3f:66:bd:a3:81:6d:03:ee:44:3a:d4:52: 14:c3:bb:e4:d1:e8:34:f9:c2:7a:9f:39:0f:59:41:b7: b9:5e:24:62:68:2d:9b:fb:ca:dc:5f:7d:ab:9b:0a:eb: 78:9f:e2:68:e5:ca:33:e9:1b:4a:28:8e:3c:e7:f2:ba: a5:38:71:55:24:0e:0d:c9:8c:15:07:4e:15:81:36:8e: ec:76:4d:5b:20:d9:02:06:fc:ce:8c:e1:48:3e:eb:5b: 20:2d:a9:b8:04:d2:75:d6:99:c5:48:0e:cc:bc:c5:ba Fingerprint (SHA-256): 5C:97:43:ED:71:3D:A2:E3:03:EC:D4:86:F9:6F:F7:B7:B2:38:BC:C1:EB:7F:6C:4A:ED:B1:9C:D7:54:F0:AC:22 Fingerprint (SHA1): 12:A7:04:7E:CF:DD:03:49:82:BD:89:A3:11:D4:F3:ED:3C:9B:7E:BC Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9117: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153926 (0x6724c46) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 21:00:28 2016 Not After : Fri Jan 08 21:00:28 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:5c:3d:62:3d:bf:08:79:69:75:d8:fe:fb:61:49:a3: 13:07:0f:7f:44:4c:d1:bc:ae:8e:17:04:3a:25:b7:10: 8f:2f:16:f0:eb:0c:dd:f1:3f:fb:54:8c:f5:a0:94:de: 7b:4a:b2:c1:9a:3a:51:cb:e5:2b:14:1c:cb:83:39:4d: ae:2c:63:58:80:f4:1a:76:6b:44:e8:81:ed:c2:61:99: f3:83:14:7c:d3:de:b0:0d:f9:12:eb:c4:26:aa:c5:71: 03:f3:a5:4e:6f:e1:af:b8:86:fa:8b:e7:e2:ac:47:64: ad:ba:30:22:ab:7b:82:dd:f1:7d:33:c4:b7:8b:e0:97: 24:60:33:22:97:c3:d0:22:e4:43:c0:5f:1d:89:8b:86: 8a:49:8d:7a:8c:fc:f8:49:89:df:c6:a2:09:1d:b1:70: dd:7e:31:9d:99:97:b6:5d:de:51:39:c9:3f:d8:7c:2a: fb:11:20:62:59:19:76:56:1a:59:b8:e2:fa:99:03:74: 74:7b:1d:31:09:ae:09:73:f8:05:98:4c:52:75:31:44: 97:6c:af:b6:37:75:af:ad:84:4c:d1:3d:30:ba:6a:37: 13:1b:39:b8:26:df:e4:6f:1a:b7:4a:1b:eb:8e:e8:e0: ff:50:65:62:b5:74:ac:7d:92:b4:eb:77:da:bd:93:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:21:cc:f7:55:62:35:f2:e4:a1:b1:51:bb:7b:de:b0: 2b:38:5a:5d:29:e9:cc:13:ea:1b:df:bc:44:3f:4c:ee: 2d:06:5b:45:16:d7:4b:55:7c:9b:33:3f:c7:bc:16:2a: 6f:ee:26:0b:7c:d5:cf:ae:0e:f8:9c:00:3b:e9:43:8f: 1b:03:c6:a9:2d:ad:0a:cd:bf:de:81:77:62:fa:06:56: 70:1a:cf:7a:3c:20:79:1e:ee:b4:e9:ce:fd:13:b9:05: fd:2b:5f:d8:83:91:97:2b:75:70:46:37:a2:56:f7:71: 59:ed:3e:7f:34:3f:ee:76:3f:07:ad:a8:8e:22:5c:cb: 11:87:3f:7d:35:2c:bb:62:38:30:ba:3e:f7:7c:c1:9d: 1a:63:73:a4:3f:66:bd:a3:81:6d:03:ee:44:3a:d4:52: 14:c3:bb:e4:d1:e8:34:f9:c2:7a:9f:39:0f:59:41:b7: b9:5e:24:62:68:2d:9b:fb:ca:dc:5f:7d:ab:9b:0a:eb: 78:9f:e2:68:e5:ca:33:e9:1b:4a:28:8e:3c:e7:f2:ba: a5:38:71:55:24:0e:0d:c9:8c:15:07:4e:15:81:36:8e: ec:76:4d:5b:20:d9:02:06:fc:ce:8c:e1:48:3e:eb:5b: 20:2d:a9:b8:04:d2:75:d6:99:c5:48:0e:cc:bc:c5:ba Fingerprint (SHA-256): 5C:97:43:ED:71:3D:A2:E3:03:EC:D4:86:F9:6F:F7:B7:B2:38:BC:C1:EB:7F:6C:4A:ED:B1:9C:D7:54:F0:AC:22 Fingerprint (SHA1): 12:A7:04:7E:CF:DD:03:49:82:BD:89:A3:11:D4:F3:ED:3C:9B:7E:BC Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9118: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #9119: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153933 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9120: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #9121: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #9122: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153934 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9123: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #9124: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #9125: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9126: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 108153935 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9127: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9128: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #9129: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9130: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 108153936 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9131: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9132: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #9133: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9134: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 108153937 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #9135: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9136: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 108153938 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #9137: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9138: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #9139: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9140: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9141: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108153939 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9142: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9143: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #9144: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9145: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 108153940 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9146: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9147: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #9148: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9149: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108153941 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9150: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9151: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #9152: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9153: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108153942 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9154: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9155: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9156: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153933 (0x6724c4d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 21:01:35 2016 Not After : Fri Jan 08 21:01:35 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:a4:25:c3:de:88:33:fa:de:0b:12:fd:40:a1:44:1b: 82:c7:2a:86:56:4f:81:f1:9d:25:b2:6c:81:33:d6:bc: 9d:b1:5f:97:d6:6e:68:68:b0:ea:7d:9e:4c:cc:98:85: cc:f4:85:6d:56:4d:e4:ff:d3:f4:16:ed:66:6f:a4:a9: 89:2e:d5:81:46:35:a9:76:40:58:4b:0c:79:ed:3c:0f: 0f:27:85:6a:16:30:8e:33:79:be:0f:f8:2d:f4:23:4d: 78:1b:fd:5c:b9:67:f5:2e:33:6b:31:e9:e6:1f:a0:75: e0:01:26:71:bd:74:8e:e4:9e:6a:26:18:ad:37:8c:6f: e4:c4:7e:51:cd:8d:24:a9:da:85:74:89:18:60:b0:9e: b2:04:e1:2e:7f:04:e3:77:e3:e2:49:3d:43:07:72:6f: 80:fa:23:fc:2f:cf:53:e1:ce:97:a4:3b:ae:d5:cf:a2: 73:ba:45:b0:47:c2:34:08:8d:6c:f0:b7:02:19:e1:5f: fa:7a:e5:d2:93:2e:0b:bc:08:bd:ff:1f:05:be:30:7d: 5e:09:18:3b:31:a5:dc:29:ab:7c:f2:ed:42:b3:8a:ac: 78:ce:a5:01:7d:bb:4b:4e:24:d2:58:fe:21:b3:e5:24: d8:97:64:cb:a1:77:68:be:ad:9b:b7:d0:bf:46:0f:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:3e:e0:5e:2e:2d:de:9a:ad:3a:cf:30:71:92:03:55: e9:90:5d:a1:14:09:f3:1e:33:6d:81:3e:38:14:58:62: 95:8b:ea:d5:39:3c:66:d5:19:ac:73:db:cf:be:db:84: a5:aa:35:ca:f6:e5:0e:56:3d:e7:61:64:eb:34:8f:a6: dd:af:60:1d:1c:5c:fa:86:81:1c:c7:8f:98:73:84:84: f7:45:ca:a2:d0:df:d9:4e:56:bb:6e:b2:1e:f5:a5:0f: d7:b6:b3:b7:bb:2c:79:ff:8c:99:cb:23:a8:f0:01:8d: e2:87:e2:7b:91:dc:89:68:cf:84:02:1a:26:b4:9d:33: 3e:e9:19:bd:aa:e3:88:7e:e0:f3:a2:ac:8c:48:8e:6b: ae:37:9e:3c:ad:6d:1b:6b:7c:e7:29:88:68:b0:39:b5: 05:d8:26:4a:ca:56:5d:16:d0:52:e0:61:13:d2:f9:64: ba:e0:35:b1:b0:8e:7b:ce:ce:82:09:4a:e0:15:a2:0b: 5f:dd:d9:27:32:01:d8:92:6d:ed:6b:34:f3:d6:94:ad: c4:46:0f:22:4b:74:6a:5a:af:19:c8:20:f7:e8:1e:53: 73:2a:9d:f6:51:d6:f0:d3:7c:21:ab:b4:51:ac:fc:b8: 32:6e:cb:fc:0f:5a:2d:19:33:b7:86:4f:25:61:b0:dd Fingerprint (SHA-256): CC:AA:CC:04:04:64:83:39:AE:15:B9:C6:13:D5:91:37:16:C4:91:C5:77:3A:63:9B:56:7F:00:C3:A9:A0:48:61 Fingerprint (SHA1): F6:4C:45:52:CD:2A:4E:96:C5:33:BE:A6:8E:2A:A1:0F:C6:F0:BE:4A Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #9157: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9158: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9159: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9160: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9161: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9162: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9163: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9164: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9165: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153934 (0x6724c4e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 21:01:39 2016 Not After : Fri Jan 08 21:01:39 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:c2:ae:8f:f3:76:bd:ee:4d:73:82:54:7c:31:3b:d6: 26:f2:c8:c9:dc:0c:81:dd:47:63:aa:b2:75:42:47:d2: 36:84:68:90:58:82:45:cb:68:12:bc:33:fe:da:39:63: 9b:10:f2:1a:b0:9e:ec:76:e9:a4:0b:85:37:13:69:45: a6:81:df:61:8c:61:5a:00:c4:c2:f9:b1:27:78:65:d8: ba:82:6f:b0:d5:74:bd:4a:bd:40:8e:02:13:5d:f5:85: 2b:3a:05:79:d0:de:13:79:93:a0:2b:23:c0:97:4b:e6: b1:ec:84:24:50:ef:dd:4f:44:f3:28:37:db:ed:a9:1f: 1b:83:d6:7a:35:ba:9c:fd:57:77:27:96:91:67:86:5b: 31:36:cf:e6:74:b9:ee:d4:a9:32:43:85:21:bc:27:f5: ef:89:c4:a2:fe:e2:4f:20:6f:e8:72:e9:0b:dd:a4:65: 98:b7:65:a1:e7:2d:1b:e1:d8:75:c2:c1:ee:3d:0d:6a: ac:a1:4b:8d:72:b0:e2:22:0d:b5:d1:5a:e8:b1:8c:4e: 27:ca:c5:b4:2b:16:c2:a5:7d:af:a4:da:6f:6c:f9:1e: 58:9d:df:43:03:a3:99:65:d6:1d:31:4e:72:e0:10:90: 20:af:8b:92:30:91:4f:e4:07:6f:7e:af:0a:a8:2b:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:4d:1f:c3:1f:28:e6:47:7a:3d:a0:fa:9f:85:1d:8b: 03:bd:8f:8f:11:71:7b:81:89:c3:95:7c:48:b4:59:1f: e8:8a:fc:9c:52:d3:19:e3:5e:03:7a:a1:74:6b:5d:b7: f5:42:64:3b:79:9e:0c:7d:2c:33:b0:ea:32:70:aa:83: 7a:6e:65:9c:cd:4d:7e:67:97:0a:6e:80:6e:9b:6d:1e: 05:8e:fb:df:44:9d:c2:ee:ee:65:54:60:3e:83:19:6e: ac:63:47:90:0a:ae:d1:d2:94:79:93:6b:79:eb:63:a4: 28:c8:b3:1d:f3:4c:a5:ad:8d:9c:9e:57:7a:f6:83:dd: 73:c1:c4:e7:21:94:2c:42:ff:fd:da:61:32:49:0e:ba: 39:0c:fd:31:23:ba:56:55:c4:ed:5e:7a:0e:1f:8a:3e: a3:a4:61:42:e8:bc:c2:8b:a3:dd:e4:3d:92:7a:a3:89: 66:0d:f0:ac:8b:f5:c4:34:41:cb:63:f4:b1:21:e8:90: a0:56:bb:16:32:68:ae:0b:85:3c:81:5e:65:a2:2c:e4: f7:64:a4:00:e3:e8:80:42:b2:4b:b2:92:bb:38:55:44: c9:ed:18:8c:e4:a0:18:72:50:83:5c:f1:9f:3e:c6:35: af:5b:b0:3f:8b:2e:60:7b:64:f9:8e:11:2b:8f:4a:93 Fingerprint (SHA-256): D7:5B:EE:B6:97:8C:6D:3F:CC:67:D4:B0:7D:20:64:4E:49:42:2B:84:A6:58:65:92:2D:43:36:3B:83:BE:F5:CC Fingerprint (SHA1): 25:76:1B:32:49:72:34:66:C3:14:A4:DA:7B:CB:A6:D2:E6:6E:E1:EB Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #9166: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9167: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9168: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9169: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9170: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9171: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #9172: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #9173: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #9174: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #9175: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #9176: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #9177: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #9178: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #9179: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #9180: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #9181: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.114412.1.1 /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=paypal.com,OU=PayPal Production,O="PayPal, Inc.",L =San Jose,ST=California,C=US" Certificate 2 Subject: "CN=DigiCert SHA2 High Assurance Server CA,OU=www.digi cert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #9182: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #9183: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #9184: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153943 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9185: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #9186: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9187: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9188: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108153944 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9189: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9190: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #9191: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9192: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108153945 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9193: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9194: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #9195: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9196: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 108153946 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9197: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9198: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #9199: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9200: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108153947 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9201: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9202: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #9203: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9204: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 108153948 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9205: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9206: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #9207: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9208: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 108153949 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9209: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9210: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #9211: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9212: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 108153950 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9213: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9214: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #9215: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9216: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 108153951 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9217: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9218: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #9219: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153943 (0x6724c57) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:03:15 2016 Not After : Fri Jan 08 21:03:15 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 36:29:e7:fb:38:68:bd:44:03:68:6c:91:0a:ec:b0:4c: a9:8d:25:fe:78:07:e4:be:59:24:f9:c7:cb:15:31:69: 0b:35:64:94:04:1c:4a:1c:3d:b3:eb:1f:31:ee:59:ad: 85:c4:bf:39:4b:f3:86:9c:4e:7d:99:91:e9:98:4a:9f: bb:d2:55:81:70:f3:ba:45:ae:8f:4b:24:1d:e7:78:01: 46:53:c5:2a:23:53:28:93:2d:77:ea:31:42:8c:8e:be: 7a:af:b2:82:55:2c:57:99:f6:54:db:90:1a:65:57:39: bc:2a:86:67:db:cf:bb:19:82:6e:5a:34:b8:6e:43:b8: 6d:a5:f7:59:6d:fb:cb:e2:35:b3:65:57:44:fd:0f:a3: 44:21:87:67:aa:90:ef:87:95:4a:03:0d:7e:d8:ad:a4: 09:b8:ba:81:cb:52:7c:41:9b:82:9a:a8:5f:e5:cf:fa: 0f:ca:85:ff:cf:db:68:cb:9e:1c:3c:f4:ea:73:41:e3: e6:d4:17:b7:4b:88:ff:06:7b:b4:ed:a1:d7:fb:eb:07: f1:4f:87:3a:46:1a:ea:b3:88:49:b2:7c:6c:e7:9a:cd: 07:30:d6:e5:f0:55:44:36:e3:8e:f2:09:95:c9:b5:f5: 15:92:7e:1a:d8:20:c9:87:86:ca:99:04:c6:5c:14:f2 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3e:02:1d:00:d7:4f:b6:79:c3:a8:98:de:2c:7b:60: e0:d1:79:d4:3d:a8:e7:fb:2a:40:a5:5b:cb:ab:df:48: 90:02:1d:00:d5:be:45:0b:5f:3c:43:31:bb:73:83:73: ad:c5:e5:8a:f9:3c:70:8a:f3:31:ef:5b:46:b5:66:57 Fingerprint (SHA-256): 7E:83:C4:09:07:DA:4D:EA:6A:D6:F0:36:FB:14:A8:17:73:CB:8B:28:C3:9B:E6:3A:75:C2:C0:A0:52:C9:46:07 Fingerprint (SHA1): F7:14:64:0D:84:46:29:B3:93:33:46:03:F4:A3:35:33:35:21:54:4B Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9220: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153943 (0x6724c57) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:03:15 2016 Not After : Fri Jan 08 21:03:15 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 36:29:e7:fb:38:68:bd:44:03:68:6c:91:0a:ec:b0:4c: a9:8d:25:fe:78:07:e4:be:59:24:f9:c7:cb:15:31:69: 0b:35:64:94:04:1c:4a:1c:3d:b3:eb:1f:31:ee:59:ad: 85:c4:bf:39:4b:f3:86:9c:4e:7d:99:91:e9:98:4a:9f: bb:d2:55:81:70:f3:ba:45:ae:8f:4b:24:1d:e7:78:01: 46:53:c5:2a:23:53:28:93:2d:77:ea:31:42:8c:8e:be: 7a:af:b2:82:55:2c:57:99:f6:54:db:90:1a:65:57:39: bc:2a:86:67:db:cf:bb:19:82:6e:5a:34:b8:6e:43:b8: 6d:a5:f7:59:6d:fb:cb:e2:35:b3:65:57:44:fd:0f:a3: 44:21:87:67:aa:90:ef:87:95:4a:03:0d:7e:d8:ad:a4: 09:b8:ba:81:cb:52:7c:41:9b:82:9a:a8:5f:e5:cf:fa: 0f:ca:85:ff:cf:db:68:cb:9e:1c:3c:f4:ea:73:41:e3: e6:d4:17:b7:4b:88:ff:06:7b:b4:ed:a1:d7:fb:eb:07: f1:4f:87:3a:46:1a:ea:b3:88:49:b2:7c:6c:e7:9a:cd: 07:30:d6:e5:f0:55:44:36:e3:8e:f2:09:95:c9:b5:f5: 15:92:7e:1a:d8:20:c9:87:86:ca:99:04:c6:5c:14:f2 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3e:02:1d:00:d7:4f:b6:79:c3:a8:98:de:2c:7b:60: e0:d1:79:d4:3d:a8:e7:fb:2a:40:a5:5b:cb:ab:df:48: 90:02:1d:00:d5:be:45:0b:5f:3c:43:31:bb:73:83:73: ad:c5:e5:8a:f9:3c:70:8a:f3:31:ef:5b:46:b5:66:57 Fingerprint (SHA-256): 7E:83:C4:09:07:DA:4D:EA:6A:D6:F0:36:FB:14:A8:17:73:CB:8B:28:C3:9B:E6:3A:75:C2:C0:A0:52:C9:46:07 Fingerprint (SHA1): F7:14:64:0D:84:46:29:B3:93:33:46:03:F4:A3:35:33:35:21:54:4B Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #9221: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153943 (0x6724c57) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:03:15 2016 Not After : Fri Jan 08 21:03:15 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 36:29:e7:fb:38:68:bd:44:03:68:6c:91:0a:ec:b0:4c: a9:8d:25:fe:78:07:e4:be:59:24:f9:c7:cb:15:31:69: 0b:35:64:94:04:1c:4a:1c:3d:b3:eb:1f:31:ee:59:ad: 85:c4:bf:39:4b:f3:86:9c:4e:7d:99:91:e9:98:4a:9f: bb:d2:55:81:70:f3:ba:45:ae:8f:4b:24:1d:e7:78:01: 46:53:c5:2a:23:53:28:93:2d:77:ea:31:42:8c:8e:be: 7a:af:b2:82:55:2c:57:99:f6:54:db:90:1a:65:57:39: bc:2a:86:67:db:cf:bb:19:82:6e:5a:34:b8:6e:43:b8: 6d:a5:f7:59:6d:fb:cb:e2:35:b3:65:57:44:fd:0f:a3: 44:21:87:67:aa:90:ef:87:95:4a:03:0d:7e:d8:ad:a4: 09:b8:ba:81:cb:52:7c:41:9b:82:9a:a8:5f:e5:cf:fa: 0f:ca:85:ff:cf:db:68:cb:9e:1c:3c:f4:ea:73:41:e3: e6:d4:17:b7:4b:88:ff:06:7b:b4:ed:a1:d7:fb:eb:07: f1:4f:87:3a:46:1a:ea:b3:88:49:b2:7c:6c:e7:9a:cd: 07:30:d6:e5:f0:55:44:36:e3:8e:f2:09:95:c9:b5:f5: 15:92:7e:1a:d8:20:c9:87:86:ca:99:04:c6:5c:14:f2 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3e:02:1d:00:d7:4f:b6:79:c3:a8:98:de:2c:7b:60: e0:d1:79:d4:3d:a8:e7:fb:2a:40:a5:5b:cb:ab:df:48: 90:02:1d:00:d5:be:45:0b:5f:3c:43:31:bb:73:83:73: ad:c5:e5:8a:f9:3c:70:8a:f3:31:ef:5b:46:b5:66:57 Fingerprint (SHA-256): 7E:83:C4:09:07:DA:4D:EA:6A:D6:F0:36:FB:14:A8:17:73:CB:8B:28:C3:9B:E6:3A:75:C2:C0:A0:52:C9:46:07 Fingerprint (SHA1): F7:14:64:0D:84:46:29:B3:93:33:46:03:F4:A3:35:33:35:21:54:4B Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #9222: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153943 (0x6724c57) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:03:15 2016 Not After : Fri Jan 08 21:03:15 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 36:29:e7:fb:38:68:bd:44:03:68:6c:91:0a:ec:b0:4c: a9:8d:25:fe:78:07:e4:be:59:24:f9:c7:cb:15:31:69: 0b:35:64:94:04:1c:4a:1c:3d:b3:eb:1f:31:ee:59:ad: 85:c4:bf:39:4b:f3:86:9c:4e:7d:99:91:e9:98:4a:9f: bb:d2:55:81:70:f3:ba:45:ae:8f:4b:24:1d:e7:78:01: 46:53:c5:2a:23:53:28:93:2d:77:ea:31:42:8c:8e:be: 7a:af:b2:82:55:2c:57:99:f6:54:db:90:1a:65:57:39: bc:2a:86:67:db:cf:bb:19:82:6e:5a:34:b8:6e:43:b8: 6d:a5:f7:59:6d:fb:cb:e2:35:b3:65:57:44:fd:0f:a3: 44:21:87:67:aa:90:ef:87:95:4a:03:0d:7e:d8:ad:a4: 09:b8:ba:81:cb:52:7c:41:9b:82:9a:a8:5f:e5:cf:fa: 0f:ca:85:ff:cf:db:68:cb:9e:1c:3c:f4:ea:73:41:e3: e6:d4:17:b7:4b:88:ff:06:7b:b4:ed:a1:d7:fb:eb:07: f1:4f:87:3a:46:1a:ea:b3:88:49:b2:7c:6c:e7:9a:cd: 07:30:d6:e5:f0:55:44:36:e3:8e:f2:09:95:c9:b5:f5: 15:92:7e:1a:d8:20:c9:87:86:ca:99:04:c6:5c:14:f2 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3e:02:1d:00:d7:4f:b6:79:c3:a8:98:de:2c:7b:60: e0:d1:79:d4:3d:a8:e7:fb:2a:40:a5:5b:cb:ab:df:48: 90:02:1d:00:d5:be:45:0b:5f:3c:43:31:bb:73:83:73: ad:c5:e5:8a:f9:3c:70:8a:f3:31:ef:5b:46:b5:66:57 Fingerprint (SHA-256): 7E:83:C4:09:07:DA:4D:EA:6A:D6:F0:36:FB:14:A8:17:73:CB:8B:28:C3:9B:E6:3A:75:C2:C0:A0:52:C9:46:07 Fingerprint (SHA1): F7:14:64:0D:84:46:29:B3:93:33:46:03:F4:A3:35:33:35:21:54:4B Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #9223: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #9224: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 10 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9225: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #9226: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #9227: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9228: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9229: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9230: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9231: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9232: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9233: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9234: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #9235: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9236: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9237: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9238: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #9239: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9240: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9241: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9242: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #9243: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9244: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9245: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9246: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #9247: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9248: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9249: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9250: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160108210607Z nextupdate=20170108210607Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Jan 08 21:06:07 2016 Next Update: Sun Jan 08 21:06:07 2017 CRL Extensions: chains.sh: #9251: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108210607Z nextupdate=20170108210607Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 21:06:07 2016 Next Update: Sun Jan 08 21:06:07 2017 CRL Extensions: chains.sh: #9252: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108210608Z nextupdate=20170108210608Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 21:06:08 2016 Next Update: Sun Jan 08 21:06:08 2017 CRL Extensions: chains.sh: #9253: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160108210609Z nextupdate=20170108210609Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Jan 08 21:06:09 2016 Next Update: Sun Jan 08 21:06:09 2017 CRL Extensions: chains.sh: #9254: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108210610Z addcert 14 20160108210610Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 21:06:10 2016 Next Update: Sun Jan 08 21:06:08 2017 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Fri Jan 08 21:06:10 2016 CRL Extensions: chains.sh: #9255: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108210611Z addcert 15 20160108210611Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 21:06:11 2016 Next Update: Sun Jan 08 21:06:07 2017 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Fri Jan 08 21:06:11 2016 CRL Extensions: chains.sh: #9256: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #9257: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9258: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #9259: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #9260: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #9261: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #9262: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #9263: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #9264: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #9265: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:04:26 2016 Not After : Fri Jan 08 21:04:26 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:39:2d:c9:c6:ac:eb:82:14:c5:54:ec:50:70:b6:f6: 42:4d:11:6a:4a:ee:bb:61:c8:b1:d3:78:80:75:ac:44: 9e:63:6e:b8:b1:3d:7b:ef:70:13:94:61:4a:e6:ad:c5: 1f:06:e4:ad:29:62:c0:6d:0b:40:65:31:91:49:0d:00: 2f:f3:52:85:56:b9:64:9e:b1:41:9d:17:a7:fe:8d:0a: 5f:50:4f:50:42:f9:7b:f8:78:8d:a1:f6:b6:fc:f7:d0: 8d:ce:a2:d1:8d:a7:79:da:74:0a:8a:99:20:ee:c5:71: 25:28:3c:ed:f7:f3:95:23:87:e2:67:55:76:b3:3b:0f: a9:aa:11:ec:30:86:69:f5:96:18:f5:91:03:f0:fa:2e: be:c7:b5:7b:ee:f7:b1:fd:aa:6d:c5:62:d6:38:0e:df: cb:37:72:bc:d2:91:88:cc:30:d4:24:be:85:fa:33:a9: 0f:e5:65:14:55:32:15:c5:0a:15:f7:51:c6:b5:bb:8d: 48:5b:74:c0:f9:69:36:ce:ea:6a:84:90:49:e9:eb:fb: 87:d9:8f:03:87:42:bd:ff:15:5c:c8:1c:a2:98:11:3d: f1:c9:a6:6f:0f:5f:2b:f5:ec:ff:a2:c5:cc:42:cd:c2: a6:4d:c9:c3:47:fb:16:18:aa:22:8f:6c:be:90:8a:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:96:56:31:8a:92:e3:40:58:7d:85:6a:ae:bc:91:38: 2d:6d:e3:76:1d:4e:ce:99:f8:12:5b:95:d7:0d:26:90: e2:ac:13:10:cb:bf:91:55:41:84:01:3d:32:27:e2:1a: 85:3b:68:02:5e:df:d1:6d:1a:e1:e4:58:e5:5d:2f:e3: cc:3d:fd:f7:7a:9f:09:e5:27:82:26:e1:b1:cf:e3:b5: fd:06:a6:ca:0f:95:71:a8:e8:c0:6f:ca:d6:54:fc:3b: 9a:0f:95:4c:a3:82:68:95:c6:bf:3d:10:0c:22:7d:d8: d5:97:95:02:c5:f8:ca:37:b9:41:de:b8:31:b9:ed:8f: b2:47:e4:96:02:8c:26:c6:fc:93:28:32:bd:f8:d9:f7: 3b:fe:a8:32:70:76:80:f0:ee:46:40:61:02:11:a3:5b: 72:20:fc:fd:fd:9d:72:22:30:60:ad:de:e0:a3:86:53: 2b:ba:67:cb:42:ac:c9:b3:5f:0d:03:ce:0b:70:f5:f3: 2b:a6:cc:fc:51:f8:88:10:4b:bf:82:87:98:78:38:4c: 1b:dd:15:26:29:bc:f4:3b:c8:0c:69:82:7c:9a:4c:b1: 4c:a2:60:06:bc:f7:3b:37:7f:8e:0d:56:62:51:c4:e7: c2:d9:d6:78:77:89:af:e6:b2:51:dd:42:f2:61:e4:e2 Fingerprint (SHA-256): 2A:D6:1B:C8:5F:41:EC:10:97:10:88:30:41:69:8E:78:6B:2C:B2:5B:25:87:84:1A:97:98:FF:A7:91:CB:47:CF Fingerprint (SHA1): 92:71:2C:D7:0C:F4:DB:1B:54:80:2C:1B:20:FF:30:2C:E4:26:F8:82 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #9266: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #9267: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:04:26 2016 Not After : Fri Jan 08 21:04:26 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:39:2d:c9:c6:ac:eb:82:14:c5:54:ec:50:70:b6:f6: 42:4d:11:6a:4a:ee:bb:61:c8:b1:d3:78:80:75:ac:44: 9e:63:6e:b8:b1:3d:7b:ef:70:13:94:61:4a:e6:ad:c5: 1f:06:e4:ad:29:62:c0:6d:0b:40:65:31:91:49:0d:00: 2f:f3:52:85:56:b9:64:9e:b1:41:9d:17:a7:fe:8d:0a: 5f:50:4f:50:42:f9:7b:f8:78:8d:a1:f6:b6:fc:f7:d0: 8d:ce:a2:d1:8d:a7:79:da:74:0a:8a:99:20:ee:c5:71: 25:28:3c:ed:f7:f3:95:23:87:e2:67:55:76:b3:3b:0f: a9:aa:11:ec:30:86:69:f5:96:18:f5:91:03:f0:fa:2e: be:c7:b5:7b:ee:f7:b1:fd:aa:6d:c5:62:d6:38:0e:df: cb:37:72:bc:d2:91:88:cc:30:d4:24:be:85:fa:33:a9: 0f:e5:65:14:55:32:15:c5:0a:15:f7:51:c6:b5:bb:8d: 48:5b:74:c0:f9:69:36:ce:ea:6a:84:90:49:e9:eb:fb: 87:d9:8f:03:87:42:bd:ff:15:5c:c8:1c:a2:98:11:3d: f1:c9:a6:6f:0f:5f:2b:f5:ec:ff:a2:c5:cc:42:cd:c2: a6:4d:c9:c3:47:fb:16:18:aa:22:8f:6c:be:90:8a:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:96:56:31:8a:92:e3:40:58:7d:85:6a:ae:bc:91:38: 2d:6d:e3:76:1d:4e:ce:99:f8:12:5b:95:d7:0d:26:90: e2:ac:13:10:cb:bf:91:55:41:84:01:3d:32:27:e2:1a: 85:3b:68:02:5e:df:d1:6d:1a:e1:e4:58:e5:5d:2f:e3: cc:3d:fd:f7:7a:9f:09:e5:27:82:26:e1:b1:cf:e3:b5: fd:06:a6:ca:0f:95:71:a8:e8:c0:6f:ca:d6:54:fc:3b: 9a:0f:95:4c:a3:82:68:95:c6:bf:3d:10:0c:22:7d:d8: d5:97:95:02:c5:f8:ca:37:b9:41:de:b8:31:b9:ed:8f: b2:47:e4:96:02:8c:26:c6:fc:93:28:32:bd:f8:d9:f7: 3b:fe:a8:32:70:76:80:f0:ee:46:40:61:02:11:a3:5b: 72:20:fc:fd:fd:9d:72:22:30:60:ad:de:e0:a3:86:53: 2b:ba:67:cb:42:ac:c9:b3:5f:0d:03:ce:0b:70:f5:f3: 2b:a6:cc:fc:51:f8:88:10:4b:bf:82:87:98:78:38:4c: 1b:dd:15:26:29:bc:f4:3b:c8:0c:69:82:7c:9a:4c:b1: 4c:a2:60:06:bc:f7:3b:37:7f:8e:0d:56:62:51:c4:e7: c2:d9:d6:78:77:89:af:e6:b2:51:dd:42:f2:61:e4:e2 Fingerprint (SHA-256): 2A:D6:1B:C8:5F:41:EC:10:97:10:88:30:41:69:8E:78:6B:2C:B2:5B:25:87:84:1A:97:98:FF:A7:91:CB:47:CF Fingerprint (SHA1): 92:71:2C:D7:0C:F4:DB:1B:54:80:2C:1B:20:FF:30:2C:E4:26:F8:82 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #9268: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #9269: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #9270: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153952 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9271: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #9272: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #9273: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9274: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 108153953 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9275: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9276: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9277: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9169/localhost-27064-CA0-108153843.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #9278: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0Root-108153828.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #9279: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9280: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #9281: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0-108153843.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #9282: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 108153954 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9283: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9284: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #9285: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9169/localhost-27064-CA0-108153843.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #9286: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0Root-108153829.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #9287: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9288: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #9289: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9290: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 108153955 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9291: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9292: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #9293: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0-108153843.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #9294: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0Root-108153830.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #9295: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9296: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #9297: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0-108153843.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #9298: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0Root-108153831.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #9299: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9300: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160108210745Z nextupdate=20170108210745Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Jan 08 21:07:45 2016 Next Update: Sun Jan 08 21:07:45 2017 CRL Extensions: chains.sh: #9301: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108210745Z nextupdate=20170108210745Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 21:07:45 2016 Next Update: Sun Jan 08 21:07:45 2017 CRL Extensions: chains.sh: #9302: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108210746Z nextupdate=20170108210746Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 21:07:46 2016 Next Update: Sun Jan 08 21:07:46 2017 CRL Extensions: chains.sh: #9303: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160108210746Z nextupdate=20170108210746Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Jan 08 21:07:46 2016 Next Update: Sun Jan 08 21:07:46 2017 CRL Extensions: chains.sh: #9304: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108210747Z addcert 20 20160108210747Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 21:07:47 2016 Next Update: Sun Jan 08 21:07:45 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Jan 08 21:07:47 2016 CRL Extensions: chains.sh: #9305: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108210748Z addcert 40 20160108210748Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 21:07:48 2016 Next Update: Sun Jan 08 21:07:45 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Jan 08 21:07:47 2016 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Fri Jan 08 21:07:48 2016 CRL Extensions: chains.sh: #9306: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #9307: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9308: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #9309: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153952 (0x6724c60) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:06:30 2016 Not After : Fri Jan 08 21:06:30 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:b4:4e:39:f6:5f:4e:d2:e8:78:1c:31:21:34:42:9b: 63:23:52:4d:90:72:b4:97:4e:56:aa:9a:8f:b4:6c:8e: 50:c5:ca:75:97:b9:a1:04:60:f9:fc:9c:d5:f7:6b:00: cc:55:7a:2a:17:e6:69:78:a7:03:33:7a:90:7f:1c:7f: db:85:74:de:be:d7:79:67:93:74:df:65:45:db:e5:21: ef:b3:b1:fe:02:ed:bc:99:3a:15:fd:e4:ce:ea:8b:0b: 2a:b3:ca:64:f1:4e:dd:32:03:78:36:9b:d7:78:a2:91: 1d:84:76:be:39:c2:c5:c8:4d:72:36:49:d1:13:be:d3: 48:9f:6e:74:23:df:8d:08:ba:a1:7b:e3:91:9b:e7:5e: 05:c3:43:66:33:0e:8e:7b:7f:98:c0:8c:b0:a9:7f:96: 46:24:76:65:58:a2:4e:68:5a:34:53:97:8d:9e:a9:28: 64:17:c7:37:8e:af:a5:53:d3:4d:a4:66:4e:5c:0a:c5: a9:d3:fd:e6:6a:18:f9:6b:cd:33:51:0e:a6:e1:c6:a5: 5a:bf:7d:00:c0:cc:ab:11:c5:4f:48:84:50:af:a4:a5: 27:32:da:80:8d:ce:2b:39:3a:d4:97:9b:49:6d:fe:aa: 3e:2e:38:e9:29:5a:28:12:13:ab:3d:2a:27:e5:6c:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bb:76:90:d9:7e:7d:ae:f5:f2:76:d2:fd:0c:f6:29:b7: 42:3e:e7:26:84:f0:21:c6:80:28:3b:69:1d:b5:65:13: 5e:6d:43:48:a4:73:3b:38:23:85:2e:db:5f:17:29:e8: df:fd:8f:8c:ef:6e:88:24:90:4a:b9:c9:b0:04:a9:62: be:3d:98:71:cc:ac:3c:e5:6d:91:a8:77:f7:ed:c8:0c: 41:84:08:06:a4:b8:0f:a3:42:0b:b2:be:65:a4:96:20: e9:b5:ff:56:6f:07:65:a0:aa:76:5a:d4:83:56:94:9c: 33:8a:6a:01:bd:b0:d0:33:26:51:06:1a:63:28:71:ad: 7b:4d:ca:af:0f:8f:3d:2f:9e:85:9f:95:a0:f1:86:91: 37:a1:3a:96:0b:dc:f8:ae:6a:09:c3:f4:f1:74:c3:9c: 8b:99:e0:a4:b3:62:e1:b5:4e:65:99:3e:af:c3:43:fb: 88:06:4d:1d:bf:05:97:00:5e:d6:66:4d:ff:9a:31:09: 3e:3c:e7:59:12:c9:8f:bd:59:f6:8b:dd:a7:c1:cc:87: 56:ec:bd:bc:fa:61:d3:6a:35:d0:45:5c:57:b5:a7:aa: 21:ca:e1:0f:7c:86:a3:d4:5e:70:2d:00:a4:52:99:91: 8e:35:b4:65:6c:ec:c9:37:00:12:2d:fc:a9:55:65:6f Fingerprint (SHA-256): 6D:62:E1:D3:FA:B1:7F:2C:28:49:98:48:1C:25:E1:02:21:62:48:ED:D6:F0:06:2E:B8:04:BD:9D:84:27:A4:1A Fingerprint (SHA1): 5E:ED:A2:92:9D:F0:7B:BF:6F:97:40:8C:55:BD:E1:2C:69:40:15:32 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #9310: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #9311: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153952 (0x6724c60) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:06:30 2016 Not After : Fri Jan 08 21:06:30 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:b4:4e:39:f6:5f:4e:d2:e8:78:1c:31:21:34:42:9b: 63:23:52:4d:90:72:b4:97:4e:56:aa:9a:8f:b4:6c:8e: 50:c5:ca:75:97:b9:a1:04:60:f9:fc:9c:d5:f7:6b:00: cc:55:7a:2a:17:e6:69:78:a7:03:33:7a:90:7f:1c:7f: db:85:74:de:be:d7:79:67:93:74:df:65:45:db:e5:21: ef:b3:b1:fe:02:ed:bc:99:3a:15:fd:e4:ce:ea:8b:0b: 2a:b3:ca:64:f1:4e:dd:32:03:78:36:9b:d7:78:a2:91: 1d:84:76:be:39:c2:c5:c8:4d:72:36:49:d1:13:be:d3: 48:9f:6e:74:23:df:8d:08:ba:a1:7b:e3:91:9b:e7:5e: 05:c3:43:66:33:0e:8e:7b:7f:98:c0:8c:b0:a9:7f:96: 46:24:76:65:58:a2:4e:68:5a:34:53:97:8d:9e:a9:28: 64:17:c7:37:8e:af:a5:53:d3:4d:a4:66:4e:5c:0a:c5: a9:d3:fd:e6:6a:18:f9:6b:cd:33:51:0e:a6:e1:c6:a5: 5a:bf:7d:00:c0:cc:ab:11:c5:4f:48:84:50:af:a4:a5: 27:32:da:80:8d:ce:2b:39:3a:d4:97:9b:49:6d:fe:aa: 3e:2e:38:e9:29:5a:28:12:13:ab:3d:2a:27:e5:6c:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bb:76:90:d9:7e:7d:ae:f5:f2:76:d2:fd:0c:f6:29:b7: 42:3e:e7:26:84:f0:21:c6:80:28:3b:69:1d:b5:65:13: 5e:6d:43:48:a4:73:3b:38:23:85:2e:db:5f:17:29:e8: df:fd:8f:8c:ef:6e:88:24:90:4a:b9:c9:b0:04:a9:62: be:3d:98:71:cc:ac:3c:e5:6d:91:a8:77:f7:ed:c8:0c: 41:84:08:06:a4:b8:0f:a3:42:0b:b2:be:65:a4:96:20: e9:b5:ff:56:6f:07:65:a0:aa:76:5a:d4:83:56:94:9c: 33:8a:6a:01:bd:b0:d0:33:26:51:06:1a:63:28:71:ad: 7b:4d:ca:af:0f:8f:3d:2f:9e:85:9f:95:a0:f1:86:91: 37:a1:3a:96:0b:dc:f8:ae:6a:09:c3:f4:f1:74:c3:9c: 8b:99:e0:a4:b3:62:e1:b5:4e:65:99:3e:af:c3:43:fb: 88:06:4d:1d:bf:05:97:00:5e:d6:66:4d:ff:9a:31:09: 3e:3c:e7:59:12:c9:8f:bd:59:f6:8b:dd:a7:c1:cc:87: 56:ec:bd:bc:fa:61:d3:6a:35:d0:45:5c:57:b5:a7:aa: 21:ca:e1:0f:7c:86:a3:d4:5e:70:2d:00:a4:52:99:91: 8e:35:b4:65:6c:ec:c9:37:00:12:2d:fc:a9:55:65:6f Fingerprint (SHA-256): 6D:62:E1:D3:FA:B1:7F:2C:28:49:98:48:1C:25:E1:02:21:62:48:ED:D6:F0:06:2E:B8:04:BD:9D:84:27:A4:1A Fingerprint (SHA1): 5E:ED:A2:92:9D:F0:7B:BF:6F:97:40:8C:55:BD:E1:2C:69:40:15:32 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #9312: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #9313: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #9314: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153956 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9315: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #9316: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9317: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9318: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108153957 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9319: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9320: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #9321: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9322: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108153958 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9323: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9324: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #9325: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9326: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 108153959 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9327: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9328: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #9329: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153960 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9330: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #9331: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #9332: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9333: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 108153961 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9334: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9335: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #9336: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9337: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 108153962 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9338: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9339: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #9340: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #9341: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #9342: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153956 (0x6724c64) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 21:07:59 2016 Not After : Fri Jan 08 21:07:59 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:92:02:ab:81:9c:56:f2:6c:41:1f:26:20:04:d9:96: ab:08:4e:18:e2:06:1a:ac:ac:f8:f4:98:40:6a:53:2f: 72:2e:11:2a:9e:b2:98:dd:42:7f:50:51:f1:84:8f:16: 0b:3e:f1:2d:08:99:22:93:c1:51:80:55:be:18:95:50: a2:50:50:76:27:2b:9b:ac:f3:81:08:12:aa:77:63:72: b1:5c:68:d7:c4:02:a8:2b:b6:ae:ee:16:a2:0c:70:a7: 09:c7:81:6a:94:5f:63:2c:9d:a0:bd:0d:e9:56:bd:d2: 68:0f:c7:f8:86:8f:40:52:3c:f3:c5:44:9c:9d:d8:1a: a3:11:29:61:66:8a:0a:20:8e:5d:32:71:a6:0f:6b:ec: 63:cb:68:3d:d6:8f:8d:01:e2:ae:91:2e:36:c5:c5:ec: 00:49:24:7a:a8:f6:97:86:19:c8:e8:24:a0:c9:ce:e6: 26:f6:2b:9d:2e:11:56:a0:6a:95:9e:9d:88:52:e5:8b: 46:53:7b:82:0f:1b:56:1c:db:e9:cf:59:b3:2c:5b:b4: 34:e9:ab:56:26:fc:6a:96:80:ec:08:da:c6:46:04:a5: 42:4c:b9:9d:f2:41:50:88:2a:2d:fe:ca:d9:72:8f:3c: 43:c9:e2:8a:f7:9f:4b:40:f0:2c:93:ab:24:df:82:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:60:23:f8:28:c4:c8:f8:8c:2e:74:8f:ba:74:02:97: 5f:f3:5f:92:c7:e4:bf:03:83:c1:58:9d:ed:3d:db:fc: 90:93:91:ec:46:b9:39:8c:5a:9d:98:da:8b:c8:53:58: 90:e4:01:3a:a1:4e:0e:ae:2c:f0:60:81:47:c6:86:cc: 73:52:47:fc:cf:63:d3:35:da:ef:1f:0f:07:9f:23:f3: e1:b3:c6:93:ab:e2:07:d8:62:7e:a9:b1:74:29:c2:1e: 53:54:19:3e:c3:3d:13:6d:ea:7c:e5:46:7c:4f:36:bd: 81:62:26:c4:95:b2:65:39:3c:c5:ee:2a:91:72:ee:dd: 93:83:f2:09:65:16:63:7a:72:e0:c8:73:b4:c5:8c:90: 1c:ce:27:76:4d:64:ab:0b:68:66:e3:73:b0:03:c5:02: 7f:88:f2:99:a6:7b:97:15:ef:2e:26:e2:d2:d5:80:6f: 12:1f:0a:e0:c6:f8:b7:c4:3a:87:45:1a:a5:00:f9:65: 89:6d:eb:3d:a3:75:82:0c:8e:97:0c:7a:f0:f9:c7:c3: 5b:9f:d0:f9:b4:82:27:4b:28:bc:30:b1:06:28:06:ba: ab:5c:98:05:c2:0c:87:a6:98:2c:b5:e4:d4:36:0f:c7: e0:e6:c7:43:6f:7f:33:ff:d0:b3:ff:01:2d:50:df:7a Fingerprint (SHA-256): 3C:F0:72:36:A2:50:49:BE:31:3F:38:8D:7F:7A:97:AE:22:2B:08:91:5A:07:11:23:6D:6B:6E:4A:1F:D4:8E:3E Fingerprint (SHA1): 34:4D:49:ED:3D:05:58:BE:3C:8B:D7:C7:60:8C:04:61:10:8D:B9:27 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9343: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153958 (0x6724c66) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 21:08:12 2016 Not After : Fri Jan 08 21:08:12 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:2e:c5:f3:be:9f:8c:82:65:19:e4:8f:7e:54:d7:53: 25:f6:e4:75:39:50:81:f3:5f:03:9d:1a:f6:1c:b3:78: 8a:c1:0a:8c:ee:f1:e8:e0:b1:bd:9e:59:f8:6e:14:8d: ea:9d:5a:00:60:c3:f3:9d:aa:b6:49:c3:c4:27:69:b5: 7c:41:bb:30:93:b8:3e:96:99:5b:0b:0e:03:22:b1:94: 6f:e6:c5:db:5d:06:59:50:c7:55:fa:d5:0f:c4:b3:34: f2:c9:75:23:35:db:84:0f:e4:bf:cd:87:f9:5b:a0:e7: 39:c8:a1:1f:17:c6:ed:ba:38:83:6f:31:4d:0a:65:c7: e1:0c:fc:60:fa:f7:17:13:35:bf:fc:ed:65:52:e9:39: 15:da:93:e7:88:1d:5f:1e:cc:da:e2:a4:d5:cd:e6:f7: b5:90:9a:06:54:9a:96:3d:47:63:39:36:cf:09:79:ae: d6:44:bd:eb:cc:41:72:f0:62:82:69:0b:0b:10:b5:f2: c1:ca:e3:49:32:65:e4:71:29:5d:8e:06:6a:95:cd:32: c8:3e:26:f9:72:64:be:b7:31:49:6c:be:40:d9:29:32: b9:e4:cf:5d:24:50:ef:a5:49:4b:17:fb:e0:c1:46:0c: d8:47:af:89:79:02:54:d3:15:92:d7:da:22:17:22:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bd:de:34:9a:a9:95:0f:2b:5f:83:b9:6b:11:69:57:bd: b8:c1:60:e5:20:b3:48:f9:a7:08:1a:b9:78:fd:95:88: 06:e2:66:5b:5d:c4:8d:5f:17:ea:99:6c:e6:dc:9a:c8: da:17:f7:38:30:d9:61:e0:de:4b:8f:34:42:16:d8:6a: 77:8c:a9:9d:cd:53:e9:de:f1:94:16:27:cc:8e:f8:d5: 81:0e:d5:91:ed:dd:1a:54:34:1b:55:ba:2a:54:11:c8: 8f:94:c4:81:bb:14:41:e2:fe:2d:6f:9a:d2:23:0d:d0: 8c:14:06:9f:c8:97:32:60:71:31:cd:eb:45:6d:9a:8b: a1:dc:a4:cb:03:71:3a:5b:ce:03:22:08:63:e8:1c:fb: b8:ee:84:b8:8d:c6:e0:34:b0:3f:4f:2c:60:c6:fa:72: 3e:91:04:c1:8f:18:f1:9f:37:1c:ef:fd:5b:5e:c1:6d: 3f:a0:93:0b:0b:6e:f8:f9:0f:8a:f9:7a:a5:cb:46:47: 5e:2a:c8:36:2a:ba:69:8a:0f:3c:29:4b:80:af:86:4c: aa:2d:b1:b0:60:21:24:8d:8e:26:26:ac:8f:46:6e:52: 7d:95:fc:22:4a:63:ae:63:93:73:2f:85:97:23:55:4c: 2e:d3:69:a6:87:59:88:52:c6:60:d5:2e:44:92:e4:f9 Fingerprint (SHA-256): DF:E1:C7:17:A0:DF:C4:1D:2A:00:95:C3:6D:4B:BA:32:33:32:DB:DF:DC:6A:5C:7E:DD:39:C4:12:41:CF:1F:D1 Fingerprint (SHA1): BB:37:DD:C4:89:F8:9D:E8:45:7F:D5:48:5B:0B:84:68:77:53:C9:45 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #9344: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153956 (0x6724c64) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 21:07:59 2016 Not After : Fri Jan 08 21:07:59 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:92:02:ab:81:9c:56:f2:6c:41:1f:26:20:04:d9:96: ab:08:4e:18:e2:06:1a:ac:ac:f8:f4:98:40:6a:53:2f: 72:2e:11:2a:9e:b2:98:dd:42:7f:50:51:f1:84:8f:16: 0b:3e:f1:2d:08:99:22:93:c1:51:80:55:be:18:95:50: a2:50:50:76:27:2b:9b:ac:f3:81:08:12:aa:77:63:72: b1:5c:68:d7:c4:02:a8:2b:b6:ae:ee:16:a2:0c:70:a7: 09:c7:81:6a:94:5f:63:2c:9d:a0:bd:0d:e9:56:bd:d2: 68:0f:c7:f8:86:8f:40:52:3c:f3:c5:44:9c:9d:d8:1a: a3:11:29:61:66:8a:0a:20:8e:5d:32:71:a6:0f:6b:ec: 63:cb:68:3d:d6:8f:8d:01:e2:ae:91:2e:36:c5:c5:ec: 00:49:24:7a:a8:f6:97:86:19:c8:e8:24:a0:c9:ce:e6: 26:f6:2b:9d:2e:11:56:a0:6a:95:9e:9d:88:52:e5:8b: 46:53:7b:82:0f:1b:56:1c:db:e9:cf:59:b3:2c:5b:b4: 34:e9:ab:56:26:fc:6a:96:80:ec:08:da:c6:46:04:a5: 42:4c:b9:9d:f2:41:50:88:2a:2d:fe:ca:d9:72:8f:3c: 43:c9:e2:8a:f7:9f:4b:40:f0:2c:93:ab:24:df:82:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:60:23:f8:28:c4:c8:f8:8c:2e:74:8f:ba:74:02:97: 5f:f3:5f:92:c7:e4:bf:03:83:c1:58:9d:ed:3d:db:fc: 90:93:91:ec:46:b9:39:8c:5a:9d:98:da:8b:c8:53:58: 90:e4:01:3a:a1:4e:0e:ae:2c:f0:60:81:47:c6:86:cc: 73:52:47:fc:cf:63:d3:35:da:ef:1f:0f:07:9f:23:f3: e1:b3:c6:93:ab:e2:07:d8:62:7e:a9:b1:74:29:c2:1e: 53:54:19:3e:c3:3d:13:6d:ea:7c:e5:46:7c:4f:36:bd: 81:62:26:c4:95:b2:65:39:3c:c5:ee:2a:91:72:ee:dd: 93:83:f2:09:65:16:63:7a:72:e0:c8:73:b4:c5:8c:90: 1c:ce:27:76:4d:64:ab:0b:68:66:e3:73:b0:03:c5:02: 7f:88:f2:99:a6:7b:97:15:ef:2e:26:e2:d2:d5:80:6f: 12:1f:0a:e0:c6:f8:b7:c4:3a:87:45:1a:a5:00:f9:65: 89:6d:eb:3d:a3:75:82:0c:8e:97:0c:7a:f0:f9:c7:c3: 5b:9f:d0:f9:b4:82:27:4b:28:bc:30:b1:06:28:06:ba: ab:5c:98:05:c2:0c:87:a6:98:2c:b5:e4:d4:36:0f:c7: e0:e6:c7:43:6f:7f:33:ff:d0:b3:ff:01:2d:50:df:7a Fingerprint (SHA-256): 3C:F0:72:36:A2:50:49:BE:31:3F:38:8D:7F:7A:97:AE:22:2B:08:91:5A:07:11:23:6D:6B:6E:4A:1F:D4:8E:3E Fingerprint (SHA1): 34:4D:49:ED:3D:05:58:BE:3C:8B:D7:C7:60:8C:04:61:10:8D:B9:27 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9345: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #9346: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153956 (0x6724c64) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 21:07:59 2016 Not After : Fri Jan 08 21:07:59 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:92:02:ab:81:9c:56:f2:6c:41:1f:26:20:04:d9:96: ab:08:4e:18:e2:06:1a:ac:ac:f8:f4:98:40:6a:53:2f: 72:2e:11:2a:9e:b2:98:dd:42:7f:50:51:f1:84:8f:16: 0b:3e:f1:2d:08:99:22:93:c1:51:80:55:be:18:95:50: a2:50:50:76:27:2b:9b:ac:f3:81:08:12:aa:77:63:72: b1:5c:68:d7:c4:02:a8:2b:b6:ae:ee:16:a2:0c:70:a7: 09:c7:81:6a:94:5f:63:2c:9d:a0:bd:0d:e9:56:bd:d2: 68:0f:c7:f8:86:8f:40:52:3c:f3:c5:44:9c:9d:d8:1a: a3:11:29:61:66:8a:0a:20:8e:5d:32:71:a6:0f:6b:ec: 63:cb:68:3d:d6:8f:8d:01:e2:ae:91:2e:36:c5:c5:ec: 00:49:24:7a:a8:f6:97:86:19:c8:e8:24:a0:c9:ce:e6: 26:f6:2b:9d:2e:11:56:a0:6a:95:9e:9d:88:52:e5:8b: 46:53:7b:82:0f:1b:56:1c:db:e9:cf:59:b3:2c:5b:b4: 34:e9:ab:56:26:fc:6a:96:80:ec:08:da:c6:46:04:a5: 42:4c:b9:9d:f2:41:50:88:2a:2d:fe:ca:d9:72:8f:3c: 43:c9:e2:8a:f7:9f:4b:40:f0:2c:93:ab:24:df:82:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:60:23:f8:28:c4:c8:f8:8c:2e:74:8f:ba:74:02:97: 5f:f3:5f:92:c7:e4:bf:03:83:c1:58:9d:ed:3d:db:fc: 90:93:91:ec:46:b9:39:8c:5a:9d:98:da:8b:c8:53:58: 90:e4:01:3a:a1:4e:0e:ae:2c:f0:60:81:47:c6:86:cc: 73:52:47:fc:cf:63:d3:35:da:ef:1f:0f:07:9f:23:f3: e1:b3:c6:93:ab:e2:07:d8:62:7e:a9:b1:74:29:c2:1e: 53:54:19:3e:c3:3d:13:6d:ea:7c:e5:46:7c:4f:36:bd: 81:62:26:c4:95:b2:65:39:3c:c5:ee:2a:91:72:ee:dd: 93:83:f2:09:65:16:63:7a:72:e0:c8:73:b4:c5:8c:90: 1c:ce:27:76:4d:64:ab:0b:68:66:e3:73:b0:03:c5:02: 7f:88:f2:99:a6:7b:97:15:ef:2e:26:e2:d2:d5:80:6f: 12:1f:0a:e0:c6:f8:b7:c4:3a:87:45:1a:a5:00:f9:65: 89:6d:eb:3d:a3:75:82:0c:8e:97:0c:7a:f0:f9:c7:c3: 5b:9f:d0:f9:b4:82:27:4b:28:bc:30:b1:06:28:06:ba: ab:5c:98:05:c2:0c:87:a6:98:2c:b5:e4:d4:36:0f:c7: e0:e6:c7:43:6f:7f:33:ff:d0:b3:ff:01:2d:50:df:7a Fingerprint (SHA-256): 3C:F0:72:36:A2:50:49:BE:31:3F:38:8D:7F:7A:97:AE:22:2B:08:91:5A:07:11:23:6D:6B:6E:4A:1F:D4:8E:3E Fingerprint (SHA1): 34:4D:49:ED:3D:05:58:BE:3C:8B:D7:C7:60:8C:04:61:10:8D:B9:27 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9347: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153958 (0x6724c66) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 21:08:12 2016 Not After : Fri Jan 08 21:08:12 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:2e:c5:f3:be:9f:8c:82:65:19:e4:8f:7e:54:d7:53: 25:f6:e4:75:39:50:81:f3:5f:03:9d:1a:f6:1c:b3:78: 8a:c1:0a:8c:ee:f1:e8:e0:b1:bd:9e:59:f8:6e:14:8d: ea:9d:5a:00:60:c3:f3:9d:aa:b6:49:c3:c4:27:69:b5: 7c:41:bb:30:93:b8:3e:96:99:5b:0b:0e:03:22:b1:94: 6f:e6:c5:db:5d:06:59:50:c7:55:fa:d5:0f:c4:b3:34: f2:c9:75:23:35:db:84:0f:e4:bf:cd:87:f9:5b:a0:e7: 39:c8:a1:1f:17:c6:ed:ba:38:83:6f:31:4d:0a:65:c7: e1:0c:fc:60:fa:f7:17:13:35:bf:fc:ed:65:52:e9:39: 15:da:93:e7:88:1d:5f:1e:cc:da:e2:a4:d5:cd:e6:f7: b5:90:9a:06:54:9a:96:3d:47:63:39:36:cf:09:79:ae: d6:44:bd:eb:cc:41:72:f0:62:82:69:0b:0b:10:b5:f2: c1:ca:e3:49:32:65:e4:71:29:5d:8e:06:6a:95:cd:32: c8:3e:26:f9:72:64:be:b7:31:49:6c:be:40:d9:29:32: b9:e4:cf:5d:24:50:ef:a5:49:4b:17:fb:e0:c1:46:0c: d8:47:af:89:79:02:54:d3:15:92:d7:da:22:17:22:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bd:de:34:9a:a9:95:0f:2b:5f:83:b9:6b:11:69:57:bd: b8:c1:60:e5:20:b3:48:f9:a7:08:1a:b9:78:fd:95:88: 06:e2:66:5b:5d:c4:8d:5f:17:ea:99:6c:e6:dc:9a:c8: da:17:f7:38:30:d9:61:e0:de:4b:8f:34:42:16:d8:6a: 77:8c:a9:9d:cd:53:e9:de:f1:94:16:27:cc:8e:f8:d5: 81:0e:d5:91:ed:dd:1a:54:34:1b:55:ba:2a:54:11:c8: 8f:94:c4:81:bb:14:41:e2:fe:2d:6f:9a:d2:23:0d:d0: 8c:14:06:9f:c8:97:32:60:71:31:cd:eb:45:6d:9a:8b: a1:dc:a4:cb:03:71:3a:5b:ce:03:22:08:63:e8:1c:fb: b8:ee:84:b8:8d:c6:e0:34:b0:3f:4f:2c:60:c6:fa:72: 3e:91:04:c1:8f:18:f1:9f:37:1c:ef:fd:5b:5e:c1:6d: 3f:a0:93:0b:0b:6e:f8:f9:0f:8a:f9:7a:a5:cb:46:47: 5e:2a:c8:36:2a:ba:69:8a:0f:3c:29:4b:80:af:86:4c: aa:2d:b1:b0:60:21:24:8d:8e:26:26:ac:8f:46:6e:52: 7d:95:fc:22:4a:63:ae:63:93:73:2f:85:97:23:55:4c: 2e:d3:69:a6:87:59:88:52:c6:60:d5:2e:44:92:e4:f9 Fingerprint (SHA-256): DF:E1:C7:17:A0:DF:C4:1D:2A:00:95:C3:6D:4B:BA:32:33:32:DB:DF:DC:6A:5C:7E:DD:39:C4:12:41:CF:1F:D1 Fingerprint (SHA1): BB:37:DD:C4:89:F8:9D:E8:45:7F:D5:48:5B:0B:84:68:77:53:C9:45 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #9348: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #9349: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #9350: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #9351: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153956 (0x6724c64) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 21:07:59 2016 Not After : Fri Jan 08 21:07:59 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:92:02:ab:81:9c:56:f2:6c:41:1f:26:20:04:d9:96: ab:08:4e:18:e2:06:1a:ac:ac:f8:f4:98:40:6a:53:2f: 72:2e:11:2a:9e:b2:98:dd:42:7f:50:51:f1:84:8f:16: 0b:3e:f1:2d:08:99:22:93:c1:51:80:55:be:18:95:50: a2:50:50:76:27:2b:9b:ac:f3:81:08:12:aa:77:63:72: b1:5c:68:d7:c4:02:a8:2b:b6:ae:ee:16:a2:0c:70:a7: 09:c7:81:6a:94:5f:63:2c:9d:a0:bd:0d:e9:56:bd:d2: 68:0f:c7:f8:86:8f:40:52:3c:f3:c5:44:9c:9d:d8:1a: a3:11:29:61:66:8a:0a:20:8e:5d:32:71:a6:0f:6b:ec: 63:cb:68:3d:d6:8f:8d:01:e2:ae:91:2e:36:c5:c5:ec: 00:49:24:7a:a8:f6:97:86:19:c8:e8:24:a0:c9:ce:e6: 26:f6:2b:9d:2e:11:56:a0:6a:95:9e:9d:88:52:e5:8b: 46:53:7b:82:0f:1b:56:1c:db:e9:cf:59:b3:2c:5b:b4: 34:e9:ab:56:26:fc:6a:96:80:ec:08:da:c6:46:04:a5: 42:4c:b9:9d:f2:41:50:88:2a:2d:fe:ca:d9:72:8f:3c: 43:c9:e2:8a:f7:9f:4b:40:f0:2c:93:ab:24:df:82:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:60:23:f8:28:c4:c8:f8:8c:2e:74:8f:ba:74:02:97: 5f:f3:5f:92:c7:e4:bf:03:83:c1:58:9d:ed:3d:db:fc: 90:93:91:ec:46:b9:39:8c:5a:9d:98:da:8b:c8:53:58: 90:e4:01:3a:a1:4e:0e:ae:2c:f0:60:81:47:c6:86:cc: 73:52:47:fc:cf:63:d3:35:da:ef:1f:0f:07:9f:23:f3: e1:b3:c6:93:ab:e2:07:d8:62:7e:a9:b1:74:29:c2:1e: 53:54:19:3e:c3:3d:13:6d:ea:7c:e5:46:7c:4f:36:bd: 81:62:26:c4:95:b2:65:39:3c:c5:ee:2a:91:72:ee:dd: 93:83:f2:09:65:16:63:7a:72:e0:c8:73:b4:c5:8c:90: 1c:ce:27:76:4d:64:ab:0b:68:66:e3:73:b0:03:c5:02: 7f:88:f2:99:a6:7b:97:15:ef:2e:26:e2:d2:d5:80:6f: 12:1f:0a:e0:c6:f8:b7:c4:3a:87:45:1a:a5:00:f9:65: 89:6d:eb:3d:a3:75:82:0c:8e:97:0c:7a:f0:f9:c7:c3: 5b:9f:d0:f9:b4:82:27:4b:28:bc:30:b1:06:28:06:ba: ab:5c:98:05:c2:0c:87:a6:98:2c:b5:e4:d4:36:0f:c7: e0:e6:c7:43:6f:7f:33:ff:d0:b3:ff:01:2d:50:df:7a Fingerprint (SHA-256): 3C:F0:72:36:A2:50:49:BE:31:3F:38:8D:7F:7A:97:AE:22:2B:08:91:5A:07:11:23:6D:6B:6E:4A:1F:D4:8E:3E Fingerprint (SHA1): 34:4D:49:ED:3D:05:58:BE:3C:8B:D7:C7:60:8C:04:61:10:8D:B9:27 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9352: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153960 (0x6724c68) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Jan 08 21:08:33 2016 Not After : Fri Jan 08 21:08:33 2066 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:18:0b:11:fa:6b:72:b1:80:eb:00:e8:3c:24:fe:90: 29:42:ea:fa:12:df:76:5c:97:34:f8:dd:5b:6a:b9:97: 9a:04:82:50:1b:84:ef:5a:25:c9:8d:04:e2:df:27:aa: c7:9b:ae:47:3b:82:5d:12:5b:10:ec:2a:c8:17:d6:db: 91:90:07:b2:11:4f:d6:e8:2a:4a:12:b6:5b:33:e4:54: 3a:e1:97:bd:ca:aa:dd:10:18:48:f5:74:10:97:5a:69: 26:3a:00:15:35:1e:e7:58:db:6d:84:c2:14:4f:22:4c: af:e4:cf:3e:cf:ba:b4:29:65:a7:83:77:1f:4c:b1:0f: 79:8f:01:0a:dc:31:3b:fa:4a:c6:e9:d5:3a:98:47:f3: 8d:68:d6:7d:e6:06:16:0a:3f:e9:93:c4:2f:87:e3:55: 7c:b2:23:21:ad:2c:98:c2:8c:fc:62:1b:71:90:df:bf: 61:22:ae:c9:82:6b:27:f4:3b:ef:27:c2:84:ae:ee:8e: 2d:f0:be:8b:09:ec:ff:96:ca:0d:cb:3d:54:be:66:c2: 6f:05:91:a8:5d:f8:b3:3b:56:e0:99:6d:63:a6:19:91: 8c:2f:b4:4b:95:f5:ca:af:9e:dd:b9:e8:34:65:ff:3a: a0:92:1d:4d:4b:ec:46:d0:65:d4:5c:cc:8f:5b:3e:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 86:21:8e:95:2c:e5:bb:e9:3f:f8:3f:61:7c:ca:be:bd: 94:3a:19:c9:59:fd:60:6c:64:7a:6e:cb:d7:45:f5:9a: 7e:30:8d:12:c1:d2:28:39:c0:a6:a0:3c:94:3b:fb:38: 5b:70:86:d8:9a:50:8f:d7:dd:01:21:f3:78:d3:46:ca: 35:16:c0:5a:04:23:22:50:24:4c:8d:d7:01:1b:b3:ff: 5c:22:31:a8:f8:fa:33:2c:b3:fd:e0:6f:a2:e6:f1:a9: a6:5a:64:91:74:88:26:de:14:36:a5:fe:5e:d5:54:79: 23:1c:5f:76:37:04:42:d6:16:8d:af:35:62:cf:69:ae: 24:97:39:fa:00:42:c4:eb:ea:20:8b:5b:c3:57:31:1d: 16:b7:fa:2c:2d:05:b9:1c:37:a8:71:7a:d8:95:9c:90: 60:5a:bb:e4:8b:82:1b:93:6f:64:e6:a4:0a:46:2f:78: 7c:c2:48:2e:71:0d:c6:51:b0:70:24:ca:72:ed:a2:4a: fc:27:30:a1:87:08:0d:21:09:b3:6c:78:ef:06:db:82: 41:78:cf:12:39:94:48:60:59:bb:08:c3:a3:b6:6c:3f: 48:39:21:82:f8:6f:5e:86:24:cf:07:73:71:81:da:62: c7:d6:43:19:e3:22:89:e0:c6:8f:2c:f2:fc:8b:3e:0b Fingerprint (SHA-256): 77:D9:27:81:D4:7F:26:0B:AA:98:C4:7B:C5:F9:F7:E7:E4:8A:B3:FE:95:9A:09:BD:6A:AF:85:37:0E:09:00:77 Fingerprint (SHA1): E3:34:3F:A0:32:0D:17:4E:E2:0B:3F:82:23:18:00:1A:34:64:50:6A Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #9353: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153956 (0x6724c64) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 21:07:59 2016 Not After : Fri Jan 08 21:07:59 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:92:02:ab:81:9c:56:f2:6c:41:1f:26:20:04:d9:96: ab:08:4e:18:e2:06:1a:ac:ac:f8:f4:98:40:6a:53:2f: 72:2e:11:2a:9e:b2:98:dd:42:7f:50:51:f1:84:8f:16: 0b:3e:f1:2d:08:99:22:93:c1:51:80:55:be:18:95:50: a2:50:50:76:27:2b:9b:ac:f3:81:08:12:aa:77:63:72: b1:5c:68:d7:c4:02:a8:2b:b6:ae:ee:16:a2:0c:70:a7: 09:c7:81:6a:94:5f:63:2c:9d:a0:bd:0d:e9:56:bd:d2: 68:0f:c7:f8:86:8f:40:52:3c:f3:c5:44:9c:9d:d8:1a: a3:11:29:61:66:8a:0a:20:8e:5d:32:71:a6:0f:6b:ec: 63:cb:68:3d:d6:8f:8d:01:e2:ae:91:2e:36:c5:c5:ec: 00:49:24:7a:a8:f6:97:86:19:c8:e8:24:a0:c9:ce:e6: 26:f6:2b:9d:2e:11:56:a0:6a:95:9e:9d:88:52:e5:8b: 46:53:7b:82:0f:1b:56:1c:db:e9:cf:59:b3:2c:5b:b4: 34:e9:ab:56:26:fc:6a:96:80:ec:08:da:c6:46:04:a5: 42:4c:b9:9d:f2:41:50:88:2a:2d:fe:ca:d9:72:8f:3c: 43:c9:e2:8a:f7:9f:4b:40:f0:2c:93:ab:24:df:82:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:60:23:f8:28:c4:c8:f8:8c:2e:74:8f:ba:74:02:97: 5f:f3:5f:92:c7:e4:bf:03:83:c1:58:9d:ed:3d:db:fc: 90:93:91:ec:46:b9:39:8c:5a:9d:98:da:8b:c8:53:58: 90:e4:01:3a:a1:4e:0e:ae:2c:f0:60:81:47:c6:86:cc: 73:52:47:fc:cf:63:d3:35:da:ef:1f:0f:07:9f:23:f3: e1:b3:c6:93:ab:e2:07:d8:62:7e:a9:b1:74:29:c2:1e: 53:54:19:3e:c3:3d:13:6d:ea:7c:e5:46:7c:4f:36:bd: 81:62:26:c4:95:b2:65:39:3c:c5:ee:2a:91:72:ee:dd: 93:83:f2:09:65:16:63:7a:72:e0:c8:73:b4:c5:8c:90: 1c:ce:27:76:4d:64:ab:0b:68:66:e3:73:b0:03:c5:02: 7f:88:f2:99:a6:7b:97:15:ef:2e:26:e2:d2:d5:80:6f: 12:1f:0a:e0:c6:f8:b7:c4:3a:87:45:1a:a5:00:f9:65: 89:6d:eb:3d:a3:75:82:0c:8e:97:0c:7a:f0:f9:c7:c3: 5b:9f:d0:f9:b4:82:27:4b:28:bc:30:b1:06:28:06:ba: ab:5c:98:05:c2:0c:87:a6:98:2c:b5:e4:d4:36:0f:c7: e0:e6:c7:43:6f:7f:33:ff:d0:b3:ff:01:2d:50:df:7a Fingerprint (SHA-256): 3C:F0:72:36:A2:50:49:BE:31:3F:38:8D:7F:7A:97:AE:22:2B:08:91:5A:07:11:23:6D:6B:6E:4A:1F:D4:8E:3E Fingerprint (SHA1): 34:4D:49:ED:3D:05:58:BE:3C:8B:D7:C7:60:8C:04:61:10:8D:B9:27 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9354: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #9355: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #9356: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #9357: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #9358: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #9359: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153961 (0x6724c69) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Jan 08 21:08:41 2016 Not After : Fri Jan 08 21:08:41 2021 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:0d:01:75:f5:99:d5:14:1b:c4:85:8e:58:12:82:ad: aa:80:38:64:8a:c1:36:08:69:a2:f5:b7:07:d6:3c:51: b7:3f:8d:66:6a:8d:14:b9:c8:b7:b1:a6:6b:c6:9a:9c: a1:bb:ff:5b:26:66:ec:af:ad:4f:cb:e7:53:cd:aa:70: d6:f9:d8:45:ca:83:05:ba:7e:31:49:3c:60:28:89:c6: 4f:d4:eb:67:51:99:08:ba:de:1e:41:71:88:02:5a:ec: 83:2a:51:8a:26:56:d1:38:04:a4:0e:34:00:6c:27:84: 02:0a:8d:9c:95:d5:5a:1e:23:de:f2:a3:97:49:a8:b8: 6d:6b:36:d2:86:07:bd:6c:24:e2:61:fe:30:d1:e0:b9: 16:4c:54:f8:52:b1:39:31:0e:43:67:7e:56:18:d6:d2: a2:b9:33:ed:74:e5:e2:5f:82:53:f5:58:b6:15:67:a1: bc:31:52:7d:02:f8:1b:5b:fc:81:7b:a2:d9:e8:26:a8: 20:2b:78:7d:6d:53:a4:d5:52:bd:92:dd:33:a3:c4:d5: ab:16:06:5a:06:08:23:13:7e:97:ef:a3:db:0d:45:95: 12:3d:a9:18:37:30:f0:23:d4:f6:03:a6:2b:aa:be:d0: d5:0d:03:39:f4:48:84:9c:33:a8:aa:ee:34:c2:b0:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:b8:a3:fb:72:32:95:9e:11:1c:07:6e:0c:f5:7f:ba: 1d:55:41:d4:a1:99:75:9b:a9:38:65:90:de:8b:a4:71: 14:46:12:23:44:26:19:c8:d6:42:1a:f8:5e:6a:dc:35: 25:f6:d0:01:a0:de:6e:50:90:70:8c:f3:06:a1:78:93: 25:00:a9:10:1b:5f:af:24:76:8f:1c:9e:d6:b5:a9:32: e7:b3:ab:e7:4c:41:d6:1b:53:fe:0a:d2:1f:88:e9:56: 47:f1:24:ef:e4:92:0d:bf:4a:9e:10:1c:c6:b0:d9:d6: 73:fc:6a:63:fc:f9:04:15:e2:36:5b:10:e4:54:9d:64: ad:f2:43:3f:fc:0b:84:bf:48:4f:93:2a:8a:29:79:cf: ac:64:2a:fd:ca:f3:d5:d0:22:92:c0:57:a4:53:81:19: 87:c9:b3:30:af:04:d6:91:88:7d:df:95:7b:c5:ab:a0: 95:55:24:9d:10:7c:c4:0b:4c:f7:3b:63:8d:8f:b7:db: ff:dd:b3:4e:6f:46:6e:cc:2d:d9:6c:fa:e6:a5:56:e1: a8:d7:73:05:fd:d4:84:f0:5e:01:e5:16:9c:fe:8f:82: 17:db:eb:27:93:e9:75:4c:3d:3e:b4:e2:2b:42:62:e6: 45:aa:bb:81:49:d3:00:03:f4:01:f7:b9:d0:e7:95:9d Fingerprint (SHA-256): 92:C1:C3:5A:73:22:E5:38:AB:DA:F0:CD:3B:8C:98:16:C3:96:90:D6:92:F9:9E:7E:69:89:51:4D:0F:63:C8:B0 Fingerprint (SHA1): A4:47:31:50:4E:6B:07:09:4D:FA:B2:37:DA:ED:79:B5:D8:A3:C8:AD Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #9360: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #9361: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #9362: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #9363: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #9364: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #9365: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #9366: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #9367: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #9368: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #9369: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #9370: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #9371: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #9372: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #9373: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #9374: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #9375: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #9376: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #9377: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #9378: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #9379: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #9380: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #9381: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #9382: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #9383: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED trying to kill httpserv with PID 29083 at Fri Jan 8 16:09:15 EST 2016 kill -USR1 29083 httpserv: normal termination httpserv -b -p 9169 2>/dev/null; httpserv with PID 29083 killed at Fri Jan 8 16:09:16 EST 2016 httpserv starting at Fri Jan 8 16:09:16 EST 2016 httpserv -D -p 9169 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O get-unknown -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/aiahttp/http_pid.27064 & trying to connect to httpserv at Fri Jan 8 16:09:16 EST 2016 tstclnt -p 9169 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to httpserv at Fri Jan 8 16:09:21 EST 2016 tstclnt -p 9169 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #9384: Waiting for Server - FAILED kill -0 12209 >/dev/null 2>/dev/null httpserv with PID 12209 found at Fri Jan 8 16:09:22 EST 2016 httpserv with PID 12209 started at Fri Jan 8 16:09:22 EST 2016 chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #9385: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153963 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9386: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #9387: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #9388: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153964 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9389: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #9390: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #9391: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9392: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108153965 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9393: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9394: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108153966 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9395: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9396: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #9397: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #9398: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9399: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 108153967 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9400: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9401: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #9402: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #9403: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #9404: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153964 (0x6724c6c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 21:09:34 2016 Not After : Fri Jan 08 21:09:34 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:ef:09:20:c0:60:6c:3e:e1:0f:e0:e4:5e:6a:7f:a8: c8:ef:44:a2:be:6b:f9:46:60:6f:79:d3:b1:d8:53:3e: fa:80:11:53:2f:5c:37:e2:ff:3a:14:2f:03:9e:60:3e: 1b:e7:41:ef:af:44:5b:83:05:4b:b9:16:f8:4a:e4:5f: c3:66:df:10:d4:c9:9f:8c:b8:fe:ab:1f:28:7e:e4:e7: ec:b7:4d:1b:fc:2a:89:d8:c3:5d:fb:cc:58:ce:e1:ac: 62:2b:1f:2c:4d:e6:d4:d1:d1:46:1d:77:3c:4a:fb:9c: a5:2d:61:04:11:41:ae:83:96:98:fb:53:a9:cf:45:e9: 8a:11:17:9a:f9:e8:40:bc:39:c1:ad:42:84:4a:6b:ed: b8:0c:0e:a7:ff:67:1a:69:bd:1c:58:ed:e6:6a:e2:d5: 34:96:98:42:e7:83:cc:e8:d7:34:96:0e:85:fd:42:25: d3:84:19:6c:75:09:e5:7f:ff:97:19:a3:87:6e:b1:4a: 27:7c:3f:46:3e:ec:13:1b:d3:0f:13:61:a4:55:d0:f0: 1e:f4:7c:b4:bd:06:03:ca:f7:02:d9:c4:f0:2c:38:ed: a3:c3:08:df:25:e6:57:1f:9c:b1:19:04:ff:8c:35:3c: 61:c8:05:b2:0f:d4:5a:a8:57:62:d1:55:06:96:73:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:d3:b0:7b:21:5a:d9:12:8d:3b:48:fd:a8:0a:b0:f1: 38:12:59:90:68:93:6d:99:73:4a:cd:d5:04:71:4a:77: 48:58:8a:63:d6:84:d3:27:89:c5:30:e9:2e:a0:dd:18: 4a:94:43:e4:e0:fd:8f:3f:d3:2c:7b:ac:fb:73:71:6d: c9:c9:88:01:50:89:51:7a:b8:67:6a:3c:13:51:10:e2: 24:65:f1:71:a5:3a:4c:bf:18:a0:82:9c:ed:f9:53:20: 0f:a2:31:dc:45:31:3d:a0:7d:fd:f4:a2:73:f0:9f:76: ad:41:23:b3:0f:8d:16:04:c0:f9:f5:90:ed:07:dd:b1: f0:e9:0d:ab:18:b6:e7:12:33:57:70:7e:db:43:1b:94: 0d:76:74:53:cb:24:f5:fe:e5:a2:10:21:6c:4d:35:df: 94:5b:89:46:a2:60:6e:3c:34:81:05:4a:c8:cc:96:a2: e9:22:b4:4a:84:69:3a:b2:e1:38:e5:e8:c4:aa:0c:e0: ca:24:44:f7:38:74:92:4f:14:b0:4c:bc:a0:38:09:cb: 0c:7f:02:f0:25:95:45:a2:cf:7b:9e:65:03:47:fd:5d: e8:00:15:10:e0:7b:1b:11:25:1a:68:22:46:54:5a:66: 8f:79:ef:70:3d:93:94:41:1d:20:6f:bd:e6:6c:dc:de Fingerprint (SHA-256): 96:8F:B6:22:A4:02:E3:5B:A9:5D:1B:B9:37:64:C7:99:5F:03:98:32:3E:8D:34:74:AD:5B:F2:B1:40:32:34:C3 Fingerprint (SHA1): 9E:53:11:8E:6A:73:52:34:84:E2:85:37:C5:9B:E5:CE:98:19:90:10 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9405: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153963 (0x6724c6b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 21:09:24 2016 Not After : Fri Jan 08 21:09:24 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:ee:75:53:54:aa:1d:6e:92:4a:03:e6:90:33:1d:c0: 2b:17:ac:22:64:1f:dc:ca:95:ef:29:3e:83:db:59:f2: 63:d7:4e:1b:1f:f2:45:b5:9b:6a:02:5d:90:72:49:56: c3:78:d7:98:29:87:7b:2f:d2:a9:d4:ed:2f:5f:02:35: 42:cc:e6:e2:30:c2:9d:4e:93:9c:41:ea:ce:06:3d:d1: 12:f5:40:00:a8:10:94:7c:cd:10:f0:13:d4:3a:6b:af: 83:9f:52:f9:83:da:db:1f:cf:5e:1b:16:c9:10:53:6a: bc:a6:14:37:25:25:bc:63:9f:4a:1d:61:8f:58:62:6c: 0d:97:1f:e4:ce:a0:15:8c:c2:68:c9:c0:f7:bf:2f:87: 95:a1:ad:b1:f4:66:23:6d:67:c8:f6:62:6b:9b:52:e6: 66:08:c7:6a:3a:70:a2:5a:37:cd:71:50:f9:13:e0:da: 4b:2e:be:1f:41:2d:2a:dd:f6:fc:e9:0d:93:64:b1:68: 90:6f:ea:a7:72:16:16:60:29:e2:e4:ec:da:52:91:c4: 59:1c:6d:2d:c9:98:9f:5b:87:76:24:d6:5c:2e:06:0f: 56:36:2b:02:95:b5:c7:e2:a1:46:ab:04:ce:4a:f7:dc: 76:cc:59:b7:29:60:c6:98:61:b6:1f:ab:1d:78:b6:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 81:f0:3c:9e:4d:92:71:14:d6:ba:0a:20:5f:55:25:a3: 1d:19:f1:9e:99:bc:cb:c0:73:1a:b6:41:ce:3b:d1:4c: 66:f8:d8:30:2f:42:1c:9f:5c:f9:b6:2d:fc:ca:d6:9f: a5:89:b9:61:05:73:b3:cb:f5:f9:6b:4f:55:bd:dd:39: 16:42:21:52:f9:3a:ed:9c:41:2f:cc:73:15:1e:57:05: 83:08:35:8a:cd:9d:70:e4:2b:23:88:e9:fc:83:83:bc: cd:36:31:9a:80:98:66:d7:63:a4:5d:88:7d:a6:4c:55: 02:f6:64:b3:0c:ef:a5:cf:85:a5:31:30:0d:b2:39:d9: c6:90:50:f6:94:4f:93:cd:ab:62:be:34:71:47:67:88: 5d:8e:84:01:a0:7b:7b:8a:8a:ef:92:fc:09:84:db:fb: 7e:34:35:24:d6:dc:4b:59:c6:1a:95:f4:76:2b:8a:42: 32:20:c5:e9:a8:f6:05:31:61:ab:51:e3:7b:32:c0:f6: 6a:a1:8a:f4:77:4e:de:8d:47:4f:70:04:c4:c5:ec:7b: 4a:ab:8c:d7:68:54:df:05:be:8e:99:6a:46:e1:61:eb: 73:fc:fd:0b:be:15:7c:0f:ea:7c:2f:ea:28:36:6a:bd: de:cb:f2:35:c1:52:a5:7b:98:ba:c2:68:7c:3e:2c:dd Fingerprint (SHA-256): 24:30:AA:0E:8C:AD:F6:34:EB:10:3B:DD:C2:D3:9D:F6:2F:7B:7A:0F:0C:28:08:0D:30:4B:59:50:C6:07:6E:A6 Fingerprint (SHA1): 97:88:F3:0B:A3:64:39:EA:7E:A1:BB:1D:DC:51:3C:B8:56:2A:92:6A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9406: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #9407: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #9408: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #9409: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153963 (0x6724c6b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 21:09:24 2016 Not After : Fri Jan 08 21:09:24 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:ee:75:53:54:aa:1d:6e:92:4a:03:e6:90:33:1d:c0: 2b:17:ac:22:64:1f:dc:ca:95:ef:29:3e:83:db:59:f2: 63:d7:4e:1b:1f:f2:45:b5:9b:6a:02:5d:90:72:49:56: c3:78:d7:98:29:87:7b:2f:d2:a9:d4:ed:2f:5f:02:35: 42:cc:e6:e2:30:c2:9d:4e:93:9c:41:ea:ce:06:3d:d1: 12:f5:40:00:a8:10:94:7c:cd:10:f0:13:d4:3a:6b:af: 83:9f:52:f9:83:da:db:1f:cf:5e:1b:16:c9:10:53:6a: bc:a6:14:37:25:25:bc:63:9f:4a:1d:61:8f:58:62:6c: 0d:97:1f:e4:ce:a0:15:8c:c2:68:c9:c0:f7:bf:2f:87: 95:a1:ad:b1:f4:66:23:6d:67:c8:f6:62:6b:9b:52:e6: 66:08:c7:6a:3a:70:a2:5a:37:cd:71:50:f9:13:e0:da: 4b:2e:be:1f:41:2d:2a:dd:f6:fc:e9:0d:93:64:b1:68: 90:6f:ea:a7:72:16:16:60:29:e2:e4:ec:da:52:91:c4: 59:1c:6d:2d:c9:98:9f:5b:87:76:24:d6:5c:2e:06:0f: 56:36:2b:02:95:b5:c7:e2:a1:46:ab:04:ce:4a:f7:dc: 76:cc:59:b7:29:60:c6:98:61:b6:1f:ab:1d:78:b6:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 81:f0:3c:9e:4d:92:71:14:d6:ba:0a:20:5f:55:25:a3: 1d:19:f1:9e:99:bc:cb:c0:73:1a:b6:41:ce:3b:d1:4c: 66:f8:d8:30:2f:42:1c:9f:5c:f9:b6:2d:fc:ca:d6:9f: a5:89:b9:61:05:73:b3:cb:f5:f9:6b:4f:55:bd:dd:39: 16:42:21:52:f9:3a:ed:9c:41:2f:cc:73:15:1e:57:05: 83:08:35:8a:cd:9d:70:e4:2b:23:88:e9:fc:83:83:bc: cd:36:31:9a:80:98:66:d7:63:a4:5d:88:7d:a6:4c:55: 02:f6:64:b3:0c:ef:a5:cf:85:a5:31:30:0d:b2:39:d9: c6:90:50:f6:94:4f:93:cd:ab:62:be:34:71:47:67:88: 5d:8e:84:01:a0:7b:7b:8a:8a:ef:92:fc:09:84:db:fb: 7e:34:35:24:d6:dc:4b:59:c6:1a:95:f4:76:2b:8a:42: 32:20:c5:e9:a8:f6:05:31:61:ab:51:e3:7b:32:c0:f6: 6a:a1:8a:f4:77:4e:de:8d:47:4f:70:04:c4:c5:ec:7b: 4a:ab:8c:d7:68:54:df:05:be:8e:99:6a:46:e1:61:eb: 73:fc:fd:0b:be:15:7c:0f:ea:7c:2f:ea:28:36:6a:bd: de:cb:f2:35:c1:52:a5:7b:98:ba:c2:68:7c:3e:2c:dd Fingerprint (SHA-256): 24:30:AA:0E:8C:AD:F6:34:EB:10:3B:DD:C2:D3:9D:F6:2F:7B:7A:0F:0C:28:08:0D:30:4B:59:50:C6:07:6E:A6 Fingerprint (SHA1): 97:88:F3:0B:A3:64:39:EA:7E:A1:BB:1D:DC:51:3C:B8:56:2A:92:6A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9410: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153964 (0x6724c6c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 21:09:34 2016 Not After : Fri Jan 08 21:09:34 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:ef:09:20:c0:60:6c:3e:e1:0f:e0:e4:5e:6a:7f:a8: c8:ef:44:a2:be:6b:f9:46:60:6f:79:d3:b1:d8:53:3e: fa:80:11:53:2f:5c:37:e2:ff:3a:14:2f:03:9e:60:3e: 1b:e7:41:ef:af:44:5b:83:05:4b:b9:16:f8:4a:e4:5f: c3:66:df:10:d4:c9:9f:8c:b8:fe:ab:1f:28:7e:e4:e7: ec:b7:4d:1b:fc:2a:89:d8:c3:5d:fb:cc:58:ce:e1:ac: 62:2b:1f:2c:4d:e6:d4:d1:d1:46:1d:77:3c:4a:fb:9c: a5:2d:61:04:11:41:ae:83:96:98:fb:53:a9:cf:45:e9: 8a:11:17:9a:f9:e8:40:bc:39:c1:ad:42:84:4a:6b:ed: b8:0c:0e:a7:ff:67:1a:69:bd:1c:58:ed:e6:6a:e2:d5: 34:96:98:42:e7:83:cc:e8:d7:34:96:0e:85:fd:42:25: d3:84:19:6c:75:09:e5:7f:ff:97:19:a3:87:6e:b1:4a: 27:7c:3f:46:3e:ec:13:1b:d3:0f:13:61:a4:55:d0:f0: 1e:f4:7c:b4:bd:06:03:ca:f7:02:d9:c4:f0:2c:38:ed: a3:c3:08:df:25:e6:57:1f:9c:b1:19:04:ff:8c:35:3c: 61:c8:05:b2:0f:d4:5a:a8:57:62:d1:55:06:96:73:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:d3:b0:7b:21:5a:d9:12:8d:3b:48:fd:a8:0a:b0:f1: 38:12:59:90:68:93:6d:99:73:4a:cd:d5:04:71:4a:77: 48:58:8a:63:d6:84:d3:27:89:c5:30:e9:2e:a0:dd:18: 4a:94:43:e4:e0:fd:8f:3f:d3:2c:7b:ac:fb:73:71:6d: c9:c9:88:01:50:89:51:7a:b8:67:6a:3c:13:51:10:e2: 24:65:f1:71:a5:3a:4c:bf:18:a0:82:9c:ed:f9:53:20: 0f:a2:31:dc:45:31:3d:a0:7d:fd:f4:a2:73:f0:9f:76: ad:41:23:b3:0f:8d:16:04:c0:f9:f5:90:ed:07:dd:b1: f0:e9:0d:ab:18:b6:e7:12:33:57:70:7e:db:43:1b:94: 0d:76:74:53:cb:24:f5:fe:e5:a2:10:21:6c:4d:35:df: 94:5b:89:46:a2:60:6e:3c:34:81:05:4a:c8:cc:96:a2: e9:22:b4:4a:84:69:3a:b2:e1:38:e5:e8:c4:aa:0c:e0: ca:24:44:f7:38:74:92:4f:14:b0:4c:bc:a0:38:09:cb: 0c:7f:02:f0:25:95:45:a2:cf:7b:9e:65:03:47:fd:5d: e8:00:15:10:e0:7b:1b:11:25:1a:68:22:46:54:5a:66: 8f:79:ef:70:3d:93:94:41:1d:20:6f:bd:e6:6c:dc:de Fingerprint (SHA-256): 96:8F:B6:22:A4:02:E3:5B:A9:5D:1B:B9:37:64:C7:99:5F:03:98:32:3E:8D:34:74:AD:5B:F2:B1:40:32:34:C3 Fingerprint (SHA1): 9E:53:11:8E:6A:73:52:34:84:E2:85:37:C5:9B:E5:CE:98:19:90:10 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9411: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #9412: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #9413: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #9414: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #9415: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #9416: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153964 (0x6724c6c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 21:09:34 2016 Not After : Fri Jan 08 21:09:34 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:ef:09:20:c0:60:6c:3e:e1:0f:e0:e4:5e:6a:7f:a8: c8:ef:44:a2:be:6b:f9:46:60:6f:79:d3:b1:d8:53:3e: fa:80:11:53:2f:5c:37:e2:ff:3a:14:2f:03:9e:60:3e: 1b:e7:41:ef:af:44:5b:83:05:4b:b9:16:f8:4a:e4:5f: c3:66:df:10:d4:c9:9f:8c:b8:fe:ab:1f:28:7e:e4:e7: ec:b7:4d:1b:fc:2a:89:d8:c3:5d:fb:cc:58:ce:e1:ac: 62:2b:1f:2c:4d:e6:d4:d1:d1:46:1d:77:3c:4a:fb:9c: a5:2d:61:04:11:41:ae:83:96:98:fb:53:a9:cf:45:e9: 8a:11:17:9a:f9:e8:40:bc:39:c1:ad:42:84:4a:6b:ed: b8:0c:0e:a7:ff:67:1a:69:bd:1c:58:ed:e6:6a:e2:d5: 34:96:98:42:e7:83:cc:e8:d7:34:96:0e:85:fd:42:25: d3:84:19:6c:75:09:e5:7f:ff:97:19:a3:87:6e:b1:4a: 27:7c:3f:46:3e:ec:13:1b:d3:0f:13:61:a4:55:d0:f0: 1e:f4:7c:b4:bd:06:03:ca:f7:02:d9:c4:f0:2c:38:ed: a3:c3:08:df:25:e6:57:1f:9c:b1:19:04:ff:8c:35:3c: 61:c8:05:b2:0f:d4:5a:a8:57:62:d1:55:06:96:73:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:d3:b0:7b:21:5a:d9:12:8d:3b:48:fd:a8:0a:b0:f1: 38:12:59:90:68:93:6d:99:73:4a:cd:d5:04:71:4a:77: 48:58:8a:63:d6:84:d3:27:89:c5:30:e9:2e:a0:dd:18: 4a:94:43:e4:e0:fd:8f:3f:d3:2c:7b:ac:fb:73:71:6d: c9:c9:88:01:50:89:51:7a:b8:67:6a:3c:13:51:10:e2: 24:65:f1:71:a5:3a:4c:bf:18:a0:82:9c:ed:f9:53:20: 0f:a2:31:dc:45:31:3d:a0:7d:fd:f4:a2:73:f0:9f:76: ad:41:23:b3:0f:8d:16:04:c0:f9:f5:90:ed:07:dd:b1: f0:e9:0d:ab:18:b6:e7:12:33:57:70:7e:db:43:1b:94: 0d:76:74:53:cb:24:f5:fe:e5:a2:10:21:6c:4d:35:df: 94:5b:89:46:a2:60:6e:3c:34:81:05:4a:c8:cc:96:a2: e9:22:b4:4a:84:69:3a:b2:e1:38:e5:e8:c4:aa:0c:e0: ca:24:44:f7:38:74:92:4f:14:b0:4c:bc:a0:38:09:cb: 0c:7f:02:f0:25:95:45:a2:cf:7b:9e:65:03:47:fd:5d: e8:00:15:10:e0:7b:1b:11:25:1a:68:22:46:54:5a:66: 8f:79:ef:70:3d:93:94:41:1d:20:6f:bd:e6:6c:dc:de Fingerprint (SHA-256): 96:8F:B6:22:A4:02:E3:5B:A9:5D:1B:B9:37:64:C7:99:5F:03:98:32:3E:8D:34:74:AD:5B:F2:B1:40:32:34:C3 Fingerprint (SHA1): 9E:53:11:8E:6A:73:52:34:84:E2:85:37:C5:9B:E5:CE:98:19:90:10 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9417: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153964 (0x6724c6c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 21:09:34 2016 Not After : Fri Jan 08 21:09:34 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:ef:09:20:c0:60:6c:3e:e1:0f:e0:e4:5e:6a:7f:a8: c8:ef:44:a2:be:6b:f9:46:60:6f:79:d3:b1:d8:53:3e: fa:80:11:53:2f:5c:37:e2:ff:3a:14:2f:03:9e:60:3e: 1b:e7:41:ef:af:44:5b:83:05:4b:b9:16:f8:4a:e4:5f: c3:66:df:10:d4:c9:9f:8c:b8:fe:ab:1f:28:7e:e4:e7: ec:b7:4d:1b:fc:2a:89:d8:c3:5d:fb:cc:58:ce:e1:ac: 62:2b:1f:2c:4d:e6:d4:d1:d1:46:1d:77:3c:4a:fb:9c: a5:2d:61:04:11:41:ae:83:96:98:fb:53:a9:cf:45:e9: 8a:11:17:9a:f9:e8:40:bc:39:c1:ad:42:84:4a:6b:ed: b8:0c:0e:a7:ff:67:1a:69:bd:1c:58:ed:e6:6a:e2:d5: 34:96:98:42:e7:83:cc:e8:d7:34:96:0e:85:fd:42:25: d3:84:19:6c:75:09:e5:7f:ff:97:19:a3:87:6e:b1:4a: 27:7c:3f:46:3e:ec:13:1b:d3:0f:13:61:a4:55:d0:f0: 1e:f4:7c:b4:bd:06:03:ca:f7:02:d9:c4:f0:2c:38:ed: a3:c3:08:df:25:e6:57:1f:9c:b1:19:04:ff:8c:35:3c: 61:c8:05:b2:0f:d4:5a:a8:57:62:d1:55:06:96:73:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:d3:b0:7b:21:5a:d9:12:8d:3b:48:fd:a8:0a:b0:f1: 38:12:59:90:68:93:6d:99:73:4a:cd:d5:04:71:4a:77: 48:58:8a:63:d6:84:d3:27:89:c5:30:e9:2e:a0:dd:18: 4a:94:43:e4:e0:fd:8f:3f:d3:2c:7b:ac:fb:73:71:6d: c9:c9:88:01:50:89:51:7a:b8:67:6a:3c:13:51:10:e2: 24:65:f1:71:a5:3a:4c:bf:18:a0:82:9c:ed:f9:53:20: 0f:a2:31:dc:45:31:3d:a0:7d:fd:f4:a2:73:f0:9f:76: ad:41:23:b3:0f:8d:16:04:c0:f9:f5:90:ed:07:dd:b1: f0:e9:0d:ab:18:b6:e7:12:33:57:70:7e:db:43:1b:94: 0d:76:74:53:cb:24:f5:fe:e5:a2:10:21:6c:4d:35:df: 94:5b:89:46:a2:60:6e:3c:34:81:05:4a:c8:cc:96:a2: e9:22:b4:4a:84:69:3a:b2:e1:38:e5:e8:c4:aa:0c:e0: ca:24:44:f7:38:74:92:4f:14:b0:4c:bc:a0:38:09:cb: 0c:7f:02:f0:25:95:45:a2:cf:7b:9e:65:03:47:fd:5d: e8:00:15:10:e0:7b:1b:11:25:1a:68:22:46:54:5a:66: 8f:79:ef:70:3d:93:94:41:1d:20:6f:bd:e6:6c:dc:de Fingerprint (SHA-256): 96:8F:B6:22:A4:02:E3:5B:A9:5D:1B:B9:37:64:C7:99:5F:03:98:32:3E:8D:34:74:AD:5B:F2:B1:40:32:34:C3 Fingerprint (SHA1): 9E:53:11:8E:6A:73:52:34:84:E2:85:37:C5:9B:E5:CE:98:19:90:10 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9418: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #9419: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #9420: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #9421: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #9422: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #9423: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153963 (0x6724c6b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 21:09:24 2016 Not After : Fri Jan 08 21:09:24 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:ee:75:53:54:aa:1d:6e:92:4a:03:e6:90:33:1d:c0: 2b:17:ac:22:64:1f:dc:ca:95:ef:29:3e:83:db:59:f2: 63:d7:4e:1b:1f:f2:45:b5:9b:6a:02:5d:90:72:49:56: c3:78:d7:98:29:87:7b:2f:d2:a9:d4:ed:2f:5f:02:35: 42:cc:e6:e2:30:c2:9d:4e:93:9c:41:ea:ce:06:3d:d1: 12:f5:40:00:a8:10:94:7c:cd:10:f0:13:d4:3a:6b:af: 83:9f:52:f9:83:da:db:1f:cf:5e:1b:16:c9:10:53:6a: bc:a6:14:37:25:25:bc:63:9f:4a:1d:61:8f:58:62:6c: 0d:97:1f:e4:ce:a0:15:8c:c2:68:c9:c0:f7:bf:2f:87: 95:a1:ad:b1:f4:66:23:6d:67:c8:f6:62:6b:9b:52:e6: 66:08:c7:6a:3a:70:a2:5a:37:cd:71:50:f9:13:e0:da: 4b:2e:be:1f:41:2d:2a:dd:f6:fc:e9:0d:93:64:b1:68: 90:6f:ea:a7:72:16:16:60:29:e2:e4:ec:da:52:91:c4: 59:1c:6d:2d:c9:98:9f:5b:87:76:24:d6:5c:2e:06:0f: 56:36:2b:02:95:b5:c7:e2:a1:46:ab:04:ce:4a:f7:dc: 76:cc:59:b7:29:60:c6:98:61:b6:1f:ab:1d:78:b6:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 81:f0:3c:9e:4d:92:71:14:d6:ba:0a:20:5f:55:25:a3: 1d:19:f1:9e:99:bc:cb:c0:73:1a:b6:41:ce:3b:d1:4c: 66:f8:d8:30:2f:42:1c:9f:5c:f9:b6:2d:fc:ca:d6:9f: a5:89:b9:61:05:73:b3:cb:f5:f9:6b:4f:55:bd:dd:39: 16:42:21:52:f9:3a:ed:9c:41:2f:cc:73:15:1e:57:05: 83:08:35:8a:cd:9d:70:e4:2b:23:88:e9:fc:83:83:bc: cd:36:31:9a:80:98:66:d7:63:a4:5d:88:7d:a6:4c:55: 02:f6:64:b3:0c:ef:a5:cf:85:a5:31:30:0d:b2:39:d9: c6:90:50:f6:94:4f:93:cd:ab:62:be:34:71:47:67:88: 5d:8e:84:01:a0:7b:7b:8a:8a:ef:92:fc:09:84:db:fb: 7e:34:35:24:d6:dc:4b:59:c6:1a:95:f4:76:2b:8a:42: 32:20:c5:e9:a8:f6:05:31:61:ab:51:e3:7b:32:c0:f6: 6a:a1:8a:f4:77:4e:de:8d:47:4f:70:04:c4:c5:ec:7b: 4a:ab:8c:d7:68:54:df:05:be:8e:99:6a:46:e1:61:eb: 73:fc:fd:0b:be:15:7c:0f:ea:7c:2f:ea:28:36:6a:bd: de:cb:f2:35:c1:52:a5:7b:98:ba:c2:68:7c:3e:2c:dd Fingerprint (SHA-256): 24:30:AA:0E:8C:AD:F6:34:EB:10:3B:DD:C2:D3:9D:F6:2F:7B:7A:0F:0C:28:08:0D:30:4B:59:50:C6:07:6E:A6 Fingerprint (SHA1): 97:88:F3:0B:A3:64:39:EA:7E:A1:BB:1D:DC:51:3C:B8:56:2A:92:6A Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9424: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153963 (0x6724c6b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 21:09:24 2016 Not After : Fri Jan 08 21:09:24 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:ee:75:53:54:aa:1d:6e:92:4a:03:e6:90:33:1d:c0: 2b:17:ac:22:64:1f:dc:ca:95:ef:29:3e:83:db:59:f2: 63:d7:4e:1b:1f:f2:45:b5:9b:6a:02:5d:90:72:49:56: c3:78:d7:98:29:87:7b:2f:d2:a9:d4:ed:2f:5f:02:35: 42:cc:e6:e2:30:c2:9d:4e:93:9c:41:ea:ce:06:3d:d1: 12:f5:40:00:a8:10:94:7c:cd:10:f0:13:d4:3a:6b:af: 83:9f:52:f9:83:da:db:1f:cf:5e:1b:16:c9:10:53:6a: bc:a6:14:37:25:25:bc:63:9f:4a:1d:61:8f:58:62:6c: 0d:97:1f:e4:ce:a0:15:8c:c2:68:c9:c0:f7:bf:2f:87: 95:a1:ad:b1:f4:66:23:6d:67:c8:f6:62:6b:9b:52:e6: 66:08:c7:6a:3a:70:a2:5a:37:cd:71:50:f9:13:e0:da: 4b:2e:be:1f:41:2d:2a:dd:f6:fc:e9:0d:93:64:b1:68: 90:6f:ea:a7:72:16:16:60:29:e2:e4:ec:da:52:91:c4: 59:1c:6d:2d:c9:98:9f:5b:87:76:24:d6:5c:2e:06:0f: 56:36:2b:02:95:b5:c7:e2:a1:46:ab:04:ce:4a:f7:dc: 76:cc:59:b7:29:60:c6:98:61:b6:1f:ab:1d:78:b6:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 81:f0:3c:9e:4d:92:71:14:d6:ba:0a:20:5f:55:25:a3: 1d:19:f1:9e:99:bc:cb:c0:73:1a:b6:41:ce:3b:d1:4c: 66:f8:d8:30:2f:42:1c:9f:5c:f9:b6:2d:fc:ca:d6:9f: a5:89:b9:61:05:73:b3:cb:f5:f9:6b:4f:55:bd:dd:39: 16:42:21:52:f9:3a:ed:9c:41:2f:cc:73:15:1e:57:05: 83:08:35:8a:cd:9d:70:e4:2b:23:88:e9:fc:83:83:bc: cd:36:31:9a:80:98:66:d7:63:a4:5d:88:7d:a6:4c:55: 02:f6:64:b3:0c:ef:a5:cf:85:a5:31:30:0d:b2:39:d9: c6:90:50:f6:94:4f:93:cd:ab:62:be:34:71:47:67:88: 5d:8e:84:01:a0:7b:7b:8a:8a:ef:92:fc:09:84:db:fb: 7e:34:35:24:d6:dc:4b:59:c6:1a:95:f4:76:2b:8a:42: 32:20:c5:e9:a8:f6:05:31:61:ab:51:e3:7b:32:c0:f6: 6a:a1:8a:f4:77:4e:de:8d:47:4f:70:04:c4:c5:ec:7b: 4a:ab:8c:d7:68:54:df:05:be:8e:99:6a:46:e1:61:eb: 73:fc:fd:0b:be:15:7c:0f:ea:7c:2f:ea:28:36:6a:bd: de:cb:f2:35:c1:52:a5:7b:98:ba:c2:68:7c:3e:2c:dd Fingerprint (SHA-256): 24:30:AA:0E:8C:AD:F6:34:EB:10:3B:DD:C2:D3:9D:F6:2F:7B:7A:0F:0C:28:08:0D:30:4B:59:50:C6:07:6E:A6 Fingerprint (SHA1): 97:88:F3:0B:A3:64:39:EA:7E:A1:BB:1D:DC:51:3C:B8:56:2A:92:6A Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9425: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #9426: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153968 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9427: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #9428: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #9429: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153969 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9430: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #9431: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #9432: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153970 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9433: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #9434: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #9435: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153971 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9436: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #9437: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #9438: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153972 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9439: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #9440: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #9441: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153973 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9442: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #9443: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #9444: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153974 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9445: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #9446: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #9447: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153975 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9448: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #9449: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #9450: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153976 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9451: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #9452: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #9453: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9454: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 108153977 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9455: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9456: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 108153978 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9457: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9458: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 108153979 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9459: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9460: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #9461: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #9462: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9463: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 108153980 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9464: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9465: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 108153981 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9466: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9467: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 108153982 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9468: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9469: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #9470: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #9471: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9472: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 108153983 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9473: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9474: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 108153984 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9475: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9476: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 108153985 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9477: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9478: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #9479: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #9480: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9481: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 108153986 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9482: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9483: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 108153987 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9484: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9485: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 108153988 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9486: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9487: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #9488: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9489: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9490: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 108153989 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9491: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9492: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #9493: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9494: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108153990 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9495: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9496: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153968 (0x6724c70) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Fri Jan 08 21:10:19 2016 Not After : Fri Jan 08 21:10:19 2066 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:61:de:bf:8e:c8:d0:cd:84:f6:68:57:07:2d:1f:c8: 39:5e:b6:17:ef:c3:52:4e:64:80:06:60:0f:60:30:5b: 4c:bd:27:05:33:cb:2c:38:ad:7f:17:e8:46:d4:da:ba: d9:69:88:d3:35:4d:e6:9a:cc:10:72:a1:c0:0d:8a:38: f4:cc:98:76:84:54:d2:f9:87:19:d3:50:31:f1:57:1b: 2d:ee:d1:5c:10:09:16:c5:b3:51:19:aa:c8:78:e8:7e: 16:3b:86:11:46:fa:d7:4e:e7:56:ae:85:69:4f:3e:28: 98:17:9c:ef:be:e5:46:cb:2c:75:3a:03:83:4d:80:8a: 96:68:85:de:14:52:34:2e:0f:8e:46:a5:d4:e1:46:cb: b1:05:f2:0d:70:c7:02:ee:8a:0a:10:53:71:92:dc:0d: d1:5d:1f:92:fc:99:8d:7b:75:81:e5:c7:80:4b:ce:5c: 7e:fa:f6:03:19:1c:96:97:6d:71:98:4e:7c:39:4f:c6: 2e:21:d0:ab:1f:58:26:76:dd:89:21:1d:29:18:c9:77: 59:a8:e1:bd:eb:b3:f0:e6:f8:3f:0e:82:be:97:f6:0a: e6:1c:3f:6f:14:ab:3b:58:be:98:8b:f0:8b:aa:b7:3e: 47:ec:57:f0:89:8c:f2:e2:e6:22:d6:81:ee:b5:15:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8b:34:5d:fe:9c:a9:1c:80:75:3a:9b:38:d1:c2:af:75: 1a:8d:8d:24:a9:59:9a:81:59:7c:94:34:81:0a:77:a2: 33:80:50:08:d0:2a:ee:76:0c:dc:92:17:7e:45:19:2a: 2b:39:73:4c:ea:d6:c3:24:2c:25:a1:76:0c:b3:5d:d6: 9c:d5:86:82:a9:07:ef:36:03:72:bc:b1:34:4b:4b:3d: 05:8e:f5:95:23:f8:3d:53:f6:14:fe:09:aa:ef:19:11: 35:8c:46:54:e3:30:f6:41:8d:08:fa:f9:d9:63:5d:29: d9:8f:18:ab:31:e0:03:07:7c:fa:e4:77:d4:41:17:3e: 56:e9:e4:4c:59:ba:01:b2:11:12:ec:57:c4:4e:08:7c: f5:92:e7:d5:ef:6b:bc:14:e3:92:02:9b:e7:23:59:87: 6e:7a:16:e4:4d:68:bb:c9:40:6d:6f:da:17:e7:6f:ad: ed:6e:a2:be:e5:22:c2:7d:21:02:24:1b:3f:60:e0:46: 61:50:41:e1:b1:cf:e4:d5:21:32:4c:fc:46:c6:1f:a6: 9f:b5:35:aa:50:2c:ee:19:9e:59:85:b7:19:e7:fc:09: a1:53:5a:89:bf:00:a0:cb:f3:00:54:d3:38:7d:74:40: 73:4c:3d:11:6b:63:96:78:fe:56:48:46:a3:48:7f:cd Fingerprint (SHA-256): E6:1A:89:47:AE:25:DD:AF:85:F8:15:93:D9:33:2D:3B:A5:7E:40:4A:8D:84:A5:6C:CD:FD:A1:BA:AE:07:50:68 Fingerprint (SHA1): 28:9C:75:9F:09:8A:91:DF:35:27:9A:48:A0:4F:91:D1:8B:E2:A3:23 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #9497: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153969 (0x6724c71) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Fri Jan 08 21:10:40 2016 Not After : Fri Jan 08 21:10:40 2066 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:77:af:a9:f7:6a:80:ec:d1:ac:1f:32:d6:25:db:d3: ab:c8:36:90:ee:bd:2a:ee:d7:aa:3a:47:08:0b:1f:cf: 59:c2:6f:29:36:66:9e:3b:6b:10:b1:e7:83:4e:21:4d: bf:f9:88:3a:cd:72:c3:94:08:3c:85:32:e7:0a:17:dc: 29:5a:16:b3:90:17:67:86:ba:63:b0:48:97:01:07:6e: 8b:bb:f6:44:63:47:22:09:f8:bf:83:de:9d:90:e3:69: 9a:f8:5f:20:35:33:b1:c4:fd:4b:29:99:19:83:08:b2: 7e:34:eb:be:16:c1:cb:6f:34:99:ed:b6:a4:5e:42:10: 4e:bd:2e:12:58:c9:70:6f:24:91:33:4b:0a:cb:48:7d: be:03:24:79:c0:43:b7:d1:61:fc:95:d5:23:a6:06:d7: 5b:60:b6:a8:9e:35:04:3d:25:cc:dd:5c:76:34:4a:c6: fa:2d:46:ef:14:7f:43:79:da:2f:ea:ef:5d:91:74:9e: 9c:6f:a5:12:05:02:74:cf:44:18:e6:90:97:6d:b2:93: a2:2d:8e:0f:b7:ff:cb:f4:6d:51:56:7e:e1:07:bc:1c: ec:17:eb:c7:2d:6d:71:2d:17:d0:31:ad:1b:82:e4:f8: 9c:de:a6:99:dc:79:0a:d5:ce:7c:5b:86:26:fc:b8:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:f3:c8:c3:3b:c2:63:52:59:2b:5f:4d:b5:3f:13:41: f7:84:75:04:76:37:b4:d0:66:4b:4b:49:b8:66:22:62: 8c:dc:a7:41:da:30:b0:cc:d2:ab:1f:35:47:cc:38:68: 93:3d:6a:74:8a:3c:14:db:61:8d:fa:39:f8:e7:08:4d: 0c:c8:8b:64:fc:03:88:e6:4e:c4:38:ef:de:67:3d:8d: ee:c9:c1:b3:21:69:cd:cb:71:0a:89:46:0a:97:41:fa: 5b:8d:d4:a4:90:78:46:82:04:ae:8a:b8:50:ed:99:e2: 00:34:a3:72:c6:6e:c2:a9:27:ce:a2:30:ce:87:54:91: 4e:4f:34:0a:8f:b2:cc:20:e2:c1:23:d8:5b:75:9b:e2: 97:c9:a1:00:cf:c9:01:9f:07:b5:36:38:4d:fd:74:34: e4:08:27:44:4b:75:17:d5:b4:0c:b1:42:58:e8:98:67: da:0e:4d:41:32:32:de:c8:5a:9c:93:5f:5a:ae:61:69: 93:bf:96:30:1c:c1:0e:33:b0:2a:cc:05:97:c1:66:8f: 3f:8b:01:47:dd:c5:78:07:c1:1a:39:22:a9:00:5f:46: 49:15:22:95:1e:78:4b:d4:92:69:18:57:aa:a6:29:9f: 07:68:45:6c:26:af:42:b0:ce:51:2d:be:12:dd:99:5e Fingerprint (SHA-256): A7:8C:19:24:D8:E7:4E:4E:16:13:D3:BA:C4:2E:E2:D2:DB:09:0E:BA:96:BD:FB:66:5F:89:19:C8:F4:A8:3F:8C Fingerprint (SHA1): 3C:F5:E8:C4:F2:C9:67:23:F7:EE:36:C1:17:ED:D4:59:E9:11:76:BA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #9498: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153970 (0x6724c72) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Fri Jan 08 21:10:51 2016 Not After : Fri Jan 08 21:10:51 2066 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:dd:10:36:f8:e0:da:22:0e:d2:a9:44:f6:1f:42:99: d1:ca:5e:4a:f9:6f:fa:0d:6d:da:c0:69:00:51:24:3b: 4a:8d:9a:3b:41:da:02:f9:58:a6:45:0f:2c:ec:ec:bc: c0:0c:77:3a:74:02:56:ea:84:32:1f:43:06:b3:05:06: ca:14:b9:3c:c0:29:67:03:6b:7d:d6:eb:f5:a8:ca:cb: f7:0a:bf:94:f0:36:a7:43:ff:6e:a0:92:85:68:7a:0c: ba:09:3b:5d:17:7d:c9:d4:83:e2:09:cb:15:be:25:c4: 61:77:c8:3a:2f:70:67:a9:2c:21:0b:cf:50:84:38:03: 59:c5:18:6e:52:e9:78:41:fc:67:f5:07:fe:c5:e1:36: 93:35:71:26:58:f6:04:2f:9c:9a:5c:35:48:4d:49:97: a3:74:4f:65:f2:41:9f:7d:bf:51:a2:91:ac:9c:20:c4: f4:bc:54:4d:10:0d:fa:71:65:96:d5:1c:89:0f:dd:3e: e0:b1:63:3c:7e:52:36:c0:59:de:42:3c:4d:b0:31:e9: e4:73:36:4e:10:55:d1:85:d1:b7:3b:1f:e7:37:0a:fa: ce:81:81:5a:85:a3:6e:58:15:95:5c:cb:a4:65:dd:95: c1:05:e4:46:7d:af:59:55:ff:cf:1b:45:19:0d:d0:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:cb:e3:6c:1b:e2:5e:88:a3:9c:44:a2:32:eb:63:30: 5a:31:62:99:5d:ba:88:d8:d4:00:8d:22:36:13:4a:c0: b7:70:64:b4:2d:d6:93:54:82:a6:99:c8:a9:a9:14:04: f0:c2:50:95:bb:fa:31:78:9c:e4:60:e8:28:23:03:4d: d8:56:78:b3:88:c3:e0:35:9b:5f:03:f2:60:0a:85:f3: ad:d9:4e:2c:e6:4d:16:46:5f:6c:67:b1:8f:01:87:20: 09:86:b1:f8:6b:d2:75:e0:13:9d:b7:dd:59:02:10:7a: 94:bd:56:06:e9:03:7e:ce:3e:cb:de:d0:58:1b:42:7e: 8c:d0:66:dd:b4:b5:33:db:ba:a4:e6:0b:71:2d:6f:cf: 54:ba:3f:9d:08:b7:7e:1a:7d:74:c6:2d:bc:bc:36:27: 55:9d:41:79:f7:8e:63:ee:aa:70:85:ec:d4:f1:fe:0d: 35:4c:9f:2b:ba:01:28:ce:85:57:dd:87:8a:96:7a:04: a7:a5:fd:21:eb:b7:ed:d8:67:b0:87:03:3c:9a:6e:b0: 54:92:5b:01:ca:cc:34:25:45:10:55:c3:85:56:69:3f: 41:7d:e5:e3:b3:1f:26:d5:1a:54:41:04:ca:35:a2:64: e2:8c:ad:6a:76:98:ec:07:01:0c:05:92:28:25:38:56 Fingerprint (SHA-256): 60:BB:4B:BC:68:D5:FE:E6:5A:1A:F5:E4:4D:75:62:71:DD:EB:C0:B7:D0:97:AF:C0:A9:1B:77:D4:85:61:3F:8D Fingerprint (SHA1): CB:EC:76:DA:8C:3C:75:8D:75:B3:52:75:78:FB:E3:BB:AD:83:FE:1B Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #9499: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153971 (0x6724c73) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Fri Jan 08 21:10:59 2016 Not After : Fri Jan 08 21:10:59 2066 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:b9:10:6b:30:6c:70:7b:56:9a:d8:86:1b:a7:88:43: 92:23:c9:c7:88:bf:20:f2:23:54:ce:12:ef:07:5b:40: a9:d2:60:3b:68:1b:22:4b:41:f0:f2:94:08:54:30:68: 8e:2d:b7:ef:29:d8:46:36:bd:80:44:aa:8c:24:9d:91: fa:66:07:ea:7b:fb:bb:1f:e9:b6:3b:74:88:64:d8:58: c2:b3:ff:fd:1e:87:a2:0b:da:dd:db:f7:e1:8d:7b:34: bf:b1:2b:75:85:eb:d9:cb:50:61:fb:8e:58:29:31:05: 12:53:30:e5:53:63:b4:cd:17:8e:a4:7b:06:8e:6c:46: 51:d0:da:ec:41:41:f7:82:79:17:21:c0:f6:c0:e9:32: 97:2b:4c:10:c7:4e:fc:3f:22:4a:2e:bd:7d:ce:b0:16: d5:b8:a6:a8:92:c2:5a:77:8e:12:17:9d:1c:2a:87:0c: a7:2e:56:5e:31:8e:e0:fb:54:d8:a3:9b:ff:27:8b:97: 0c:24:3b:86:41:4f:75:ce:f4:c9:84:03:2b:f3:6c:49: 0d:79:aa:5f:ff:aa:69:cd:b9:e8:62:35:58:c7:a9:f8: cb:47:2c:e5:96:b5:e1:b4:ff:82:a3:89:9b:4d:19:44: b6:c7:7b:ae:69:f0:f4:c6:5d:94:dd:34:2e:47:13:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:3c:08:59:98:78:d5:3a:38:f5:58:3a:c3:6c:9d:33: 9d:33:58:dc:ef:2f:be:2c:6b:39:de:31:c7:60:14:df: ab:bf:70:ad:1a:e7:a9:54:df:e7:81:c7:90:7a:ea:58: 59:bd:55:e5:d4:c3:d4:9a:06:f2:1f:6d:c7:25:85:37: ca:d6:23:38:c0:2e:f5:5b:ba:97:a4:d7:75:99:89:4e: 59:93:ce:22:11:2d:d8:af:cf:af:73:73:d8:8f:a1:6e: 81:b0:91:3c:76:ed:ed:e7:65:47:e9:46:29:76:d2:dc: fa:6d:90:3f:75:96:1f:ce:e7:20:01:7d:30:68:3e:e5: ba:c8:9d:53:00:f5:70:88:27:f3:74:de:0f:56:3c:2c: 1f:92:8c:db:b4:58:c2:5a:7f:7b:f4:42:e5:1a:68:09: 3a:4a:b3:78:93:d1:e9:b3:0f:03:f0:1e:54:ad:5b:42: 92:2a:1d:98:aa:fd:57:03:14:05:3b:76:35:a0:ac:80: a8:fc:32:a9:dd:3c:09:6d:5d:b6:0c:0f:a4:60:fd:7c: 40:79:5c:90:66:fb:f5:fa:fb:19:44:7c:7d:33:63:6a: 28:39:2d:8a:91:da:78:3d:af:c6:0b:42:3f:28:3a:7d: 4d:94:21:c0:24:03:75:7b:5d:d5:cd:ad:40:be:1d:41 Fingerprint (SHA-256): F4:70:F7:86:6A:C0:D1:4C:75:42:EB:D2:52:9C:D2:3F:86:98:49:B7:28:9A:E0:74:AF:3D:31:8C:65:D6:73:35 Fingerprint (SHA1): 05:01:3B:A2:EE:15:44:9F:7C:3A:6B:C4:82:68:FE:1F:76:97:4E:5C Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #9500: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153972 (0x6724c74) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Fri Jan 08 21:11:07 2016 Not After : Fri Jan 08 21:11:07 2066 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f3:69:d6:21:7d:af:b2:9f:2e:5e:63:0f:eb:c4:7f:a7: e8:85:43:ed:ab:d7:b9:d8:8c:eb:14:e0:85:93:29:ba: 48:a4:f0:d3:90:c8:11:17:cd:dc:6f:a9:fc:3b:38:2e: 2a:f5:7d:1a:99:aa:2f:fd:34:44:26:11:67:1d:62:cb: b0:ef:9e:e5:5b:ef:2f:7e:89:56:0a:2e:50:e3:74:c7: 07:e6:a1:10:e5:30:47:9b:9b:c4:96:23:60:35:ba:bf: 8a:59:67:bb:bf:14:93:36:cf:35:5b:7c:9d:81:65:17: 59:98:4a:72:c4:a6:6f:b6:b5:6a:f3:3c:0d:10:bf:df: 7c:22:ac:31:ec:24:0a:fc:a4:a2:3b:14:8a:36:be:64: 54:6a:ae:f8:46:65:00:ad:1e:85:8e:6c:38:ee:d8:fa: 23:b7:b5:44:c8:84:5d:9f:a3:3e:32:99:5c:d0:79:95: 38:f4:25:39:8e:d7:62:df:ad:28:86:dd:6a:96:12:ff: 69:ef:b6:be:b8:f8:2b:a0:ca:3a:6e:0e:ee:db:b3:48: 75:92:ec:36:b7:ce:1a:58:13:87:83:42:99:b5:56:c5: bf:5a:f5:6b:77:f8:6c:f9:e2:a4:21:17:29:f8:f2:99: 3c:66:f2:6b:6f:77:65:04:89:78:b7:63:c4:3b:0c:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 24:9a:09:34:eb:65:14:d1:69:19:ab:3f:9e:c5:9b:97: 77:e3:13:e4:10:45:d4:71:c4:f3:84:bc:81:e3:42:73: 6f:b5:a9:e8:27:f3:04:9b:a8:1d:e3:77:65:34:6a:be: 52:6a:f2:93:8c:da:45:67:ea:4b:75:d2:09:17:d5:e0: ee:70:1f:c5:fd:23:77:f8:ac:91:16:fc:e2:65:d6:26: f4:11:6a:f9:db:df:c4:73:b8:c8:11:33:37:4e:dd:e4: 19:c7:ee:1f:a8:f2:db:4c:ba:9f:b3:6d:0f:fd:b5:51: e4:13:b8:1c:96:56:90:0e:64:78:c6:2d:ed:6b:10:1c: 43:56:03:a6:86:33:0f:03:0a:2d:ec:0d:90:0d:b1:ad: 80:5d:f5:85:e8:f0:ae:4b:f4:eb:8e:f6:88:58:89:e1: d6:d9:0c:1e:77:01:24:d8:2e:f0:58:cb:a7:bb:af:37: 8d:b8:78:a1:10:d6:fc:f5:56:c0:85:5d:54:0b:0a:6b: 81:42:dd:4c:aa:d8:44:a7:0b:a4:a9:e3:06:b0:c8:19: ac:91:6d:22:20:4e:0a:bc:64:c6:3a:2c:ac:85:7c:28: f9:af:ac:28:75:d6:23:25:14:17:aa:b7:28:3d:3c:85: 99:91:a0:ba:f9:76:5e:81:7a:4b:04:db:6e:e1:d3:ec Fingerprint (SHA-256): 7F:89:D0:3C:60:27:02:B5:3D:BD:C0:DA:CF:29:E7:F5:9C:02:E0:D9:B6:4E:DA:BC:44:BF:57:B8:25:87:3C:2E Fingerprint (SHA1): D2:78:87:4A:17:21:74:30:D1:24:78:13:42:1C:60:79:D0:56:1C:2D Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #9501: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153973 (0x6724c75) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Fri Jan 08 21:11:12 2016 Not After : Fri Jan 08 21:11:12 2066 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 96:62:77:1b:cb:11:c8:f2:03:12:ef:f7:36:fb:3e:c9: a7:80:42:9a:18:4a:76:57:d1:b1:f2:1e:aa:3f:5c:57: be:f5:37:97:25:06:a0:9a:3a:4d:5b:fa:f2:03:fe:d1: b4:ea:81:2b:0c:01:1d:ca:79:73:75:5d:46:b5:e6:1b: 32:89:c0:eb:5c:15:31:22:ad:e8:09:01:93:dd:8e:64: 9e:3c:4e:c7:9d:5f:c8:e8:80:69:61:e2:ad:58:1b:43: 62:b9:95:60:c1:fc:98:ff:e2:66:42:80:4b:af:03:51: ec:1c:8d:06:09:ea:25:b2:d4:d6:ff:f8:a9:53:a8:94: d4:b8:c2:eb:e6:7f:66:ff:4b:2e:eb:c7:62:dc:53:9d: 7e:4d:bf:5d:fb:f1:5e:21:bd:b3:18:f8:72:68:18:a0: ab:7b:8d:99:d1:ea:e1:00:91:10:10:29:e1:77:d6:ea: ee:d0:f3:21:6e:01:28:2f:cf:a4:51:7d:89:89:2c:03: ef:d0:c7:6e:da:87:40:03:75:9d:64:c3:46:d5:24:70: d2:b5:62:88:fa:2b:13:f9:08:e7:c3:4e:8d:fc:36:f5: 20:5e:62:77:d3:b6:ca:ef:d1:8f:2a:dc:bd:e8:65:71: ea:71:a4:86:4d:c7:43:8e:d7:88:07:3f:a2:65:2f:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:63:ba:8e:bf:a1:f1:b2:ed:32:d9:7d:a0:88:20:09: df:05:be:42:e8:f7:f5:af:41:73:ed:0a:38:50:31:9e: 66:b1:d5:e8:6e:37:5f:61:53:01:97:fa:8e:61:57:5e: 1d:15:e0:44:12:8d:6f:b6:cb:87:d7:4d:c5:b9:cd:20: 62:f0:d8:ab:fc:76:c6:68:69:e5:c6:a5:e3:92:6c:2a: 10:92:42:8e:7e:65:d7:2a:12:82:4f:fe:39:0b:14:99: 70:e3:8a:05:76:7c:b7:a2:24:2b:9a:d6:99:75:d9:2d: 2c:de:48:2a:ed:68:ae:c5:b2:9b:d9:60:19:cb:4e:6c: e5:40:fd:26:5d:86:8c:2d:ed:ac:7b:55:9a:eb:f6:50: ee:f1:ee:a9:25:69:ad:36:ef:0e:be:73:8b:c4:3e:98: 16:80:88:87:30:3d:fb:0e:9e:20:27:b0:f7:71:6b:66: 28:26:57:d1:8e:92:3b:5c:03:7c:6c:49:c2:b4:7f:7b: 7d:38:35:bb:4b:dd:83:63:f2:55:95:64:72:97:0d:53: cb:e0:2b:1e:44:99:0c:7a:e4:80:1c:2d:44:2f:91:55: 59:b7:4c:d2:42:2a:07:b9:a7:ed:09:cb:a7:cd:7b:11: 53:c2:d4:fc:6b:c9:af:f5:c1:37:29:81:59:d4:82:2b Fingerprint (SHA-256): 70:CE:9F:5D:B5:2C:CC:A0:0A:8F:33:61:D8:89:60:6B:1C:DE:F8:F4:B0:FA:97:FB:31:17:F4:1A:C2:21:17:2C Fingerprint (SHA1): 27:0B:2B:E6:81:19:F4:C2:D6:D8:A9:2C:92:DD:20:3A:C7:CD:4A:A4 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #9502: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153974 (0x6724c76) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Fri Jan 08 21:11:19 2016 Not After : Fri Jan 08 21:11:19 2066 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:3c:71:50:39:b0:ae:39:17:d6:a7:eb:13:58:4f:94: 94:4a:c0:18:aa:d8:74:2d:9b:67:5c:de:f7:8d:1d:76: c3:43:b0:19:7a:e5:90:ac:05:26:9e:92:23:92:a6:ff: 86:fd:69:04:aa:b6:0b:a4:af:32:30:42:93:69:ff:f1: e1:2b:85:8e:0c:b3:b1:87:95:3c:c0:3d:10:53:6c:4d: a6:81:38:4f:cf:b4:dc:a5:74:d3:1a:4a:ef:18:08:b4: 61:3b:af:e7:2e:aa:6e:d1:78:36:55:07:cf:2e:47:c7: 94:e5:57:d4:96:19:3b:fb:12:30:9b:ae:88:83:49:75: 73:ea:d2:fc:bb:3b:51:6c:47:ad:84:86:c3:09:ec:70: 76:38:26:ab:fd:a7:7f:f5:76:07:9f:e8:32:91:12:dc: b6:e8:b8:78:06:28:49:0e:15:6c:57:78:e6:78:b9:52: 73:9b:48:1f:16:be:e9:c4:1c:34:df:f6:a1:58:93:4b: a5:b1:06:0d:43:97:45:8c:47:98:a0:75:1a:4b:f1:1d: 44:96:6b:7e:fb:91:4d:85:04:02:e9:bb:9e:88:9c:f0: 25:ee:1d:d0:4f:e3:50:f6:11:6b:33:2e:f3:37:6a:1e: b0:a6:99:90:34:25:ec:75:5a:39:3d:37:d4:d5:4e:e7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:eb:88:2a:c8:a7:fa:47:d2:f9:fc:ae:77:ad:8e:93: e6:fd:59:66:82:46:12:6b:be:d4:ae:63:94:8d:c8:72: 36:53:9b:c6:3f:29:b6:fb:bc:7c:29:e8:61:3c:51:ca: 17:a1:aa:25:46:cc:53:e4:ed:8d:2a:a0:8a:3c:34:64: 4e:79:5c:cc:3f:ed:1d:1b:65:73:0b:55:23:e0:9e:74: e6:dd:aa:4b:1f:22:d1:2c:39:bb:3b:ce:32:14:3f:d5: 62:81:f7:1f:a3:9a:bf:63:54:a5:37:91:f1:b6:4a:df: 10:b3:a8:a0:7c:4e:d3:ce:c2:af:b9:1c:c0:59:7c:47: 3f:4c:64:c7:11:4c:5b:28:5b:02:4b:c8:13:cb:17:a2: 70:be:c8:3e:8e:72:11:dd:f1:25:8a:01:09:f8:ef:1d: 9d:ba:f0:94:34:8f:73:37:e3:db:34:81:30:d1:6b:63: 3e:27:f1:5c:20:b2:72:3d:27:75:f8:fd:6c:4f:c7:82: 73:fe:84:6b:bf:8a:0a:13:fd:fd:c5:3c:8d:39:f3:e6: b6:85:82:65:9e:d4:55:be:ad:06:23:b0:2b:4d:47:17: b3:9a:1b:37:ce:75:22:3d:d0:61:78:bb:37:15:d5:a7: 37:8e:b1:5a:db:d0:3e:03:f0:71:69:6d:56:b7:70:6f Fingerprint (SHA-256): 77:C9:42:AB:86:DA:C5:57:88:E4:27:4C:3F:57:24:62:A7:61:1E:72:0E:05:F2:48:1C:75:1B:C7:D1:AB:10:C1 Fingerprint (SHA1): BA:37:10:77:B4:4C:FF:AE:54:15:13:B1:5E:63:20:EA:FD:38:4A:DA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #9503: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153975 (0x6724c77) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Fri Jan 08 21:11:26 2016 Not After : Fri Jan 08 21:11:26 2066 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:34:d6:51:a0:9f:1f:0b:87:29:57:61:39:93:b8:e6: 73:c1:2d:02:19:d4:e6:d7:41:08:f9:f9:87:6f:e1:f0: 25:28:9d:9f:83:16:09:44:22:f0:ee:9e:72:0c:de:e8: c2:d4:48:21:ed:9e:fe:a1:03:51:52:ca:39:09:bb:8c: 7c:4f:9f:c3:22:98:fb:b3:f4:4c:0e:03:f9:58:75:fe: 4e:5e:e7:5b:a3:9e:e8:d8:0e:c6:e1:ca:22:e8:c0:cf: d7:c9:4e:e5:7b:a1:a9:70:8a:f5:bf:00:e7:e4:fe:16: 1c:6d:ab:b0:da:8a:61:62:c9:c2:3a:2f:62:ca:fd:a0: b3:17:ec:49:06:21:89:b0:6c:e0:d9:99:6c:79:d3:10: 30:df:49:41:24:a2:4d:ea:c6:c4:dc:1a:f2:3d:b7:6f: ec:47:68:23:d3:10:de:02:9d:c5:4e:58:0f:4b:84:c7: ad:ce:ba:9c:57:1d:ba:b3:42:11:a5:ba:7b:e6:8d:09: 51:da:18:56:94:44:4f:87:ff:11:2c:68:fe:49:1d:e9: 33:42:a5:be:66:89:b0:ed:b2:a2:41:b6:5a:5e:da:6e: 1e:8f:af:ff:83:73:a9:0d:4a:ca:61:33:25:23:8c:b5: ca:d9:5c:5b:a8:5d:87:8a:d1:fe:e7:58:0b:6b:ad:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:d8:f6:94:62:23:21:6a:64:46:63:e4:c6:98:97:ea: 6e:55:6e:37:8f:ec:24:6b:ae:2b:b0:51:00:7e:44:4e: 8c:79:74:b7:79:ef:2e:f1:03:22:5d:fe:3c:00:fe:ae: af:bf:c0:f7:24:ca:80:4f:33:4b:05:56:41:9b:f9:87: af:e3:b9:ba:94:22:2c:78:e6:c7:b4:dc:fc:34:24:49: 90:0a:2a:1c:1c:4e:e0:ec:22:5d:4c:2f:c6:de:a4:3d: 14:98:6f:60:14:09:b2:17:50:20:a7:24:20:e0:ba:e5: 54:c2:e4:1c:2d:be:38:d2:cc:47:68:ce:bd:94:86:3d: 5f:c0:b9:af:46:0b:2b:fb:e8:05:46:cd:e8:63:94:3d: 30:39:6e:26:20:ea:41:f7:be:0b:60:ad:db:ea:69:a3: 96:d8:8b:86:4e:d1:bc:fb:47:cb:61:47:90:5f:d5:27: 2f:14:85:8b:a9:28:36:93:96:21:55:70:7d:d8:df:6e: 32:9e:7d:b6:55:44:9f:8f:07:5a:4e:a6:98:75:66:54: 65:82:48:58:cf:c3:6a:82:46:1c:eb:fb:9d:3e:c3:17: 53:72:b6:06:26:16:1e:7d:75:48:0e:7a:02:40:b2:42: bb:22:fc:eb:25:5a:6a:c2:9b:9d:1c:d4:e8:da:9a:99 Fingerprint (SHA-256): 0D:1A:C3:B3:34:63:F8:A7:B6:70:09:37:6C:CA:6D:8F:75:1B:01:BE:1E:A1:80:06:51:FB:6D:09:E7:25:1B:B0 Fingerprint (SHA1): 13:82:81:B1:DF:F3:A6:89:0A:CA:ED:00:CC:6B:5E:D8:76:CA:13:1B Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #9504: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153976 (0x6724c78) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Fri Jan 08 21:11:33 2016 Not After : Fri Jan 08 21:11:33 2066 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:26:a1:73:f6:d4:1e:10:b0:a1:07:5e:26:59:3c:a7: 8b:88:67:37:66:ba:d0:5c:88:1c:95:37:c6:09:cf:d1: 50:17:c5:b7:a0:98:4f:92:a6:93:65:fa:62:32:36:85: 7d:eb:cd:3d:00:36:3f:50:9d:8b:c0:0b:36:00:74:dd: b8:f4:46:a1:d8:fb:26:50:9c:f8:6d:01:33:d8:fa:d3: 3b:d5:25:63:0e:bf:03:2c:04:35:11:e6:f7:0a:b8:de: 15:92:ed:c5:0c:48:5a:88:12:60:db:ab:84:59:f7:84: e4:d8:59:59:03:5b:fa:23:f6:76:eb:2d:f1:54:00:21: 57:b0:ab:32:46:02:9e:65:eb:5f:c0:33:ae:71:54:0a: 11:48:75:82:78:0c:dc:02:dd:c5:17:3f:4e:95:a4:d2: 10:7e:6a:80:8b:62:83:4c:fe:e2:46:c3:10:fa:f4:2f: 42:d8:47:6f:aa:91:7f:76:87:ba:ae:65:c2:18:e6:96: a5:5c:11:95:40:68:3d:38:dd:77:46:9d:ae:b6:af:bd: 5c:bf:ef:49:3c:59:61:94:6c:a0:5b:8e:8d:a4:e8:ca: 86:b0:dc:22:e9:e4:97:a9:8d:0e:61:e0:af:ac:ed:1a: d3:10:4b:ce:0a:ee:a8:b3:07:16:00:92:27:25:aa:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2b:72:11:10:5f:fa:0e:4e:24:97:b7:e4:9e:d2:a8:b8: f5:7f:81:e1:71:77:21:c5:0d:07:85:ed:52:45:66:7a: 46:4d:12:f9:da:f5:cf:b8:27:e4:c0:0c:6e:fa:ca:61: cf:2a:8f:99:6f:c8:c4:a8:5a:cb:27:1f:59:50:0f:28: 17:e3:a3:d1:d4:57:ea:bd:5a:96:2d:fc:83:51:00:81: 3f:74:54:70:fb:72:61:5e:03:2b:0f:26:c4:d3:aa:75: 3e:04:c3:b4:0e:af:6a:54:6f:0a:4b:1b:d7:dd:3f:b7: 44:2e:93:7e:d2:91:5a:2c:08:cf:9b:7a:62:b6:3c:94: 24:20:f9:f3:5a:b3:dd:44:d8:c6:7e:0b:a6:cf:eb:97: cb:58:46:30:88:3a:a5:32:61:17:31:14:35:4e:e2:7f: 08:03:f8:6d:e1:f5:b3:51:6a:aa:9c:18:d7:fc:ca:02: 57:47:3f:af:66:52:ad:fb:3a:3c:6d:44:46:6a:e9:b6: 72:67:f7:bc:dc:e6:2b:ca:88:a7:20:39:ee:a0:b2:dd: e4:c9:7c:95:b6:43:78:61:90:96:ec:67:26:fe:1d:fe: b4:e2:b9:bd:9c:8e:00:e5:fd:76:4c:43:f2:81:8e:e7: 68:ce:e8:33:a6:7b:b0:80:c3:ab:34:f1:b6:b4:79:89 Fingerprint (SHA-256): E8:0D:16:A6:7A:A1:D1:4C:F6:A5:23:52:33:20:7B:7A:8A:3D:DC:67:4B:F3:42:83:31:66:1A:0A:02:75:07:B5 Fingerprint (SHA1): 1E:EC:17:48:75:03:CA:32:EA:99:AD:C4:1F:FD:CE:A0:B2:D7:A4:69 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #9505: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #9506: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153991 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9507: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #9508: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9509: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9510: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108153992 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9511: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9512: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #9513: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9514: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108153993 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9515: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9516: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #9517: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9518: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108153994 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9519: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9520: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #9521: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153991 (0x6724c87) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:13:17 2016 Not After : Fri Jan 08 21:13:17 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:cd:64:4a:89:d8:92:f9:df:9d:31:58:3a:87:64:83: 63:23:b5:f7:07:11:31:90:eb:fa:fd:1c:6b:10:4f:ab: 32:4b:c4:aa:fa:e2:d5:f2:50:fc:cb:88:e0:67:c9:76: 4a:b4:c6:1a:ff:e9:24:2c:60:d4:15:a1:e7:49:94:3f: f4:2e:eb:ae:cb:c7:b9:59:97:de:7c:24:0c:26:da:6c: af:4a:0c:05:63:b8:3b:f2:b1:d8:bd:16:80:2c:55:42: 1a:a7:a0:c7:fe:83:07:48:2d:88:b5:ea:dc:9a:ce:14: ca:b1:99:58:b7:96:8c:90:7d:b0:32:1b:de:57:48:cf: 82:fa:88:e6:3f:6e:c2:de:df:3c:ed:c9:61:50:43:b9: 29:46:3c:7d:fe:57:36:2f:7b:54:ae:fd:21:ba:f9:75: 71:b0:a9:0c:99:8b:3c:39:82:88:0a:f2:d3:85:29:01: 9e:67:a3:76:ce:af:56:8c:70:01:2f:26:85:b5:21:9e: f9:58:e2:df:61:c2:08:4c:48:2e:b0:d5:3f:9d:86:fc: 7c:8e:77:65:c8:7d:57:49:98:86:e3:42:17:21:a0:a0: 76:52:1e:7a:59:94:f8:0f:d1:1a:03:58:82:33:17:12: 01:f3:72:02:b2:a4:bf:4c:58:e5:87:98:63:55:e6:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:76:3d:e7:f7:8e:79:2d:86:e8:6b:af:b4:f9:97:cf: 46:5a:6d:4e:b5:ea:ba:89:9b:bf:bb:52:b8:ab:e3:40: 58:a9:10:27:4d:f1:a8:d6:9f:05:ef:fe:2e:16:1a:ae: 86:a0:ef:30:f9:af:47:17:7f:23:dc:7d:00:30:69:8f: 2b:74:3b:0b:f5:f0:04:7a:34:6c:27:a8:e5:35:50:fe: 6f:ff:d6:e4:0b:c1:ff:fa:07:7b:95:06:f4:0a:a5:cc: 27:ab:71:53:d4:57:98:03:b2:44:a3:9a:2e:05:58:0a: 75:81:0e:96:1d:b6:1b:61:18:9b:60:a0:ca:32:bf:23: d8:f6:db:da:73:d1:df:c1:1c:1f:2f:42:38:1f:d2:40: 14:25:db:89:62:b0:cf:74:a6:2e:e7:3d:40:9b:c7:3e: 4b:58:20:b5:08:cc:b3:65:23:2a:2f:71:7a:ab:85:f5: 12:40:6c:b4:d5:6a:48:28:c1:35:a6:57:b7:c6:0a:c1: 98:69:34:be:d5:47:d9:83:62:4c:03:f0:16:1f:7d:85: fc:93:6a:d6:9e:73:64:d1:d1:22:90:b3:0d:bf:bd:5f: da:41:d9:4e:74:c8:25:70:f6:08:0e:4d:88:6b:84:a5: 1f:5e:39:1b:6e:75:3e:77:e6:46:6a:94:4e:9f:79:59 Fingerprint (SHA-256): 88:B6:F2:F5:D8:19:C4:D5:2F:39:D5:B4:90:0F:F7:51:9E:0D:2A:B8:8E:9F:B6:50:D0:71:59:86:AB:95:9A:E0 Fingerprint (SHA1): 94:38:06:2C:55:73:0C:B9:77:4C:C9:0E:31:0E:3F:A5:7F:CF:C9:A7 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9522: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9523: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153992 (0x6724c88) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:13:30 2016 Not After : Fri Jan 08 21:13:30 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:82:10:f0:a7:da:a8:a2:62:38:25:a2:bd:98:4f:d4: 9c:f3:6b:af:4e:06:83:0b:56:a7:da:63:71:1d:47:8c: d2:4e:3f:00:6a:b7:39:6e:2f:42:ae:0d:a2:4b:de:59: 6b:c1:92:a3:9f:9f:9d:9d:1c:ed:da:01:2e:33:90:e9: dd:3a:0d:fb:0e:32:3d:da:3f:ba:60:41:d8:20:1b:fe: ca:48:45:c8:b1:9b:6f:40:10:32:e3:67:1b:90:5f:a7: 2c:e2:38:cd:e0:93:99:04:cb:78:6f:d4:3b:73:38:2e: 90:3e:8b:32:cc:cf:f0:b0:aa:86:4a:0e:f6:f7:4c:9d: a7:25:e0:84:4a:04:41:a4:f9:39:15:a3:35:dc:e3:7f: 9b:7a:c6:5a:4f:c9:6d:9f:4d:14:8b:f3:c3:40:64:38: 18:06:c5:e0:87:b8:5f:c3:25:b9:6b:22:58:47:71:fe: f2:31:4d:50:63:0f:87:77:28:41:cc:71:80:70:c2:fe: 4b:05:6e:84:84:b0:ea:d9:31:5f:e8:18:57:6c:fe:9b: 3a:33:f2:92:83:3c:6f:85:71:b6:62:7d:f5:d7:bb:3e: f9:e6:ca:1f:a3:1a:1d:fa:f8:63:7b:71:8d:3c:a0:83: 35:95:b0:da:58:0c:3c:9a:73:f3:80:5d:55:e3:76:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:57:a5:a2:43:e8:25:83:a6:10:85:9f:7b:78:e5:35: b5:f1:5a:0b:a9:e7:92:01:e5:87:d4:c6:eb:1e:df:3b: bd:c6:1b:4d:9b:bb:2d:f7:e4:e7:70:06:dc:c5:14:7e: 80:02:5d:f4:12:38:43:b9:8b:8e:e0:1b:12:e4:42:f2: bf:e4:66:41:84:c5:01:3a:67:e0:6f:86:6b:12:54:b8: 84:b4:ee:ec:06:d2:56:7c:1d:f2:31:2e:43:42:1d:2b: 3d:9e:2f:78:21:19:b8:3f:8c:d8:22:a9:54:41:07:3f: 90:de:00:76:2d:d9:2e:8b:5b:dd:94:fd:2d:92:07:b1: 9c:0d:f6:e4:0a:6a:49:43:18:31:de:9f:a2:5f:d9:2e: 98:2a:40:89:a0:15:16:04:51:fe:71:ca:b0:8d:89:43: 99:c5:f7:ba:06:e9:22:2e:b6:c3:3c:f2:ab:6a:01:6c: 99:4f:e9:7e:56:c7:1a:f8:a4:82:c3:fd:7f:89:f2:e1: de:76:56:5f:e3:9a:de:ab:14:89:41:b6:5b:83:da:af: 53:ad:c0:4f:50:d1:86:ba:63:d6:45:58:a4:85:13:56: f0:56:26:61:1e:90:bf:28:e6:77:ab:bd:5a:05:3f:11: 6b:14:ee:c9:5f:11:98:60:fe:0a:74:26:11:a6:ef:81 Fingerprint (SHA-256): B6:ED:30:03:95:2F:E9:69:76:72:E6:56:A8:42:E1:8B:F0:72:FE:67:D3:AE:DA:21:CF:E8:3D:F2:AA:32:C7:46 Fingerprint (SHA1): 3E:20:FF:3F:B2:60:2D:B0:17:8B:DF:62:76:02:8D:23:D2:68:D3:52 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #9524: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9525: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153993 (0x6724c89) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 21:13:46 2016 Not After : Fri Jan 08 21:13:46 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:db:6a:c1:81:01:3a:f4:06:a5:40:87:07:ed:14:db: 05:a9:11:35:52:9b:e1:85:ca:ce:f5:56:b9:f3:60:4a: d9:82:bb:5b:00:8a:7a:88:4d:4b:8f:ea:26:e6:57:70: f7:6b:11:38:63:ea:c9:07:e8:68:91:e4:9f:86:fe:2b: c5:c1:dd:82:c2:1c:a8:9c:3f:3c:af:ae:bc:f1:dd:52: 2d:cf:8e:e2:1a:74:01:18:7f:a5:c1:ef:27:a5:bc:af: 51:c7:5c:77:ad:d9:4f:34:3b:7a:2e:44:fd:57:90:6e: 5f:e6:18:79:a6:42:8a:14:63:fb:4e:ef:e3:5a:e7:68: b3:12:36:32:6b:dc:70:02:8e:f5:cf:fa:9e:77:89:5b: 08:67:75:0c:5d:7a:3c:be:a8:76:e6:60:d1:09:76:59: a0:db:85:ae:32:aa:b7:99:75:f3:7e:79:68:7e:af:4a: 18:79:13:5f:62:92:f2:02:ff:c2:c8:71:0f:4d:7c:ca: 62:9b:56:50:3e:2e:b1:83:70:c6:a9:a4:93:66:7f:18: 6a:ba:49:c0:cc:b8:8b:46:81:32:80:00:13:48:21:2a: c4:df:5c:c3:af:8a:e0:55:f8:f1:46:11:26:aa:57:02: 6b:cb:f7:d4:7b:8c:8d:c9:62:74:19:a6:49:a3:4e:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c9:68:d2:fa:b6:b6:a5:e4:4b:b9:cb:96:1f:46:18:7d: 4c:f3:f1:5e:a7:05:80:81:94:a0:f8:f0:ca:43:4a:f3: be:46:18:fc:65:32:aa:a0:06:ac:92:b8:51:fa:6f:f0: 76:75:f5:a7:1d:03:90:9b:a6:db:66:22:6e:f6:69:7e: 05:4c:3f:fa:09:23:a9:79:c4:7a:04:b9:41:c8:f6:87: f1:e0:2b:ba:6f:e9:a0:98:25:41:02:74:18:28:19:6f: 88:82:77:10:4c:1c:19:c0:16:ef:85:9b:82:06:b7:c4: d7:3a:4a:7e:a0:1e:ad:1e:b9:39:e3:b5:6b:b9:92:60: 93:73:6e:e6:20:c9:b2:47:e5:87:18:7a:df:90:8c:90: c5:51:2c:9a:d0:f9:69:e4:ed:6c:d9:ad:87:85:4d:fb: c9:1a:cf:a2:b7:2b:0c:1a:d1:5d:92:9d:74:f7:79:fb: 69:01:9c:97:c7:f6:a7:c6:54:a0:35:e3:17:86:6c:9d: ea:6a:c4:37:77:c2:7f:04:c0:2a:46:29:2e:7a:73:61: 8d:70:5a:14:2c:f1:be:fa:44:37:a0:62:32:80:9b:a3: 04:8b:5b:fa:b1:f4:36:c2:b5:29:b1:db:b1:eb:97:7e: 2d:93:af:db:0c:16:91:cd:f1:1b:d9:bc:1e:a3:e4:d2 Fingerprint (SHA-256): D3:F3:BC:64:02:C2:FA:23:DC:12:97:7E:E6:8F:A8:38:E7:4C:CE:F5:CA:62:46:D4:E0:16:B3:E5:53:EF:3E:E6 Fingerprint (SHA1): CA:75:8B:94:B9:D8:12:02:EA:1A:BD:F4:0A:EC:03:00:3E:35:74:73 Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #9526: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9527: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #9528: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #9529: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #9530: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153991 (0x6724c87) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:13:17 2016 Not After : Fri Jan 08 21:13:17 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:cd:64:4a:89:d8:92:f9:df:9d:31:58:3a:87:64:83: 63:23:b5:f7:07:11:31:90:eb:fa:fd:1c:6b:10:4f:ab: 32:4b:c4:aa:fa:e2:d5:f2:50:fc:cb:88:e0:67:c9:76: 4a:b4:c6:1a:ff:e9:24:2c:60:d4:15:a1:e7:49:94:3f: f4:2e:eb:ae:cb:c7:b9:59:97:de:7c:24:0c:26:da:6c: af:4a:0c:05:63:b8:3b:f2:b1:d8:bd:16:80:2c:55:42: 1a:a7:a0:c7:fe:83:07:48:2d:88:b5:ea:dc:9a:ce:14: ca:b1:99:58:b7:96:8c:90:7d:b0:32:1b:de:57:48:cf: 82:fa:88:e6:3f:6e:c2:de:df:3c:ed:c9:61:50:43:b9: 29:46:3c:7d:fe:57:36:2f:7b:54:ae:fd:21:ba:f9:75: 71:b0:a9:0c:99:8b:3c:39:82:88:0a:f2:d3:85:29:01: 9e:67:a3:76:ce:af:56:8c:70:01:2f:26:85:b5:21:9e: f9:58:e2:df:61:c2:08:4c:48:2e:b0:d5:3f:9d:86:fc: 7c:8e:77:65:c8:7d:57:49:98:86:e3:42:17:21:a0:a0: 76:52:1e:7a:59:94:f8:0f:d1:1a:03:58:82:33:17:12: 01:f3:72:02:b2:a4:bf:4c:58:e5:87:98:63:55:e6:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:76:3d:e7:f7:8e:79:2d:86:e8:6b:af:b4:f9:97:cf: 46:5a:6d:4e:b5:ea:ba:89:9b:bf:bb:52:b8:ab:e3:40: 58:a9:10:27:4d:f1:a8:d6:9f:05:ef:fe:2e:16:1a:ae: 86:a0:ef:30:f9:af:47:17:7f:23:dc:7d:00:30:69:8f: 2b:74:3b:0b:f5:f0:04:7a:34:6c:27:a8:e5:35:50:fe: 6f:ff:d6:e4:0b:c1:ff:fa:07:7b:95:06:f4:0a:a5:cc: 27:ab:71:53:d4:57:98:03:b2:44:a3:9a:2e:05:58:0a: 75:81:0e:96:1d:b6:1b:61:18:9b:60:a0:ca:32:bf:23: d8:f6:db:da:73:d1:df:c1:1c:1f:2f:42:38:1f:d2:40: 14:25:db:89:62:b0:cf:74:a6:2e:e7:3d:40:9b:c7:3e: 4b:58:20:b5:08:cc:b3:65:23:2a:2f:71:7a:ab:85:f5: 12:40:6c:b4:d5:6a:48:28:c1:35:a6:57:b7:c6:0a:c1: 98:69:34:be:d5:47:d9:83:62:4c:03:f0:16:1f:7d:85: fc:93:6a:d6:9e:73:64:d1:d1:22:90:b3:0d:bf:bd:5f: da:41:d9:4e:74:c8:25:70:f6:08:0e:4d:88:6b:84:a5: 1f:5e:39:1b:6e:75:3e:77:e6:46:6a:94:4e:9f:79:59 Fingerprint (SHA-256): 88:B6:F2:F5:D8:19:C4:D5:2F:39:D5:B4:90:0F:F7:51:9E:0D:2A:B8:8E:9F:B6:50:D0:71:59:86:AB:95:9A:E0 Fingerprint (SHA1): 94:38:06:2C:55:73:0C:B9:77:4C:C9:0E:31:0E:3F:A5:7F:CF:C9:A7 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9531: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9532: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153992 (0x6724c88) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:13:30 2016 Not After : Fri Jan 08 21:13:30 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:82:10:f0:a7:da:a8:a2:62:38:25:a2:bd:98:4f:d4: 9c:f3:6b:af:4e:06:83:0b:56:a7:da:63:71:1d:47:8c: d2:4e:3f:00:6a:b7:39:6e:2f:42:ae:0d:a2:4b:de:59: 6b:c1:92:a3:9f:9f:9d:9d:1c:ed:da:01:2e:33:90:e9: dd:3a:0d:fb:0e:32:3d:da:3f:ba:60:41:d8:20:1b:fe: ca:48:45:c8:b1:9b:6f:40:10:32:e3:67:1b:90:5f:a7: 2c:e2:38:cd:e0:93:99:04:cb:78:6f:d4:3b:73:38:2e: 90:3e:8b:32:cc:cf:f0:b0:aa:86:4a:0e:f6:f7:4c:9d: a7:25:e0:84:4a:04:41:a4:f9:39:15:a3:35:dc:e3:7f: 9b:7a:c6:5a:4f:c9:6d:9f:4d:14:8b:f3:c3:40:64:38: 18:06:c5:e0:87:b8:5f:c3:25:b9:6b:22:58:47:71:fe: f2:31:4d:50:63:0f:87:77:28:41:cc:71:80:70:c2:fe: 4b:05:6e:84:84:b0:ea:d9:31:5f:e8:18:57:6c:fe:9b: 3a:33:f2:92:83:3c:6f:85:71:b6:62:7d:f5:d7:bb:3e: f9:e6:ca:1f:a3:1a:1d:fa:f8:63:7b:71:8d:3c:a0:83: 35:95:b0:da:58:0c:3c:9a:73:f3:80:5d:55:e3:76:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:57:a5:a2:43:e8:25:83:a6:10:85:9f:7b:78:e5:35: b5:f1:5a:0b:a9:e7:92:01:e5:87:d4:c6:eb:1e:df:3b: bd:c6:1b:4d:9b:bb:2d:f7:e4:e7:70:06:dc:c5:14:7e: 80:02:5d:f4:12:38:43:b9:8b:8e:e0:1b:12:e4:42:f2: bf:e4:66:41:84:c5:01:3a:67:e0:6f:86:6b:12:54:b8: 84:b4:ee:ec:06:d2:56:7c:1d:f2:31:2e:43:42:1d:2b: 3d:9e:2f:78:21:19:b8:3f:8c:d8:22:a9:54:41:07:3f: 90:de:00:76:2d:d9:2e:8b:5b:dd:94:fd:2d:92:07:b1: 9c:0d:f6:e4:0a:6a:49:43:18:31:de:9f:a2:5f:d9:2e: 98:2a:40:89:a0:15:16:04:51:fe:71:ca:b0:8d:89:43: 99:c5:f7:ba:06:e9:22:2e:b6:c3:3c:f2:ab:6a:01:6c: 99:4f:e9:7e:56:c7:1a:f8:a4:82:c3:fd:7f:89:f2:e1: de:76:56:5f:e3:9a:de:ab:14:89:41:b6:5b:83:da:af: 53:ad:c0:4f:50:d1:86:ba:63:d6:45:58:a4:85:13:56: f0:56:26:61:1e:90:bf:28:e6:77:ab:bd:5a:05:3f:11: 6b:14:ee:c9:5f:11:98:60:fe:0a:74:26:11:a6:ef:81 Fingerprint (SHA-256): B6:ED:30:03:95:2F:E9:69:76:72:E6:56:A8:42:E1:8B:F0:72:FE:67:D3:AE:DA:21:CF:E8:3D:F2:AA:32:C7:46 Fingerprint (SHA1): 3E:20:FF:3F:B2:60:2D:B0:17:8B:DF:62:76:02:8D:23:D2:68:D3:52 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #9533: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9534: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153993 (0x6724c89) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 21:13:46 2016 Not After : Fri Jan 08 21:13:46 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:db:6a:c1:81:01:3a:f4:06:a5:40:87:07:ed:14:db: 05:a9:11:35:52:9b:e1:85:ca:ce:f5:56:b9:f3:60:4a: d9:82:bb:5b:00:8a:7a:88:4d:4b:8f:ea:26:e6:57:70: f7:6b:11:38:63:ea:c9:07:e8:68:91:e4:9f:86:fe:2b: c5:c1:dd:82:c2:1c:a8:9c:3f:3c:af:ae:bc:f1:dd:52: 2d:cf:8e:e2:1a:74:01:18:7f:a5:c1:ef:27:a5:bc:af: 51:c7:5c:77:ad:d9:4f:34:3b:7a:2e:44:fd:57:90:6e: 5f:e6:18:79:a6:42:8a:14:63:fb:4e:ef:e3:5a:e7:68: b3:12:36:32:6b:dc:70:02:8e:f5:cf:fa:9e:77:89:5b: 08:67:75:0c:5d:7a:3c:be:a8:76:e6:60:d1:09:76:59: a0:db:85:ae:32:aa:b7:99:75:f3:7e:79:68:7e:af:4a: 18:79:13:5f:62:92:f2:02:ff:c2:c8:71:0f:4d:7c:ca: 62:9b:56:50:3e:2e:b1:83:70:c6:a9:a4:93:66:7f:18: 6a:ba:49:c0:cc:b8:8b:46:81:32:80:00:13:48:21:2a: c4:df:5c:c3:af:8a:e0:55:f8:f1:46:11:26:aa:57:02: 6b:cb:f7:d4:7b:8c:8d:c9:62:74:19:a6:49:a3:4e:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c9:68:d2:fa:b6:b6:a5:e4:4b:b9:cb:96:1f:46:18:7d: 4c:f3:f1:5e:a7:05:80:81:94:a0:f8:f0:ca:43:4a:f3: be:46:18:fc:65:32:aa:a0:06:ac:92:b8:51:fa:6f:f0: 76:75:f5:a7:1d:03:90:9b:a6:db:66:22:6e:f6:69:7e: 05:4c:3f:fa:09:23:a9:79:c4:7a:04:b9:41:c8:f6:87: f1:e0:2b:ba:6f:e9:a0:98:25:41:02:74:18:28:19:6f: 88:82:77:10:4c:1c:19:c0:16:ef:85:9b:82:06:b7:c4: d7:3a:4a:7e:a0:1e:ad:1e:b9:39:e3:b5:6b:b9:92:60: 93:73:6e:e6:20:c9:b2:47:e5:87:18:7a:df:90:8c:90: c5:51:2c:9a:d0:f9:69:e4:ed:6c:d9:ad:87:85:4d:fb: c9:1a:cf:a2:b7:2b:0c:1a:d1:5d:92:9d:74:f7:79:fb: 69:01:9c:97:c7:f6:a7:c6:54:a0:35:e3:17:86:6c:9d: ea:6a:c4:37:77:c2:7f:04:c0:2a:46:29:2e:7a:73:61: 8d:70:5a:14:2c:f1:be:fa:44:37:a0:62:32:80:9b:a3: 04:8b:5b:fa:b1:f4:36:c2:b5:29:b1:db:b1:eb:97:7e: 2d:93:af:db:0c:16:91:cd:f1:1b:d9:bc:1e:a3:e4:d2 Fingerprint (SHA-256): D3:F3:BC:64:02:C2:FA:23:DC:12:97:7E:E6:8F:A8:38:E7:4C:CE:F5:CA:62:46:D4:E0:16:B3:E5:53:EF:3E:E6 Fingerprint (SHA1): CA:75:8B:94:B9:D8:12:02:EA:1A:BD:F4:0A:EC:03:00:3E:35:74:73 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #9535: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9536: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #9537: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108153995 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9538: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #9539: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9540: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9541: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108153996 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9542: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9543: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #9544: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9545: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108153997 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9546: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9547: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #9548: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9549: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 108153998 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9550: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9551: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #9552: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9553: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 108153999 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9554: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9555: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #9556: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153995 (0x6724c8b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:14:13 2016 Not After : Fri Jan 08 21:14:13 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:12:fe:ac:a9:39:2e:00:97:2c:c4:26:48:72:0a:b5: 1d:53:3d:b0:cb:c4:f1:d1:7e:b4:c9:f4:ac:89:5b:73: cc:49:31:fd:55:05:7f:c9:4f:9a:d7:7d:07:bc:5f:2a: b3:09:44:2d:4b:26:ef:76:51:42:cc:e6:b3:5b:1e:98: a7:0d:bf:2e:71:6e:be:7b:36:89:8e:12:2f:3a:e0:5e: 41:5c:84:a3:3b:95:91:36:03:78:a1:6e:8f:6c:e9:e0: db:31:c6:df:79:f8:89:80:03:26:81:96:40:91:62:3b: f1:4c:17:2d:09:df:d3:20:11:18:58:aa:c5:bf:91:5a: 56:d2:7f:98:ae:c8:3a:43:51:15:e9:65:2e:64:c1:9d: d0:d5:ef:85:ef:68:ba:07:26:7d:0e:4a:b3:97:57:fd: 4d:99:e6:6d:02:25:16:db:0e:d0:0c:cd:e6:25:31:d1: 5a:71:02:44:db:de:30:6b:59:15:99:88:ba:d1:00:bb: eb:1c:91:b7:de:b8:34:f1:28:e6:3b:4a:19:b9:ad:47: ce:a1:b6:e5:6b:49:67:6d:1b:20:92:93:73:f5:10:ba: af:25:62:e8:54:72:e1:7c:a2:f3:89:18:81:17:3d:01: 16:1e:02:dc:59:0b:f8:18:f9:37:00:00:7f:95:33:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:29:df:d5:94:30:15:62:dd:c8:42:8e:c4:f4:72:ed: 02:d6:e4:c5:9a:1f:d8:ac:2d:0d:02:5a:16:be:e9:26: 60:4e:d5:0b:dd:d1:b1:33:32:a5:3f:11:8f:e0:a2:bb: fe:e7:0f:5d:ce:93:e5:86:9d:25:bb:6e:a0:a1:25:ea: c3:3d:50:0b:9b:ef:74:a0:5e:09:6d:70:e8:e8:26:6b: 73:93:1c:8a:bc:24:37:43:22:11:34:83:ce:ff:17:74: 0e:30:81:94:bd:24:d8:f2:b8:da:49:ac:9d:06:dc:9c: e9:e5:e5:f7:8c:1d:c9:52:8e:ea:ba:d1:31:3b:3a:37: 3e:83:f0:b5:39:55:c3:0e:ed:61:21:d0:13:6b:60:99: 57:0f:70:ac:38:3b:86:34:a5:10:f4:11:53:6f:5a:4e: 65:6e:05:c9:14:8d:92:4b:bd:59:e7:5a:c0:bd:e1:65: 59:29:2f:76:e7:3d:92:88:3f:af:44:35:e4:a1:36:23: 8a:0c:e4:97:62:ce:ed:9e:f6:7c:81:22:f4:01:8d:57: d6:2e:14:df:21:a3:27:c8:7d:59:8a:46:0d:39:a0:fd: 79:9b:ec:bd:86:94:3e:bb:f9:60:44:82:d0:ce:16:4a: ae:c1:e2:35:1a:d1:a4:d0:f9:15:b5:27:68:74:17:90 Fingerprint (SHA-256): EA:30:FF:F7:83:E1:4D:49:6F:59:9D:AB:72:B9:B6:92:6C:9D:23:C3:FB:26:64:D3:61:98:6F:F0:C0:D6:2B:64 Fingerprint (SHA1): AD:07:94:64:30:DC:1C:DE:1F:B1:6A:B7:52:4A:B3:E2:F8:AB:3E:6B Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9557: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9558: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153996 (0x6724c8c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:14:19 2016 Not After : Fri Jan 08 21:14:19 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:32:6e:21:19:6d:c1:a3:2a:e0:a9:43:3d:dd:b1:e8: ba:88:d3:33:f3:70:23:f2:52:24:4b:56:09:62:5c:62: 0b:d9:2f:74:4a:66:9e:4a:47:08:f2:fa:77:e4:f0:22: 63:7f:b0:20:34:b0:ce:f8:2f:69:04:a4:53:b7:13:0f: 4f:c3:c0:8a:23:40:12:ed:2a:75:ca:1d:e0:fd:28:d4: 8a:d0:07:3d:49:fb:a8:de:b7:47:1c:a8:10:fb:1e:1b: 3e:a0:09:d4:e2:9e:08:c2:0b:c5:dd:12:5d:f1:ae:64: 0d:31:45:c9:39:fb:c7:f4:79:54:1f:f5:ba:4a:fe:68: 9f:5f:81:13:44:9d:bf:5c:b8:8b:41:c5:f5:e7:b1:ab: 02:30:54:a0:31:0b:11:9d:c8:70:79:f1:6e:5d:ae:62: 48:3c:60:e4:93:45:09:d3:5b:8e:a7:8b:c2:fd:49:30: 69:a6:db:68:1f:33:22:b1:54:48:17:af:6e:12:2f:66: 25:e7:ac:f1:ae:32:22:ec:7b:ac:b5:4b:de:0d:4f:79: f7:67:04:79:d9:bd:e2:5d:3c:b2:bf:24:fc:9c:97:84: eb:a3:68:2b:b7:fb:95:88:d6:1f:95:1d:73:f7:f8:77: 57:33:67:f5:9f:11:d3:6c:95:84:36:f4:4f:7a:3b:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 57:a6:fc:b6:5c:84:41:0a:73:f8:55:4e:f7:ea:3d:4d: 56:a0:2e:cb:d7:a2:af:35:55:90:91:cd:65:3b:3a:12: e9:83:60:cd:8d:dd:f3:c6:6c:91:e0:b7:ed:76:e8:80: af:2a:18:e6:49:0d:ac:65:ad:cc:7b:34:17:52:92:15: f6:8f:6c:49:cc:8f:52:e2:dd:f8:67:79:6f:34:56:28: 3b:0a:4a:ca:30:8c:bf:e7:d8:9b:76:b4:1f:f5:e5:81: 7f:dc:af:9f:57:d2:29:13:ec:0a:03:b6:82:af:56:30: 22:e1:bd:17:14:5a:6c:4b:e4:fd:45:d7:ca:44:19:b5: 6a:1f:19:28:a9:70:3c:18:49:bd:bd:c2:88:57:32:68: 8d:23:ae:d4:bb:46:74:89:ba:1a:f9:73:0a:bd:b6:f3: 3a:25:25:85:8e:15:96:2b:b5:84:b6:62:b4:65:80:29: f1:53:a5:ce:57:bf:97:94:5a:97:5c:01:c2:31:fc:93: 49:45:c3:52:30:da:dd:81:a0:30:a7:f9:c8:22:0e:44: e0:19:41:27:c7:5e:a3:01:d0:ce:7e:50:0b:41:3d:e4: 07:e8:76:3d:85:1a:7b:a5:e0:97:2a:32:61:26:2a:9a: 5e:e0:86:a5:0a:a6:53:61:00:9c:a5:84:a3:2a:15:5b Fingerprint (SHA-256): 95:0C:EA:32:53:AE:A4:17:E6:5D:EA:63:4A:69:B8:9E:78:24:43:14:02:47:7B:1E:0F:61:BC:1E:8B:02:ED:9E Fingerprint (SHA1): 78:6C:78:81:03:52:6D:25:38:80:4F:22:CD:74:03:7A:AE:A8:9A:D1 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #9559: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9560: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153997 (0x6724c8d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 21:14:24 2016 Not After : Fri Jan 08 21:14:24 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:be:d5:8a:bc:b5:9a:76:c9:4a:93:f1:96:f7:58:88: 28:42:81:5c:0c:db:dc:83:11:92:70:54:89:0d:82:d1: 2a:10:6b:fa:7b:31:d5:fc:21:fc:2a:b1:04:8d:dc:a8: 85:0d:7f:d3:0a:6d:9a:75:99:c4:73:34:51:ae:95:bf: 5a:04:5b:fc:31:ac:a9:24:a9:89:eb:89:86:dd:f2:12: 34:13:a4:b6:48:a7:52:c5:90:bf:9f:b6:e1:c4:dc:0e: e4:b8:13:5a:8f:9d:f4:42:3a:7c:17:c2:eb:31:dc:b3: ba:16:62:31:08:b4:5e:ee:eb:b9:1e:dd:d5:4f:1c:ca: 59:1b:25:14:09:44:e6:e5:28:40:3e:38:24:25:e9:c0: 24:b5:91:2c:27:e2:ba:f4:e5:e2:8c:bf:5c:8f:e7:d4: 89:ab:c1:72:92:50:97:5a:75:89:b7:a2:43:15:74:3c: 3a:2d:05:08:97:70:ae:0d:f9:c0:d0:23:a8:8b:85:7f: 45:4e:8a:5d:99:54:59:00:9e:5e:09:b8:71:96:61:e0: f9:3b:e3:6a:dc:06:d5:a4:91:ac:ca:63:bb:33:9f:42: 45:77:fc:2b:a3:ad:b3:51:86:bd:cd:95:eb:8a:68:e3: 7f:43:c7:c0:43:07:bd:21:bd:bf:9c:a8:16:ae:fb:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:68:0b:62:64:3b:38:f6:7d:d9:e4:06:dc:3d:83:9c: 2c:fc:5e:ea:9a:d5:05:df:d5:3d:7e:ba:cc:7a:2a:70: 6f:15:65:73:0a:17:d0:6b:a5:44:e9:2b:a3:9a:d5:ad: fb:ca:4b:54:5a:2d:c2:55:36:2b:a9:23:33:63:46:cc: b4:9e:b6:3b:f9:fb:e1:f0:b3:1e:ac:d2:a9:d4:5e:da: a4:0b:0f:01:bd:63:6f:98:13:c1:0d:b1:47:74:8e:71: 23:54:61:48:b0:13:f4:e0:26:a9:6f:98:5a:82:28:5f: bd:52:f8:b4:39:3e:15:2e:3d:e2:d4:42:b4:90:c8:66: ba:01:0d:f6:0f:2d:a5:c0:28:96:5c:a0:da:6a:45:1c: cb:27:de:e5:d7:11:e5:c1:2f:47:a2:75:dc:f3:b7:f5: 16:77:d6:bd:d3:bb:bd:4a:64:e6:6d:4a:5e:3b:ad:c0: c0:67:3a:52:1f:4e:0c:94:b7:40:61:87:4d:2e:9c:b4: 60:10:34:43:ab:14:08:b9:b2:f0:14:1a:11:42:b4:08: ad:b6:db:47:90:38:92:7b:56:5a:17:2e:99:e7:87:f4: d2:77:d3:66:14:9f:b9:a3:72:be:6d:33:f4:7b:bd:76: 92:17:22:ed:ea:e8:a5:9b:b4:05:6b:44:3a:fe:70:4f Fingerprint (SHA-256): CF:32:AA:24:B7:02:D8:72:C3:E1:3F:E1:9F:DD:C2:51:B1:CE:B2:CF:48:73:8D:ED:E5:D5:4B:37:02:69:9E:53 Fingerprint (SHA1): 91:4D:A9:D7:1A:29:C6:1B:94:A3:85:CA:02:B6:0D:9E:08:E1:6B:9E Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #9561: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9562: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #9563: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #9564: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #9565: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153995 (0x6724c8b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:14:13 2016 Not After : Fri Jan 08 21:14:13 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:12:fe:ac:a9:39:2e:00:97:2c:c4:26:48:72:0a:b5: 1d:53:3d:b0:cb:c4:f1:d1:7e:b4:c9:f4:ac:89:5b:73: cc:49:31:fd:55:05:7f:c9:4f:9a:d7:7d:07:bc:5f:2a: b3:09:44:2d:4b:26:ef:76:51:42:cc:e6:b3:5b:1e:98: a7:0d:bf:2e:71:6e:be:7b:36:89:8e:12:2f:3a:e0:5e: 41:5c:84:a3:3b:95:91:36:03:78:a1:6e:8f:6c:e9:e0: db:31:c6:df:79:f8:89:80:03:26:81:96:40:91:62:3b: f1:4c:17:2d:09:df:d3:20:11:18:58:aa:c5:bf:91:5a: 56:d2:7f:98:ae:c8:3a:43:51:15:e9:65:2e:64:c1:9d: d0:d5:ef:85:ef:68:ba:07:26:7d:0e:4a:b3:97:57:fd: 4d:99:e6:6d:02:25:16:db:0e:d0:0c:cd:e6:25:31:d1: 5a:71:02:44:db:de:30:6b:59:15:99:88:ba:d1:00:bb: eb:1c:91:b7:de:b8:34:f1:28:e6:3b:4a:19:b9:ad:47: ce:a1:b6:e5:6b:49:67:6d:1b:20:92:93:73:f5:10:ba: af:25:62:e8:54:72:e1:7c:a2:f3:89:18:81:17:3d:01: 16:1e:02:dc:59:0b:f8:18:f9:37:00:00:7f:95:33:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:29:df:d5:94:30:15:62:dd:c8:42:8e:c4:f4:72:ed: 02:d6:e4:c5:9a:1f:d8:ac:2d:0d:02:5a:16:be:e9:26: 60:4e:d5:0b:dd:d1:b1:33:32:a5:3f:11:8f:e0:a2:bb: fe:e7:0f:5d:ce:93:e5:86:9d:25:bb:6e:a0:a1:25:ea: c3:3d:50:0b:9b:ef:74:a0:5e:09:6d:70:e8:e8:26:6b: 73:93:1c:8a:bc:24:37:43:22:11:34:83:ce:ff:17:74: 0e:30:81:94:bd:24:d8:f2:b8:da:49:ac:9d:06:dc:9c: e9:e5:e5:f7:8c:1d:c9:52:8e:ea:ba:d1:31:3b:3a:37: 3e:83:f0:b5:39:55:c3:0e:ed:61:21:d0:13:6b:60:99: 57:0f:70:ac:38:3b:86:34:a5:10:f4:11:53:6f:5a:4e: 65:6e:05:c9:14:8d:92:4b:bd:59:e7:5a:c0:bd:e1:65: 59:29:2f:76:e7:3d:92:88:3f:af:44:35:e4:a1:36:23: 8a:0c:e4:97:62:ce:ed:9e:f6:7c:81:22:f4:01:8d:57: d6:2e:14:df:21:a3:27:c8:7d:59:8a:46:0d:39:a0:fd: 79:9b:ec:bd:86:94:3e:bb:f9:60:44:82:d0:ce:16:4a: ae:c1:e2:35:1a:d1:a4:d0:f9:15:b5:27:68:74:17:90 Fingerprint (SHA-256): EA:30:FF:F7:83:E1:4D:49:6F:59:9D:AB:72:B9:B6:92:6C:9D:23:C3:FB:26:64:D3:61:98:6F:F0:C0:D6:2B:64 Fingerprint (SHA1): AD:07:94:64:30:DC:1C:DE:1F:B1:6A:B7:52:4A:B3:E2:F8:AB:3E:6B Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9566: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9567: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153996 (0x6724c8c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:14:19 2016 Not After : Fri Jan 08 21:14:19 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:32:6e:21:19:6d:c1:a3:2a:e0:a9:43:3d:dd:b1:e8: ba:88:d3:33:f3:70:23:f2:52:24:4b:56:09:62:5c:62: 0b:d9:2f:74:4a:66:9e:4a:47:08:f2:fa:77:e4:f0:22: 63:7f:b0:20:34:b0:ce:f8:2f:69:04:a4:53:b7:13:0f: 4f:c3:c0:8a:23:40:12:ed:2a:75:ca:1d:e0:fd:28:d4: 8a:d0:07:3d:49:fb:a8:de:b7:47:1c:a8:10:fb:1e:1b: 3e:a0:09:d4:e2:9e:08:c2:0b:c5:dd:12:5d:f1:ae:64: 0d:31:45:c9:39:fb:c7:f4:79:54:1f:f5:ba:4a:fe:68: 9f:5f:81:13:44:9d:bf:5c:b8:8b:41:c5:f5:e7:b1:ab: 02:30:54:a0:31:0b:11:9d:c8:70:79:f1:6e:5d:ae:62: 48:3c:60:e4:93:45:09:d3:5b:8e:a7:8b:c2:fd:49:30: 69:a6:db:68:1f:33:22:b1:54:48:17:af:6e:12:2f:66: 25:e7:ac:f1:ae:32:22:ec:7b:ac:b5:4b:de:0d:4f:79: f7:67:04:79:d9:bd:e2:5d:3c:b2:bf:24:fc:9c:97:84: eb:a3:68:2b:b7:fb:95:88:d6:1f:95:1d:73:f7:f8:77: 57:33:67:f5:9f:11:d3:6c:95:84:36:f4:4f:7a:3b:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 57:a6:fc:b6:5c:84:41:0a:73:f8:55:4e:f7:ea:3d:4d: 56:a0:2e:cb:d7:a2:af:35:55:90:91:cd:65:3b:3a:12: e9:83:60:cd:8d:dd:f3:c6:6c:91:e0:b7:ed:76:e8:80: af:2a:18:e6:49:0d:ac:65:ad:cc:7b:34:17:52:92:15: f6:8f:6c:49:cc:8f:52:e2:dd:f8:67:79:6f:34:56:28: 3b:0a:4a:ca:30:8c:bf:e7:d8:9b:76:b4:1f:f5:e5:81: 7f:dc:af:9f:57:d2:29:13:ec:0a:03:b6:82:af:56:30: 22:e1:bd:17:14:5a:6c:4b:e4:fd:45:d7:ca:44:19:b5: 6a:1f:19:28:a9:70:3c:18:49:bd:bd:c2:88:57:32:68: 8d:23:ae:d4:bb:46:74:89:ba:1a:f9:73:0a:bd:b6:f3: 3a:25:25:85:8e:15:96:2b:b5:84:b6:62:b4:65:80:29: f1:53:a5:ce:57:bf:97:94:5a:97:5c:01:c2:31:fc:93: 49:45:c3:52:30:da:dd:81:a0:30:a7:f9:c8:22:0e:44: e0:19:41:27:c7:5e:a3:01:d0:ce:7e:50:0b:41:3d:e4: 07:e8:76:3d:85:1a:7b:a5:e0:97:2a:32:61:26:2a:9a: 5e:e0:86:a5:0a:a6:53:61:00:9c:a5:84:a3:2a:15:5b Fingerprint (SHA-256): 95:0C:EA:32:53:AE:A4:17:E6:5D:EA:63:4A:69:B8:9E:78:24:43:14:02:47:7B:1E:0F:61:BC:1E:8B:02:ED:9E Fingerprint (SHA1): 78:6C:78:81:03:52:6D:25:38:80:4F:22:CD:74:03:7A:AE:A8:9A:D1 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #9568: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9569: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153997 (0x6724c8d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 21:14:24 2016 Not After : Fri Jan 08 21:14:24 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:be:d5:8a:bc:b5:9a:76:c9:4a:93:f1:96:f7:58:88: 28:42:81:5c:0c:db:dc:83:11:92:70:54:89:0d:82:d1: 2a:10:6b:fa:7b:31:d5:fc:21:fc:2a:b1:04:8d:dc:a8: 85:0d:7f:d3:0a:6d:9a:75:99:c4:73:34:51:ae:95:bf: 5a:04:5b:fc:31:ac:a9:24:a9:89:eb:89:86:dd:f2:12: 34:13:a4:b6:48:a7:52:c5:90:bf:9f:b6:e1:c4:dc:0e: e4:b8:13:5a:8f:9d:f4:42:3a:7c:17:c2:eb:31:dc:b3: ba:16:62:31:08:b4:5e:ee:eb:b9:1e:dd:d5:4f:1c:ca: 59:1b:25:14:09:44:e6:e5:28:40:3e:38:24:25:e9:c0: 24:b5:91:2c:27:e2:ba:f4:e5:e2:8c:bf:5c:8f:e7:d4: 89:ab:c1:72:92:50:97:5a:75:89:b7:a2:43:15:74:3c: 3a:2d:05:08:97:70:ae:0d:f9:c0:d0:23:a8:8b:85:7f: 45:4e:8a:5d:99:54:59:00:9e:5e:09:b8:71:96:61:e0: f9:3b:e3:6a:dc:06:d5:a4:91:ac:ca:63:bb:33:9f:42: 45:77:fc:2b:a3:ad:b3:51:86:bd:cd:95:eb:8a:68:e3: 7f:43:c7:c0:43:07:bd:21:bd:bf:9c:a8:16:ae:fb:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:68:0b:62:64:3b:38:f6:7d:d9:e4:06:dc:3d:83:9c: 2c:fc:5e:ea:9a:d5:05:df:d5:3d:7e:ba:cc:7a:2a:70: 6f:15:65:73:0a:17:d0:6b:a5:44:e9:2b:a3:9a:d5:ad: fb:ca:4b:54:5a:2d:c2:55:36:2b:a9:23:33:63:46:cc: b4:9e:b6:3b:f9:fb:e1:f0:b3:1e:ac:d2:a9:d4:5e:da: a4:0b:0f:01:bd:63:6f:98:13:c1:0d:b1:47:74:8e:71: 23:54:61:48:b0:13:f4:e0:26:a9:6f:98:5a:82:28:5f: bd:52:f8:b4:39:3e:15:2e:3d:e2:d4:42:b4:90:c8:66: ba:01:0d:f6:0f:2d:a5:c0:28:96:5c:a0:da:6a:45:1c: cb:27:de:e5:d7:11:e5:c1:2f:47:a2:75:dc:f3:b7:f5: 16:77:d6:bd:d3:bb:bd:4a:64:e6:6d:4a:5e:3b:ad:c0: c0:67:3a:52:1f:4e:0c:94:b7:40:61:87:4d:2e:9c:b4: 60:10:34:43:ab:14:08:b9:b2:f0:14:1a:11:42:b4:08: ad:b6:db:47:90:38:92:7b:56:5a:17:2e:99:e7:87:f4: d2:77:d3:66:14:9f:b9:a3:72:be:6d:33:f4:7b:bd:76: 92:17:22:ed:ea:e8:a5:9b:b4:05:6b:44:3a:fe:70:4f Fingerprint (SHA-256): CF:32:AA:24:B7:02:D8:72:C3:E1:3F:E1:9F:DD:C2:51:B1:CE:B2:CF:48:73:8D:ED:E5:D5:4B:37:02:69:9E:53 Fingerprint (SHA1): 91:4D:A9:D7:1A:29:C6:1B:94:A3:85:CA:02:B6:0D:9E:08:E1:6B:9E Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #9570: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9571: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153995 (0x6724c8b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:14:13 2016 Not After : Fri Jan 08 21:14:13 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:12:fe:ac:a9:39:2e:00:97:2c:c4:26:48:72:0a:b5: 1d:53:3d:b0:cb:c4:f1:d1:7e:b4:c9:f4:ac:89:5b:73: cc:49:31:fd:55:05:7f:c9:4f:9a:d7:7d:07:bc:5f:2a: b3:09:44:2d:4b:26:ef:76:51:42:cc:e6:b3:5b:1e:98: a7:0d:bf:2e:71:6e:be:7b:36:89:8e:12:2f:3a:e0:5e: 41:5c:84:a3:3b:95:91:36:03:78:a1:6e:8f:6c:e9:e0: db:31:c6:df:79:f8:89:80:03:26:81:96:40:91:62:3b: f1:4c:17:2d:09:df:d3:20:11:18:58:aa:c5:bf:91:5a: 56:d2:7f:98:ae:c8:3a:43:51:15:e9:65:2e:64:c1:9d: d0:d5:ef:85:ef:68:ba:07:26:7d:0e:4a:b3:97:57:fd: 4d:99:e6:6d:02:25:16:db:0e:d0:0c:cd:e6:25:31:d1: 5a:71:02:44:db:de:30:6b:59:15:99:88:ba:d1:00:bb: eb:1c:91:b7:de:b8:34:f1:28:e6:3b:4a:19:b9:ad:47: ce:a1:b6:e5:6b:49:67:6d:1b:20:92:93:73:f5:10:ba: af:25:62:e8:54:72:e1:7c:a2:f3:89:18:81:17:3d:01: 16:1e:02:dc:59:0b:f8:18:f9:37:00:00:7f:95:33:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:29:df:d5:94:30:15:62:dd:c8:42:8e:c4:f4:72:ed: 02:d6:e4:c5:9a:1f:d8:ac:2d:0d:02:5a:16:be:e9:26: 60:4e:d5:0b:dd:d1:b1:33:32:a5:3f:11:8f:e0:a2:bb: fe:e7:0f:5d:ce:93:e5:86:9d:25:bb:6e:a0:a1:25:ea: c3:3d:50:0b:9b:ef:74:a0:5e:09:6d:70:e8:e8:26:6b: 73:93:1c:8a:bc:24:37:43:22:11:34:83:ce:ff:17:74: 0e:30:81:94:bd:24:d8:f2:b8:da:49:ac:9d:06:dc:9c: e9:e5:e5:f7:8c:1d:c9:52:8e:ea:ba:d1:31:3b:3a:37: 3e:83:f0:b5:39:55:c3:0e:ed:61:21:d0:13:6b:60:99: 57:0f:70:ac:38:3b:86:34:a5:10:f4:11:53:6f:5a:4e: 65:6e:05:c9:14:8d:92:4b:bd:59:e7:5a:c0:bd:e1:65: 59:29:2f:76:e7:3d:92:88:3f:af:44:35:e4:a1:36:23: 8a:0c:e4:97:62:ce:ed:9e:f6:7c:81:22:f4:01:8d:57: d6:2e:14:df:21:a3:27:c8:7d:59:8a:46:0d:39:a0:fd: 79:9b:ec:bd:86:94:3e:bb:f9:60:44:82:d0:ce:16:4a: ae:c1:e2:35:1a:d1:a4:d0:f9:15:b5:27:68:74:17:90 Fingerprint (SHA-256): EA:30:FF:F7:83:E1:4D:49:6F:59:9D:AB:72:B9:B6:92:6C:9D:23:C3:FB:26:64:D3:61:98:6F:F0:C0:D6:2B:64 Fingerprint (SHA1): AD:07:94:64:30:DC:1C:DE:1F:B1:6A:B7:52:4A:B3:E2:F8:AB:3E:6B Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9572: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153995 (0x6724c8b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:14:13 2016 Not After : Fri Jan 08 21:14:13 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:12:fe:ac:a9:39:2e:00:97:2c:c4:26:48:72:0a:b5: 1d:53:3d:b0:cb:c4:f1:d1:7e:b4:c9:f4:ac:89:5b:73: cc:49:31:fd:55:05:7f:c9:4f:9a:d7:7d:07:bc:5f:2a: b3:09:44:2d:4b:26:ef:76:51:42:cc:e6:b3:5b:1e:98: a7:0d:bf:2e:71:6e:be:7b:36:89:8e:12:2f:3a:e0:5e: 41:5c:84:a3:3b:95:91:36:03:78:a1:6e:8f:6c:e9:e0: db:31:c6:df:79:f8:89:80:03:26:81:96:40:91:62:3b: f1:4c:17:2d:09:df:d3:20:11:18:58:aa:c5:bf:91:5a: 56:d2:7f:98:ae:c8:3a:43:51:15:e9:65:2e:64:c1:9d: d0:d5:ef:85:ef:68:ba:07:26:7d:0e:4a:b3:97:57:fd: 4d:99:e6:6d:02:25:16:db:0e:d0:0c:cd:e6:25:31:d1: 5a:71:02:44:db:de:30:6b:59:15:99:88:ba:d1:00:bb: eb:1c:91:b7:de:b8:34:f1:28:e6:3b:4a:19:b9:ad:47: ce:a1:b6:e5:6b:49:67:6d:1b:20:92:93:73:f5:10:ba: af:25:62:e8:54:72:e1:7c:a2:f3:89:18:81:17:3d:01: 16:1e:02:dc:59:0b:f8:18:f9:37:00:00:7f:95:33:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:29:df:d5:94:30:15:62:dd:c8:42:8e:c4:f4:72:ed: 02:d6:e4:c5:9a:1f:d8:ac:2d:0d:02:5a:16:be:e9:26: 60:4e:d5:0b:dd:d1:b1:33:32:a5:3f:11:8f:e0:a2:bb: fe:e7:0f:5d:ce:93:e5:86:9d:25:bb:6e:a0:a1:25:ea: c3:3d:50:0b:9b:ef:74:a0:5e:09:6d:70:e8:e8:26:6b: 73:93:1c:8a:bc:24:37:43:22:11:34:83:ce:ff:17:74: 0e:30:81:94:bd:24:d8:f2:b8:da:49:ac:9d:06:dc:9c: e9:e5:e5:f7:8c:1d:c9:52:8e:ea:ba:d1:31:3b:3a:37: 3e:83:f0:b5:39:55:c3:0e:ed:61:21:d0:13:6b:60:99: 57:0f:70:ac:38:3b:86:34:a5:10:f4:11:53:6f:5a:4e: 65:6e:05:c9:14:8d:92:4b:bd:59:e7:5a:c0:bd:e1:65: 59:29:2f:76:e7:3d:92:88:3f:af:44:35:e4:a1:36:23: 8a:0c:e4:97:62:ce:ed:9e:f6:7c:81:22:f4:01:8d:57: d6:2e:14:df:21:a3:27:c8:7d:59:8a:46:0d:39:a0:fd: 79:9b:ec:bd:86:94:3e:bb:f9:60:44:82:d0:ce:16:4a: ae:c1:e2:35:1a:d1:a4:d0:f9:15:b5:27:68:74:17:90 Fingerprint (SHA-256): EA:30:FF:F7:83:E1:4D:49:6F:59:9D:AB:72:B9:B6:92:6C:9D:23:C3:FB:26:64:D3:61:98:6F:F0:C0:D6:2B:64 Fingerprint (SHA1): AD:07:94:64:30:DC:1C:DE:1F:B1:6A:B7:52:4A:B3:E2:F8:AB:3E:6B Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9573: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153996 (0x6724c8c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:14:19 2016 Not After : Fri Jan 08 21:14:19 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:32:6e:21:19:6d:c1:a3:2a:e0:a9:43:3d:dd:b1:e8: ba:88:d3:33:f3:70:23:f2:52:24:4b:56:09:62:5c:62: 0b:d9:2f:74:4a:66:9e:4a:47:08:f2:fa:77:e4:f0:22: 63:7f:b0:20:34:b0:ce:f8:2f:69:04:a4:53:b7:13:0f: 4f:c3:c0:8a:23:40:12:ed:2a:75:ca:1d:e0:fd:28:d4: 8a:d0:07:3d:49:fb:a8:de:b7:47:1c:a8:10:fb:1e:1b: 3e:a0:09:d4:e2:9e:08:c2:0b:c5:dd:12:5d:f1:ae:64: 0d:31:45:c9:39:fb:c7:f4:79:54:1f:f5:ba:4a:fe:68: 9f:5f:81:13:44:9d:bf:5c:b8:8b:41:c5:f5:e7:b1:ab: 02:30:54:a0:31:0b:11:9d:c8:70:79:f1:6e:5d:ae:62: 48:3c:60:e4:93:45:09:d3:5b:8e:a7:8b:c2:fd:49:30: 69:a6:db:68:1f:33:22:b1:54:48:17:af:6e:12:2f:66: 25:e7:ac:f1:ae:32:22:ec:7b:ac:b5:4b:de:0d:4f:79: f7:67:04:79:d9:bd:e2:5d:3c:b2:bf:24:fc:9c:97:84: eb:a3:68:2b:b7:fb:95:88:d6:1f:95:1d:73:f7:f8:77: 57:33:67:f5:9f:11:d3:6c:95:84:36:f4:4f:7a:3b:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 57:a6:fc:b6:5c:84:41:0a:73:f8:55:4e:f7:ea:3d:4d: 56:a0:2e:cb:d7:a2:af:35:55:90:91:cd:65:3b:3a:12: e9:83:60:cd:8d:dd:f3:c6:6c:91:e0:b7:ed:76:e8:80: af:2a:18:e6:49:0d:ac:65:ad:cc:7b:34:17:52:92:15: f6:8f:6c:49:cc:8f:52:e2:dd:f8:67:79:6f:34:56:28: 3b:0a:4a:ca:30:8c:bf:e7:d8:9b:76:b4:1f:f5:e5:81: 7f:dc:af:9f:57:d2:29:13:ec:0a:03:b6:82:af:56:30: 22:e1:bd:17:14:5a:6c:4b:e4:fd:45:d7:ca:44:19:b5: 6a:1f:19:28:a9:70:3c:18:49:bd:bd:c2:88:57:32:68: 8d:23:ae:d4:bb:46:74:89:ba:1a:f9:73:0a:bd:b6:f3: 3a:25:25:85:8e:15:96:2b:b5:84:b6:62:b4:65:80:29: f1:53:a5:ce:57:bf:97:94:5a:97:5c:01:c2:31:fc:93: 49:45:c3:52:30:da:dd:81:a0:30:a7:f9:c8:22:0e:44: e0:19:41:27:c7:5e:a3:01:d0:ce:7e:50:0b:41:3d:e4: 07:e8:76:3d:85:1a:7b:a5:e0:97:2a:32:61:26:2a:9a: 5e:e0:86:a5:0a:a6:53:61:00:9c:a5:84:a3:2a:15:5b Fingerprint (SHA-256): 95:0C:EA:32:53:AE:A4:17:E6:5D:EA:63:4A:69:B8:9E:78:24:43:14:02:47:7B:1E:0F:61:BC:1E:8B:02:ED:9E Fingerprint (SHA1): 78:6C:78:81:03:52:6D:25:38:80:4F:22:CD:74:03:7A:AE:A8:9A:D1 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #9574: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153996 (0x6724c8c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:14:19 2016 Not After : Fri Jan 08 21:14:19 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:32:6e:21:19:6d:c1:a3:2a:e0:a9:43:3d:dd:b1:e8: ba:88:d3:33:f3:70:23:f2:52:24:4b:56:09:62:5c:62: 0b:d9:2f:74:4a:66:9e:4a:47:08:f2:fa:77:e4:f0:22: 63:7f:b0:20:34:b0:ce:f8:2f:69:04:a4:53:b7:13:0f: 4f:c3:c0:8a:23:40:12:ed:2a:75:ca:1d:e0:fd:28:d4: 8a:d0:07:3d:49:fb:a8:de:b7:47:1c:a8:10:fb:1e:1b: 3e:a0:09:d4:e2:9e:08:c2:0b:c5:dd:12:5d:f1:ae:64: 0d:31:45:c9:39:fb:c7:f4:79:54:1f:f5:ba:4a:fe:68: 9f:5f:81:13:44:9d:bf:5c:b8:8b:41:c5:f5:e7:b1:ab: 02:30:54:a0:31:0b:11:9d:c8:70:79:f1:6e:5d:ae:62: 48:3c:60:e4:93:45:09:d3:5b:8e:a7:8b:c2:fd:49:30: 69:a6:db:68:1f:33:22:b1:54:48:17:af:6e:12:2f:66: 25:e7:ac:f1:ae:32:22:ec:7b:ac:b5:4b:de:0d:4f:79: f7:67:04:79:d9:bd:e2:5d:3c:b2:bf:24:fc:9c:97:84: eb:a3:68:2b:b7:fb:95:88:d6:1f:95:1d:73:f7:f8:77: 57:33:67:f5:9f:11:d3:6c:95:84:36:f4:4f:7a:3b:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 57:a6:fc:b6:5c:84:41:0a:73:f8:55:4e:f7:ea:3d:4d: 56:a0:2e:cb:d7:a2:af:35:55:90:91:cd:65:3b:3a:12: e9:83:60:cd:8d:dd:f3:c6:6c:91:e0:b7:ed:76:e8:80: af:2a:18:e6:49:0d:ac:65:ad:cc:7b:34:17:52:92:15: f6:8f:6c:49:cc:8f:52:e2:dd:f8:67:79:6f:34:56:28: 3b:0a:4a:ca:30:8c:bf:e7:d8:9b:76:b4:1f:f5:e5:81: 7f:dc:af:9f:57:d2:29:13:ec:0a:03:b6:82:af:56:30: 22:e1:bd:17:14:5a:6c:4b:e4:fd:45:d7:ca:44:19:b5: 6a:1f:19:28:a9:70:3c:18:49:bd:bd:c2:88:57:32:68: 8d:23:ae:d4:bb:46:74:89:ba:1a:f9:73:0a:bd:b6:f3: 3a:25:25:85:8e:15:96:2b:b5:84:b6:62:b4:65:80:29: f1:53:a5:ce:57:bf:97:94:5a:97:5c:01:c2:31:fc:93: 49:45:c3:52:30:da:dd:81:a0:30:a7:f9:c8:22:0e:44: e0:19:41:27:c7:5e:a3:01:d0:ce:7e:50:0b:41:3d:e4: 07:e8:76:3d:85:1a:7b:a5:e0:97:2a:32:61:26:2a:9a: 5e:e0:86:a5:0a:a6:53:61:00:9c:a5:84:a3:2a:15:5b Fingerprint (SHA-256): 95:0C:EA:32:53:AE:A4:17:E6:5D:EA:63:4A:69:B8:9E:78:24:43:14:02:47:7B:1E:0F:61:BC:1E:8B:02:ED:9E Fingerprint (SHA1): 78:6C:78:81:03:52:6D:25:38:80:4F:22:CD:74:03:7A:AE:A8:9A:D1 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #9575: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153997 (0x6724c8d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 21:14:24 2016 Not After : Fri Jan 08 21:14:24 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:be:d5:8a:bc:b5:9a:76:c9:4a:93:f1:96:f7:58:88: 28:42:81:5c:0c:db:dc:83:11:92:70:54:89:0d:82:d1: 2a:10:6b:fa:7b:31:d5:fc:21:fc:2a:b1:04:8d:dc:a8: 85:0d:7f:d3:0a:6d:9a:75:99:c4:73:34:51:ae:95:bf: 5a:04:5b:fc:31:ac:a9:24:a9:89:eb:89:86:dd:f2:12: 34:13:a4:b6:48:a7:52:c5:90:bf:9f:b6:e1:c4:dc:0e: e4:b8:13:5a:8f:9d:f4:42:3a:7c:17:c2:eb:31:dc:b3: ba:16:62:31:08:b4:5e:ee:eb:b9:1e:dd:d5:4f:1c:ca: 59:1b:25:14:09:44:e6:e5:28:40:3e:38:24:25:e9:c0: 24:b5:91:2c:27:e2:ba:f4:e5:e2:8c:bf:5c:8f:e7:d4: 89:ab:c1:72:92:50:97:5a:75:89:b7:a2:43:15:74:3c: 3a:2d:05:08:97:70:ae:0d:f9:c0:d0:23:a8:8b:85:7f: 45:4e:8a:5d:99:54:59:00:9e:5e:09:b8:71:96:61:e0: f9:3b:e3:6a:dc:06:d5:a4:91:ac:ca:63:bb:33:9f:42: 45:77:fc:2b:a3:ad:b3:51:86:bd:cd:95:eb:8a:68:e3: 7f:43:c7:c0:43:07:bd:21:bd:bf:9c:a8:16:ae:fb:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:68:0b:62:64:3b:38:f6:7d:d9:e4:06:dc:3d:83:9c: 2c:fc:5e:ea:9a:d5:05:df:d5:3d:7e:ba:cc:7a:2a:70: 6f:15:65:73:0a:17:d0:6b:a5:44:e9:2b:a3:9a:d5:ad: fb:ca:4b:54:5a:2d:c2:55:36:2b:a9:23:33:63:46:cc: b4:9e:b6:3b:f9:fb:e1:f0:b3:1e:ac:d2:a9:d4:5e:da: a4:0b:0f:01:bd:63:6f:98:13:c1:0d:b1:47:74:8e:71: 23:54:61:48:b0:13:f4:e0:26:a9:6f:98:5a:82:28:5f: bd:52:f8:b4:39:3e:15:2e:3d:e2:d4:42:b4:90:c8:66: ba:01:0d:f6:0f:2d:a5:c0:28:96:5c:a0:da:6a:45:1c: cb:27:de:e5:d7:11:e5:c1:2f:47:a2:75:dc:f3:b7:f5: 16:77:d6:bd:d3:bb:bd:4a:64:e6:6d:4a:5e:3b:ad:c0: c0:67:3a:52:1f:4e:0c:94:b7:40:61:87:4d:2e:9c:b4: 60:10:34:43:ab:14:08:b9:b2:f0:14:1a:11:42:b4:08: ad:b6:db:47:90:38:92:7b:56:5a:17:2e:99:e7:87:f4: d2:77:d3:66:14:9f:b9:a3:72:be:6d:33:f4:7b:bd:76: 92:17:22:ed:ea:e8:a5:9b:b4:05:6b:44:3a:fe:70:4f Fingerprint (SHA-256): CF:32:AA:24:B7:02:D8:72:C3:E1:3F:E1:9F:DD:C2:51:B1:CE:B2:CF:48:73:8D:ED:E5:D5:4B:37:02:69:9E:53 Fingerprint (SHA1): 91:4D:A9:D7:1A:29:C6:1B:94:A3:85:CA:02:B6:0D:9E:08:E1:6B:9E Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #9576: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108153997 (0x6724c8d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 21:14:24 2016 Not After : Fri Jan 08 21:14:24 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:be:d5:8a:bc:b5:9a:76:c9:4a:93:f1:96:f7:58:88: 28:42:81:5c:0c:db:dc:83:11:92:70:54:89:0d:82:d1: 2a:10:6b:fa:7b:31:d5:fc:21:fc:2a:b1:04:8d:dc:a8: 85:0d:7f:d3:0a:6d:9a:75:99:c4:73:34:51:ae:95:bf: 5a:04:5b:fc:31:ac:a9:24:a9:89:eb:89:86:dd:f2:12: 34:13:a4:b6:48:a7:52:c5:90:bf:9f:b6:e1:c4:dc:0e: e4:b8:13:5a:8f:9d:f4:42:3a:7c:17:c2:eb:31:dc:b3: ba:16:62:31:08:b4:5e:ee:eb:b9:1e:dd:d5:4f:1c:ca: 59:1b:25:14:09:44:e6:e5:28:40:3e:38:24:25:e9:c0: 24:b5:91:2c:27:e2:ba:f4:e5:e2:8c:bf:5c:8f:e7:d4: 89:ab:c1:72:92:50:97:5a:75:89:b7:a2:43:15:74:3c: 3a:2d:05:08:97:70:ae:0d:f9:c0:d0:23:a8:8b:85:7f: 45:4e:8a:5d:99:54:59:00:9e:5e:09:b8:71:96:61:e0: f9:3b:e3:6a:dc:06:d5:a4:91:ac:ca:63:bb:33:9f:42: 45:77:fc:2b:a3:ad:b3:51:86:bd:cd:95:eb:8a:68:e3: 7f:43:c7:c0:43:07:bd:21:bd:bf:9c:a8:16:ae:fb:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:68:0b:62:64:3b:38:f6:7d:d9:e4:06:dc:3d:83:9c: 2c:fc:5e:ea:9a:d5:05:df:d5:3d:7e:ba:cc:7a:2a:70: 6f:15:65:73:0a:17:d0:6b:a5:44:e9:2b:a3:9a:d5:ad: fb:ca:4b:54:5a:2d:c2:55:36:2b:a9:23:33:63:46:cc: b4:9e:b6:3b:f9:fb:e1:f0:b3:1e:ac:d2:a9:d4:5e:da: a4:0b:0f:01:bd:63:6f:98:13:c1:0d:b1:47:74:8e:71: 23:54:61:48:b0:13:f4:e0:26:a9:6f:98:5a:82:28:5f: bd:52:f8:b4:39:3e:15:2e:3d:e2:d4:42:b4:90:c8:66: ba:01:0d:f6:0f:2d:a5:c0:28:96:5c:a0:da:6a:45:1c: cb:27:de:e5:d7:11:e5:c1:2f:47:a2:75:dc:f3:b7:f5: 16:77:d6:bd:d3:bb:bd:4a:64:e6:6d:4a:5e:3b:ad:c0: c0:67:3a:52:1f:4e:0c:94:b7:40:61:87:4d:2e:9c:b4: 60:10:34:43:ab:14:08:b9:b2:f0:14:1a:11:42:b4:08: ad:b6:db:47:90:38:92:7b:56:5a:17:2e:99:e7:87:f4: d2:77:d3:66:14:9f:b9:a3:72:be:6d:33:f4:7b:bd:76: 92:17:22:ed:ea:e8:a5:9b:b4:05:6b:44:3a:fe:70:4f Fingerprint (SHA-256): CF:32:AA:24:B7:02:D8:72:C3:E1:3F:E1:9F:DD:C2:51:B1:CE:B2:CF:48:73:8D:ED:E5:D5:4B:37:02:69:9E:53 Fingerprint (SHA1): 91:4D:A9:D7:1A:29:C6:1B:94:A3:85:CA:02:B6:0D:9E:08:E1:6B:9E Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #9577: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #9578: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108154000 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9579: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #9580: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9581: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9582: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108154001 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9583: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9584: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #9585: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9586: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108154002 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #9587: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9588: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #9589: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9590: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 108154003 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9591: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9592: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #9593: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9594: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 108154004 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9595: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9596: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #9597: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9598: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 108154005 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9599: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9600: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #9601: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9602: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 108154006 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9603: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9604: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #9605: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #9606: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #9607: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #9608: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #9609: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154000 (0x6724c90) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 21:15:09 2016 Not After : Fri Jan 08 21:15:09 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:4e:05:3e:2a:ba:b6:cb:fa:7c:b0:92:2f:4b:f1:cf: cc:84:6b:a3:ba:8a:ab:c3:9e:41:90:11:bb:32:a8:87: 9b:1a:ea:c9:dc:c3:16:13:b7:d9:f2:2e:be:e6:f1:34: 81:36:53:fe:3f:dc:b4:a1:68:dc:18:57:86:0f:9e:94: f0:c1:9c:07:76:35:1c:4f:0b:8a:56:39:4d:34:90:10: f4:9a:22:5d:40:cb:cb:9e:c2:37:d3:be:e3:23:7b:0f: 3a:9c:c4:7c:07:50:4e:3d:60:88:fe:9f:7b:4c:ee:1f: 5b:e2:f2:43:35:83:c6:f3:b7:be:4b:cb:48:b4:8a:32: 86:86:44:aa:f3:2d:46:8a:87:e6:82:37:c9:5f:90:be: cc:56:d4:a3:74:0e:8a:d1:8f:4c:7c:80:a2:b8:8c:f3: 8f:09:80:8a:25:d9:48:de:09:42:da:97:d8:70:fd:82: a6:cb:14:e4:6b:86:c3:fc:ea:a5:10:8a:f5:22:ea:24: 15:ff:a8:cf:56:dd:c3:74:49:a0:d3:6f:df:6e:ee:0e: d3:77:07:35:3f:a5:78:9f:36:0a:a7:2f:4b:18:73:18: e1:4a:aa:cb:69:85:57:02:d4:bc:fc:c7:b9:9c:80:3d: 99:1f:d4:76:26:49:84:0a:3f:d3:30:87:a8:cd:46:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:f7:48:41:31:bc:11:38:dd:5b:d0:bc:37:22:cb:a4: 33:af:2a:15:d5:45:a1:44:83:0a:80:9d:22:2b:7d:69: 91:b1:9a:a2:39:77:de:7d:d0:bb:d6:bb:a0:94:a0:8d: ae:d6:9e:20:7a:cc:66:29:56:0a:bb:6b:40:d3:03:39: 2b:c1:93:71:4c:87:a9:48:48:69:cb:a0:59:ff:bb:ec: 2f:40:07:01:d9:1b:e7:40:f0:6d:63:73:09:06:d9:d6: 88:0c:25:11:3e:71:c4:d2:4b:9d:c7:a2:8f:b6:63:57: 57:ce:44:4f:f6:89:07:59:76:49:06:d5:7a:68:4b:4f: 79:78:1e:0f:53:d1:98:b6:c5:ab:fe:fb:1a:61:28:c4: e6:6e:55:a7:09:a7:ee:ce:38:6c:a1:e7:a3:04:e2:41: c9:c8:e7:40:75:44:66:0a:84:c2:73:73:90:b5:23:ea: 6e:3a:62:e8:19:b3:2f:cc:22:5e:b2:bd:9e:25:5c:d0: 7b:53:29:be:1f:77:57:2b:57:67:b5:22:90:64:ba:a9: 7d:18:4d:94:82:f8:09:0d:68:6a:ea:b0:2c:ef:26:c9: 99:88:08:f8:ac:13:fa:71:9c:e2:6e:2a:7b:49:bf:5f: d2:60:74:64:79:9c:8a:de:95:bd:a1:7c:d8:bc:3f:15 Fingerprint (SHA-256): 58:18:6A:E2:80:C8:0B:2C:C3:A7:3F:C2:43:71:69:61:29:77:26:11:30:87:7B:B1:5D:24:BF:75:BD:E8:E7:0B Fingerprint (SHA1): 62:65:3A:02:72:0B:86:6A:DD:73:7B:97:E1:B8:B8:12:4F:E1:87:BF Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9610: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9611: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9612: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9613: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154000 (0x6724c90) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 21:15:09 2016 Not After : Fri Jan 08 21:15:09 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:4e:05:3e:2a:ba:b6:cb:fa:7c:b0:92:2f:4b:f1:cf: cc:84:6b:a3:ba:8a:ab:c3:9e:41:90:11:bb:32:a8:87: 9b:1a:ea:c9:dc:c3:16:13:b7:d9:f2:2e:be:e6:f1:34: 81:36:53:fe:3f:dc:b4:a1:68:dc:18:57:86:0f:9e:94: f0:c1:9c:07:76:35:1c:4f:0b:8a:56:39:4d:34:90:10: f4:9a:22:5d:40:cb:cb:9e:c2:37:d3:be:e3:23:7b:0f: 3a:9c:c4:7c:07:50:4e:3d:60:88:fe:9f:7b:4c:ee:1f: 5b:e2:f2:43:35:83:c6:f3:b7:be:4b:cb:48:b4:8a:32: 86:86:44:aa:f3:2d:46:8a:87:e6:82:37:c9:5f:90:be: cc:56:d4:a3:74:0e:8a:d1:8f:4c:7c:80:a2:b8:8c:f3: 8f:09:80:8a:25:d9:48:de:09:42:da:97:d8:70:fd:82: a6:cb:14:e4:6b:86:c3:fc:ea:a5:10:8a:f5:22:ea:24: 15:ff:a8:cf:56:dd:c3:74:49:a0:d3:6f:df:6e:ee:0e: d3:77:07:35:3f:a5:78:9f:36:0a:a7:2f:4b:18:73:18: e1:4a:aa:cb:69:85:57:02:d4:bc:fc:c7:b9:9c:80:3d: 99:1f:d4:76:26:49:84:0a:3f:d3:30:87:a8:cd:46:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:f7:48:41:31:bc:11:38:dd:5b:d0:bc:37:22:cb:a4: 33:af:2a:15:d5:45:a1:44:83:0a:80:9d:22:2b:7d:69: 91:b1:9a:a2:39:77:de:7d:d0:bb:d6:bb:a0:94:a0:8d: ae:d6:9e:20:7a:cc:66:29:56:0a:bb:6b:40:d3:03:39: 2b:c1:93:71:4c:87:a9:48:48:69:cb:a0:59:ff:bb:ec: 2f:40:07:01:d9:1b:e7:40:f0:6d:63:73:09:06:d9:d6: 88:0c:25:11:3e:71:c4:d2:4b:9d:c7:a2:8f:b6:63:57: 57:ce:44:4f:f6:89:07:59:76:49:06:d5:7a:68:4b:4f: 79:78:1e:0f:53:d1:98:b6:c5:ab:fe:fb:1a:61:28:c4: e6:6e:55:a7:09:a7:ee:ce:38:6c:a1:e7:a3:04:e2:41: c9:c8:e7:40:75:44:66:0a:84:c2:73:73:90:b5:23:ea: 6e:3a:62:e8:19:b3:2f:cc:22:5e:b2:bd:9e:25:5c:d0: 7b:53:29:be:1f:77:57:2b:57:67:b5:22:90:64:ba:a9: 7d:18:4d:94:82:f8:09:0d:68:6a:ea:b0:2c:ef:26:c9: 99:88:08:f8:ac:13:fa:71:9c:e2:6e:2a:7b:49:bf:5f: d2:60:74:64:79:9c:8a:de:95:bd:a1:7c:d8:bc:3f:15 Fingerprint (SHA-256): 58:18:6A:E2:80:C8:0B:2C:C3:A7:3F:C2:43:71:69:61:29:77:26:11:30:87:7B:B1:5D:24:BF:75:BD:E8:E7:0B Fingerprint (SHA1): 62:65:3A:02:72:0B:86:6A:DD:73:7B:97:E1:B8:B8:12:4F:E1:87:BF Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9614: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9615: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #9616: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108154007 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9617: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #9618: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9619: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9620: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108154008 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #9621: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9622: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #9623: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9624: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 108154009 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9625: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9626: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #9627: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9628: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 108154010 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9629: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9630: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #9631: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9632: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 108154011 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9633: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9634: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #9635: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9636: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 108154012 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9637: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9638: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #9639: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9640: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 108154013 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9641: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9642: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #9643: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9644: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 108154014 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9645: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9646: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #9647: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9648: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 108154015 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #9649: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9650: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #9651: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9652: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 108154016 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9653: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9654: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #9655: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9656: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 108154017 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9657: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9658: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #9659: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9660: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 108154018 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9661: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9662: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #9663: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9664: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 108154019 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9665: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9666: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #9667: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9668: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 108154020 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9669: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9670: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #9671: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9672: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 108154021 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9673: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9674: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #9675: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9676: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 108154022 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9677: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9678: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #9679: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9680: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 108154023 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9681: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9682: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #9683: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9684: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 108154024 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #9685: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9686: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #9687: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9688: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 108154025 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9689: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9690: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #9691: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9692: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 108154026 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9693: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9694: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #9695: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9696: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 108154027 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9697: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9698: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #9699: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9700: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 108154028 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9701: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9702: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #9703: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9704: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 108154029 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9705: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9706: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #9707: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9708: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 108154030 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9709: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9710: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #9711: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9712: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 108154031 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9713: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9714: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #9715: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9716: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 108154032 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9717: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9718: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #9719: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9720: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 108154033 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9721: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9722: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #9723: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9724: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 108154034 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9725: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9726: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #9727: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9728: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 108154035 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9729: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9730: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #9731: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9732: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 108154036 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9733: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9734: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #9735: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154007 (0x6724c97) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 21:17:44 2016 Not After : Fri Jan 08 21:17:44 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:89:12:e7:9f:24:7e:2b:de:6f:d3:16:79:31:ae:3f: df:27:62:9e:fe:9a:2a:ea:5d:c4:e6:1b:d6:44:1c:ef: 9c:65:cf:c6:15:ce:b4:9c:0d:31:8b:fc:dd:6f:7d:86: 78:81:7c:ea:b3:aa:ca:43:86:62:e1:83:e3:d6:30:80: aa:eb:f6:d7:08:e2:98:86:17:59:16:c8:7f:5b:d9:2d: 79:3c:9a:12:ba:2f:11:bb:39:9b:e3:8e:4a:fe:f5:67: 5b:d2:d4:1c:1c:2c:08:af:92:d6:df:c6:1c:00:e1:e3: 4f:d1:f2:d7:d2:dc:03:f5:02:7a:2f:0b:7d:4d:ec:17: d8:97:7d:17:48:94:64:04:6b:53:dd:6e:83:30:86:90: ea:30:7b:0b:53:86:3a:07:7d:e0:d4:2c:67:45:4c:c3: c5:43:bb:08:3e:8d:de:5b:8c:5b:43:65:7d:a9:6c:66: 18:d9:75:68:41:f4:a0:3e:a3:77:12:7e:b3:e1:be:d4: f1:88:d2:b5:46:50:3e:b3:43:87:d9:20:65:ec:f1:01: 27:59:13:c4:f3:a4:4e:2f:bd:ef:04:82:4f:e6:40:ca: 56:62:b5:79:c0:14:45:54:05:8f:b5:a6:5c:a9:0f:0f: 3a:e6:a7:fe:22:19:cd:99:f1:fb:07:c7:4a:c6:ee:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:2c:46:c7:ce:c6:1c:da:44:63:7d:a9:e7:c0:80:d4: 66:d0:f6:02:1f:ad:f3:d0:7b:a3:4f:59:d4:62:c5:b9: 44:8e:8b:ea:14:c9:82:9d:49:cc:12:2a:04:41:a3:ae: 18:73:9a:e4:2e:58:f0:97:70:71:e6:24:74:14:fd:52: 5d:11:26:0d:0a:34:ea:d6:23:98:78:00:8a:56:33:ad: e2:88:1c:46:97:fa:e0:01:a1:83:d9:3d:94:fa:4d:3c: 4c:e7:16:4d:a4:3c:36:b2:6c:39:9c:20:a7:69:a1:56: 34:d2:a6:1d:7c:b0:25:64:db:04:bd:c7:0d:0b:02:2a: db:e6:55:35:6c:68:d2:56:6a:80:23:18:b0:49:73:62: ba:23:78:45:cd:15:04:6f:dd:83:36:64:ca:dd:3b:77: f9:4a:05:e4:01:b6:6d:56:7e:21:6d:39:d1:bd:1d:6e: 01:ed:28:1d:fb:e6:2f:ec:53:f7:70:c0:26:a5:95:a0: d5:b0:5b:ff:e8:94:ff:9c:eb:73:24:fb:83:a4:e2:9e: c1:9c:d9:9c:f8:6e:72:e0:26:24:57:f6:40:f9:74:87: 7f:fb:82:50:1b:6e:ca:2a:6a:00:4d:59:58:ba:e9:60: e8:f7:96:f1:ef:bc:c2:02:7d:f3:f7:a8:90:d6:02:0c Fingerprint (SHA-256): 9E:2F:68:59:09:06:DF:A9:3D:F3:99:DD:75:71:CE:61:12:D8:C3:9B:22:FF:B0:43:54:91:E6:89:6C:57:7A:0B Fingerprint (SHA1): 1D:B1:B6:3E:2B:E5:94:E1:D7:67:C0:CE:B4:0B:77:8A:6D:9E:B2:F2 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9736: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9737: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154007 (0x6724c97) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 21:17:44 2016 Not After : Fri Jan 08 21:17:44 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:89:12:e7:9f:24:7e:2b:de:6f:d3:16:79:31:ae:3f: df:27:62:9e:fe:9a:2a:ea:5d:c4:e6:1b:d6:44:1c:ef: 9c:65:cf:c6:15:ce:b4:9c:0d:31:8b:fc:dd:6f:7d:86: 78:81:7c:ea:b3:aa:ca:43:86:62:e1:83:e3:d6:30:80: aa:eb:f6:d7:08:e2:98:86:17:59:16:c8:7f:5b:d9:2d: 79:3c:9a:12:ba:2f:11:bb:39:9b:e3:8e:4a:fe:f5:67: 5b:d2:d4:1c:1c:2c:08:af:92:d6:df:c6:1c:00:e1:e3: 4f:d1:f2:d7:d2:dc:03:f5:02:7a:2f:0b:7d:4d:ec:17: d8:97:7d:17:48:94:64:04:6b:53:dd:6e:83:30:86:90: ea:30:7b:0b:53:86:3a:07:7d:e0:d4:2c:67:45:4c:c3: c5:43:bb:08:3e:8d:de:5b:8c:5b:43:65:7d:a9:6c:66: 18:d9:75:68:41:f4:a0:3e:a3:77:12:7e:b3:e1:be:d4: f1:88:d2:b5:46:50:3e:b3:43:87:d9:20:65:ec:f1:01: 27:59:13:c4:f3:a4:4e:2f:bd:ef:04:82:4f:e6:40:ca: 56:62:b5:79:c0:14:45:54:05:8f:b5:a6:5c:a9:0f:0f: 3a:e6:a7:fe:22:19:cd:99:f1:fb:07:c7:4a:c6:ee:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:2c:46:c7:ce:c6:1c:da:44:63:7d:a9:e7:c0:80:d4: 66:d0:f6:02:1f:ad:f3:d0:7b:a3:4f:59:d4:62:c5:b9: 44:8e:8b:ea:14:c9:82:9d:49:cc:12:2a:04:41:a3:ae: 18:73:9a:e4:2e:58:f0:97:70:71:e6:24:74:14:fd:52: 5d:11:26:0d:0a:34:ea:d6:23:98:78:00:8a:56:33:ad: e2:88:1c:46:97:fa:e0:01:a1:83:d9:3d:94:fa:4d:3c: 4c:e7:16:4d:a4:3c:36:b2:6c:39:9c:20:a7:69:a1:56: 34:d2:a6:1d:7c:b0:25:64:db:04:bd:c7:0d:0b:02:2a: db:e6:55:35:6c:68:d2:56:6a:80:23:18:b0:49:73:62: ba:23:78:45:cd:15:04:6f:dd:83:36:64:ca:dd:3b:77: f9:4a:05:e4:01:b6:6d:56:7e:21:6d:39:d1:bd:1d:6e: 01:ed:28:1d:fb:e6:2f:ec:53:f7:70:c0:26:a5:95:a0: d5:b0:5b:ff:e8:94:ff:9c:eb:73:24:fb:83:a4:e2:9e: c1:9c:d9:9c:f8:6e:72:e0:26:24:57:f6:40:f9:74:87: 7f:fb:82:50:1b:6e:ca:2a:6a:00:4d:59:58:ba:e9:60: e8:f7:96:f1:ef:bc:c2:02:7d:f3:f7:a8:90:d6:02:0c Fingerprint (SHA-256): 9E:2F:68:59:09:06:DF:A9:3D:F3:99:DD:75:71:CE:61:12:D8:C3:9B:22:FF:B0:43:54:91:E6:89:6C:57:7A:0B Fingerprint (SHA1): 1D:B1:B6:3E:2B:E5:94:E1:D7:67:C0:CE:B4:0B:77:8A:6D:9E:B2:F2 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9738: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9739: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9740: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9741: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154007 (0x6724c97) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 21:17:44 2016 Not After : Fri Jan 08 21:17:44 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:89:12:e7:9f:24:7e:2b:de:6f:d3:16:79:31:ae:3f: df:27:62:9e:fe:9a:2a:ea:5d:c4:e6:1b:d6:44:1c:ef: 9c:65:cf:c6:15:ce:b4:9c:0d:31:8b:fc:dd:6f:7d:86: 78:81:7c:ea:b3:aa:ca:43:86:62:e1:83:e3:d6:30:80: aa:eb:f6:d7:08:e2:98:86:17:59:16:c8:7f:5b:d9:2d: 79:3c:9a:12:ba:2f:11:bb:39:9b:e3:8e:4a:fe:f5:67: 5b:d2:d4:1c:1c:2c:08:af:92:d6:df:c6:1c:00:e1:e3: 4f:d1:f2:d7:d2:dc:03:f5:02:7a:2f:0b:7d:4d:ec:17: d8:97:7d:17:48:94:64:04:6b:53:dd:6e:83:30:86:90: ea:30:7b:0b:53:86:3a:07:7d:e0:d4:2c:67:45:4c:c3: c5:43:bb:08:3e:8d:de:5b:8c:5b:43:65:7d:a9:6c:66: 18:d9:75:68:41:f4:a0:3e:a3:77:12:7e:b3:e1:be:d4: f1:88:d2:b5:46:50:3e:b3:43:87:d9:20:65:ec:f1:01: 27:59:13:c4:f3:a4:4e:2f:bd:ef:04:82:4f:e6:40:ca: 56:62:b5:79:c0:14:45:54:05:8f:b5:a6:5c:a9:0f:0f: 3a:e6:a7:fe:22:19:cd:99:f1:fb:07:c7:4a:c6:ee:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:2c:46:c7:ce:c6:1c:da:44:63:7d:a9:e7:c0:80:d4: 66:d0:f6:02:1f:ad:f3:d0:7b:a3:4f:59:d4:62:c5:b9: 44:8e:8b:ea:14:c9:82:9d:49:cc:12:2a:04:41:a3:ae: 18:73:9a:e4:2e:58:f0:97:70:71:e6:24:74:14:fd:52: 5d:11:26:0d:0a:34:ea:d6:23:98:78:00:8a:56:33:ad: e2:88:1c:46:97:fa:e0:01:a1:83:d9:3d:94:fa:4d:3c: 4c:e7:16:4d:a4:3c:36:b2:6c:39:9c:20:a7:69:a1:56: 34:d2:a6:1d:7c:b0:25:64:db:04:bd:c7:0d:0b:02:2a: db:e6:55:35:6c:68:d2:56:6a:80:23:18:b0:49:73:62: ba:23:78:45:cd:15:04:6f:dd:83:36:64:ca:dd:3b:77: f9:4a:05:e4:01:b6:6d:56:7e:21:6d:39:d1:bd:1d:6e: 01:ed:28:1d:fb:e6:2f:ec:53:f7:70:c0:26:a5:95:a0: d5:b0:5b:ff:e8:94:ff:9c:eb:73:24:fb:83:a4:e2:9e: c1:9c:d9:9c:f8:6e:72:e0:26:24:57:f6:40:f9:74:87: 7f:fb:82:50:1b:6e:ca:2a:6a:00:4d:59:58:ba:e9:60: e8:f7:96:f1:ef:bc:c2:02:7d:f3:f7:a8:90:d6:02:0c Fingerprint (SHA-256): 9E:2F:68:59:09:06:DF:A9:3D:F3:99:DD:75:71:CE:61:12:D8:C3:9B:22:FF:B0:43:54:91:E6:89:6C:57:7A:0B Fingerprint (SHA1): 1D:B1:B6:3E:2B:E5:94:E1:D7:67:C0:CE:B4:0B:77:8A:6D:9E:B2:F2 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9742: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9743: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9744: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9745: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154007 (0x6724c97) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 21:17:44 2016 Not After : Fri Jan 08 21:17:44 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:89:12:e7:9f:24:7e:2b:de:6f:d3:16:79:31:ae:3f: df:27:62:9e:fe:9a:2a:ea:5d:c4:e6:1b:d6:44:1c:ef: 9c:65:cf:c6:15:ce:b4:9c:0d:31:8b:fc:dd:6f:7d:86: 78:81:7c:ea:b3:aa:ca:43:86:62:e1:83:e3:d6:30:80: aa:eb:f6:d7:08:e2:98:86:17:59:16:c8:7f:5b:d9:2d: 79:3c:9a:12:ba:2f:11:bb:39:9b:e3:8e:4a:fe:f5:67: 5b:d2:d4:1c:1c:2c:08:af:92:d6:df:c6:1c:00:e1:e3: 4f:d1:f2:d7:d2:dc:03:f5:02:7a:2f:0b:7d:4d:ec:17: d8:97:7d:17:48:94:64:04:6b:53:dd:6e:83:30:86:90: ea:30:7b:0b:53:86:3a:07:7d:e0:d4:2c:67:45:4c:c3: c5:43:bb:08:3e:8d:de:5b:8c:5b:43:65:7d:a9:6c:66: 18:d9:75:68:41:f4:a0:3e:a3:77:12:7e:b3:e1:be:d4: f1:88:d2:b5:46:50:3e:b3:43:87:d9:20:65:ec:f1:01: 27:59:13:c4:f3:a4:4e:2f:bd:ef:04:82:4f:e6:40:ca: 56:62:b5:79:c0:14:45:54:05:8f:b5:a6:5c:a9:0f:0f: 3a:e6:a7:fe:22:19:cd:99:f1:fb:07:c7:4a:c6:ee:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:2c:46:c7:ce:c6:1c:da:44:63:7d:a9:e7:c0:80:d4: 66:d0:f6:02:1f:ad:f3:d0:7b:a3:4f:59:d4:62:c5:b9: 44:8e:8b:ea:14:c9:82:9d:49:cc:12:2a:04:41:a3:ae: 18:73:9a:e4:2e:58:f0:97:70:71:e6:24:74:14:fd:52: 5d:11:26:0d:0a:34:ea:d6:23:98:78:00:8a:56:33:ad: e2:88:1c:46:97:fa:e0:01:a1:83:d9:3d:94:fa:4d:3c: 4c:e7:16:4d:a4:3c:36:b2:6c:39:9c:20:a7:69:a1:56: 34:d2:a6:1d:7c:b0:25:64:db:04:bd:c7:0d:0b:02:2a: db:e6:55:35:6c:68:d2:56:6a:80:23:18:b0:49:73:62: ba:23:78:45:cd:15:04:6f:dd:83:36:64:ca:dd:3b:77: f9:4a:05:e4:01:b6:6d:56:7e:21:6d:39:d1:bd:1d:6e: 01:ed:28:1d:fb:e6:2f:ec:53:f7:70:c0:26:a5:95:a0: d5:b0:5b:ff:e8:94:ff:9c:eb:73:24:fb:83:a4:e2:9e: c1:9c:d9:9c:f8:6e:72:e0:26:24:57:f6:40:f9:74:87: 7f:fb:82:50:1b:6e:ca:2a:6a:00:4d:59:58:ba:e9:60: e8:f7:96:f1:ef:bc:c2:02:7d:f3:f7:a8:90:d6:02:0c Fingerprint (SHA-256): 9E:2F:68:59:09:06:DF:A9:3D:F3:99:DD:75:71:CE:61:12:D8:C3:9B:22:FF:B0:43:54:91:E6:89:6C:57:7A:0B Fingerprint (SHA1): 1D:B1:B6:3E:2B:E5:94:E1:D7:67:C0:CE:B4:0B:77:8A:6D:9E:B2:F2 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9746: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154007 (0x6724c97) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 21:17:44 2016 Not After : Fri Jan 08 21:17:44 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:89:12:e7:9f:24:7e:2b:de:6f:d3:16:79:31:ae:3f: df:27:62:9e:fe:9a:2a:ea:5d:c4:e6:1b:d6:44:1c:ef: 9c:65:cf:c6:15:ce:b4:9c:0d:31:8b:fc:dd:6f:7d:86: 78:81:7c:ea:b3:aa:ca:43:86:62:e1:83:e3:d6:30:80: aa:eb:f6:d7:08:e2:98:86:17:59:16:c8:7f:5b:d9:2d: 79:3c:9a:12:ba:2f:11:bb:39:9b:e3:8e:4a:fe:f5:67: 5b:d2:d4:1c:1c:2c:08:af:92:d6:df:c6:1c:00:e1:e3: 4f:d1:f2:d7:d2:dc:03:f5:02:7a:2f:0b:7d:4d:ec:17: d8:97:7d:17:48:94:64:04:6b:53:dd:6e:83:30:86:90: ea:30:7b:0b:53:86:3a:07:7d:e0:d4:2c:67:45:4c:c3: c5:43:bb:08:3e:8d:de:5b:8c:5b:43:65:7d:a9:6c:66: 18:d9:75:68:41:f4:a0:3e:a3:77:12:7e:b3:e1:be:d4: f1:88:d2:b5:46:50:3e:b3:43:87:d9:20:65:ec:f1:01: 27:59:13:c4:f3:a4:4e:2f:bd:ef:04:82:4f:e6:40:ca: 56:62:b5:79:c0:14:45:54:05:8f:b5:a6:5c:a9:0f:0f: 3a:e6:a7:fe:22:19:cd:99:f1:fb:07:c7:4a:c6:ee:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:2c:46:c7:ce:c6:1c:da:44:63:7d:a9:e7:c0:80:d4: 66:d0:f6:02:1f:ad:f3:d0:7b:a3:4f:59:d4:62:c5:b9: 44:8e:8b:ea:14:c9:82:9d:49:cc:12:2a:04:41:a3:ae: 18:73:9a:e4:2e:58:f0:97:70:71:e6:24:74:14:fd:52: 5d:11:26:0d:0a:34:ea:d6:23:98:78:00:8a:56:33:ad: e2:88:1c:46:97:fa:e0:01:a1:83:d9:3d:94:fa:4d:3c: 4c:e7:16:4d:a4:3c:36:b2:6c:39:9c:20:a7:69:a1:56: 34:d2:a6:1d:7c:b0:25:64:db:04:bd:c7:0d:0b:02:2a: db:e6:55:35:6c:68:d2:56:6a:80:23:18:b0:49:73:62: ba:23:78:45:cd:15:04:6f:dd:83:36:64:ca:dd:3b:77: f9:4a:05:e4:01:b6:6d:56:7e:21:6d:39:d1:bd:1d:6e: 01:ed:28:1d:fb:e6:2f:ec:53:f7:70:c0:26:a5:95:a0: d5:b0:5b:ff:e8:94:ff:9c:eb:73:24:fb:83:a4:e2:9e: c1:9c:d9:9c:f8:6e:72:e0:26:24:57:f6:40:f9:74:87: 7f:fb:82:50:1b:6e:ca:2a:6a:00:4d:59:58:ba:e9:60: e8:f7:96:f1:ef:bc:c2:02:7d:f3:f7:a8:90:d6:02:0c Fingerprint (SHA-256): 9E:2F:68:59:09:06:DF:A9:3D:F3:99:DD:75:71:CE:61:12:D8:C3:9B:22:FF:B0:43:54:91:E6:89:6C:57:7A:0B Fingerprint (SHA1): 1D:B1:B6:3E:2B:E5:94:E1:D7:67:C0:CE:B4:0B:77:8A:6D:9E:B2:F2 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9747: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9748: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154007 (0x6724c97) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 21:17:44 2016 Not After : Fri Jan 08 21:17:44 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:89:12:e7:9f:24:7e:2b:de:6f:d3:16:79:31:ae:3f: df:27:62:9e:fe:9a:2a:ea:5d:c4:e6:1b:d6:44:1c:ef: 9c:65:cf:c6:15:ce:b4:9c:0d:31:8b:fc:dd:6f:7d:86: 78:81:7c:ea:b3:aa:ca:43:86:62:e1:83:e3:d6:30:80: aa:eb:f6:d7:08:e2:98:86:17:59:16:c8:7f:5b:d9:2d: 79:3c:9a:12:ba:2f:11:bb:39:9b:e3:8e:4a:fe:f5:67: 5b:d2:d4:1c:1c:2c:08:af:92:d6:df:c6:1c:00:e1:e3: 4f:d1:f2:d7:d2:dc:03:f5:02:7a:2f:0b:7d:4d:ec:17: d8:97:7d:17:48:94:64:04:6b:53:dd:6e:83:30:86:90: ea:30:7b:0b:53:86:3a:07:7d:e0:d4:2c:67:45:4c:c3: c5:43:bb:08:3e:8d:de:5b:8c:5b:43:65:7d:a9:6c:66: 18:d9:75:68:41:f4:a0:3e:a3:77:12:7e:b3:e1:be:d4: f1:88:d2:b5:46:50:3e:b3:43:87:d9:20:65:ec:f1:01: 27:59:13:c4:f3:a4:4e:2f:bd:ef:04:82:4f:e6:40:ca: 56:62:b5:79:c0:14:45:54:05:8f:b5:a6:5c:a9:0f:0f: 3a:e6:a7:fe:22:19:cd:99:f1:fb:07:c7:4a:c6:ee:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:2c:46:c7:ce:c6:1c:da:44:63:7d:a9:e7:c0:80:d4: 66:d0:f6:02:1f:ad:f3:d0:7b:a3:4f:59:d4:62:c5:b9: 44:8e:8b:ea:14:c9:82:9d:49:cc:12:2a:04:41:a3:ae: 18:73:9a:e4:2e:58:f0:97:70:71:e6:24:74:14:fd:52: 5d:11:26:0d:0a:34:ea:d6:23:98:78:00:8a:56:33:ad: e2:88:1c:46:97:fa:e0:01:a1:83:d9:3d:94:fa:4d:3c: 4c:e7:16:4d:a4:3c:36:b2:6c:39:9c:20:a7:69:a1:56: 34:d2:a6:1d:7c:b0:25:64:db:04:bd:c7:0d:0b:02:2a: db:e6:55:35:6c:68:d2:56:6a:80:23:18:b0:49:73:62: ba:23:78:45:cd:15:04:6f:dd:83:36:64:ca:dd:3b:77: f9:4a:05:e4:01:b6:6d:56:7e:21:6d:39:d1:bd:1d:6e: 01:ed:28:1d:fb:e6:2f:ec:53:f7:70:c0:26:a5:95:a0: d5:b0:5b:ff:e8:94:ff:9c:eb:73:24:fb:83:a4:e2:9e: c1:9c:d9:9c:f8:6e:72:e0:26:24:57:f6:40:f9:74:87: 7f:fb:82:50:1b:6e:ca:2a:6a:00:4d:59:58:ba:e9:60: e8:f7:96:f1:ef:bc:c2:02:7d:f3:f7:a8:90:d6:02:0c Fingerprint (SHA-256): 9E:2F:68:59:09:06:DF:A9:3D:F3:99:DD:75:71:CE:61:12:D8:C3:9B:22:FF:B0:43:54:91:E6:89:6C:57:7A:0B Fingerprint (SHA1): 1D:B1:B6:3E:2B:E5:94:E1:D7:67:C0:CE:B4:0B:77:8A:6D:9E:B2:F2 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9749: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9750: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9751: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9752: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154007 (0x6724c97) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 21:17:44 2016 Not After : Fri Jan 08 21:17:44 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:89:12:e7:9f:24:7e:2b:de:6f:d3:16:79:31:ae:3f: df:27:62:9e:fe:9a:2a:ea:5d:c4:e6:1b:d6:44:1c:ef: 9c:65:cf:c6:15:ce:b4:9c:0d:31:8b:fc:dd:6f:7d:86: 78:81:7c:ea:b3:aa:ca:43:86:62:e1:83:e3:d6:30:80: aa:eb:f6:d7:08:e2:98:86:17:59:16:c8:7f:5b:d9:2d: 79:3c:9a:12:ba:2f:11:bb:39:9b:e3:8e:4a:fe:f5:67: 5b:d2:d4:1c:1c:2c:08:af:92:d6:df:c6:1c:00:e1:e3: 4f:d1:f2:d7:d2:dc:03:f5:02:7a:2f:0b:7d:4d:ec:17: d8:97:7d:17:48:94:64:04:6b:53:dd:6e:83:30:86:90: ea:30:7b:0b:53:86:3a:07:7d:e0:d4:2c:67:45:4c:c3: c5:43:bb:08:3e:8d:de:5b:8c:5b:43:65:7d:a9:6c:66: 18:d9:75:68:41:f4:a0:3e:a3:77:12:7e:b3:e1:be:d4: f1:88:d2:b5:46:50:3e:b3:43:87:d9:20:65:ec:f1:01: 27:59:13:c4:f3:a4:4e:2f:bd:ef:04:82:4f:e6:40:ca: 56:62:b5:79:c0:14:45:54:05:8f:b5:a6:5c:a9:0f:0f: 3a:e6:a7:fe:22:19:cd:99:f1:fb:07:c7:4a:c6:ee:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:2c:46:c7:ce:c6:1c:da:44:63:7d:a9:e7:c0:80:d4: 66:d0:f6:02:1f:ad:f3:d0:7b:a3:4f:59:d4:62:c5:b9: 44:8e:8b:ea:14:c9:82:9d:49:cc:12:2a:04:41:a3:ae: 18:73:9a:e4:2e:58:f0:97:70:71:e6:24:74:14:fd:52: 5d:11:26:0d:0a:34:ea:d6:23:98:78:00:8a:56:33:ad: e2:88:1c:46:97:fa:e0:01:a1:83:d9:3d:94:fa:4d:3c: 4c:e7:16:4d:a4:3c:36:b2:6c:39:9c:20:a7:69:a1:56: 34:d2:a6:1d:7c:b0:25:64:db:04:bd:c7:0d:0b:02:2a: db:e6:55:35:6c:68:d2:56:6a:80:23:18:b0:49:73:62: ba:23:78:45:cd:15:04:6f:dd:83:36:64:ca:dd:3b:77: f9:4a:05:e4:01:b6:6d:56:7e:21:6d:39:d1:bd:1d:6e: 01:ed:28:1d:fb:e6:2f:ec:53:f7:70:c0:26:a5:95:a0: d5:b0:5b:ff:e8:94:ff:9c:eb:73:24:fb:83:a4:e2:9e: c1:9c:d9:9c:f8:6e:72:e0:26:24:57:f6:40:f9:74:87: 7f:fb:82:50:1b:6e:ca:2a:6a:00:4d:59:58:ba:e9:60: e8:f7:96:f1:ef:bc:c2:02:7d:f3:f7:a8:90:d6:02:0c Fingerprint (SHA-256): 9E:2F:68:59:09:06:DF:A9:3D:F3:99:DD:75:71:CE:61:12:D8:C3:9B:22:FF:B0:43:54:91:E6:89:6C:57:7A:0B Fingerprint (SHA1): 1D:B1:B6:3E:2B:E5:94:E1:D7:67:C0:CE:B4:0B:77:8A:6D:9E:B2:F2 Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9753: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154007 (0x6724c97) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 21:17:44 2016 Not After : Fri Jan 08 21:17:44 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:89:12:e7:9f:24:7e:2b:de:6f:d3:16:79:31:ae:3f: df:27:62:9e:fe:9a:2a:ea:5d:c4:e6:1b:d6:44:1c:ef: 9c:65:cf:c6:15:ce:b4:9c:0d:31:8b:fc:dd:6f:7d:86: 78:81:7c:ea:b3:aa:ca:43:86:62:e1:83:e3:d6:30:80: aa:eb:f6:d7:08:e2:98:86:17:59:16:c8:7f:5b:d9:2d: 79:3c:9a:12:ba:2f:11:bb:39:9b:e3:8e:4a:fe:f5:67: 5b:d2:d4:1c:1c:2c:08:af:92:d6:df:c6:1c:00:e1:e3: 4f:d1:f2:d7:d2:dc:03:f5:02:7a:2f:0b:7d:4d:ec:17: d8:97:7d:17:48:94:64:04:6b:53:dd:6e:83:30:86:90: ea:30:7b:0b:53:86:3a:07:7d:e0:d4:2c:67:45:4c:c3: c5:43:bb:08:3e:8d:de:5b:8c:5b:43:65:7d:a9:6c:66: 18:d9:75:68:41:f4:a0:3e:a3:77:12:7e:b3:e1:be:d4: f1:88:d2:b5:46:50:3e:b3:43:87:d9:20:65:ec:f1:01: 27:59:13:c4:f3:a4:4e:2f:bd:ef:04:82:4f:e6:40:ca: 56:62:b5:79:c0:14:45:54:05:8f:b5:a6:5c:a9:0f:0f: 3a:e6:a7:fe:22:19:cd:99:f1:fb:07:c7:4a:c6:ee:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:2c:46:c7:ce:c6:1c:da:44:63:7d:a9:e7:c0:80:d4: 66:d0:f6:02:1f:ad:f3:d0:7b:a3:4f:59:d4:62:c5:b9: 44:8e:8b:ea:14:c9:82:9d:49:cc:12:2a:04:41:a3:ae: 18:73:9a:e4:2e:58:f0:97:70:71:e6:24:74:14:fd:52: 5d:11:26:0d:0a:34:ea:d6:23:98:78:00:8a:56:33:ad: e2:88:1c:46:97:fa:e0:01:a1:83:d9:3d:94:fa:4d:3c: 4c:e7:16:4d:a4:3c:36:b2:6c:39:9c:20:a7:69:a1:56: 34:d2:a6:1d:7c:b0:25:64:db:04:bd:c7:0d:0b:02:2a: db:e6:55:35:6c:68:d2:56:6a:80:23:18:b0:49:73:62: ba:23:78:45:cd:15:04:6f:dd:83:36:64:ca:dd:3b:77: f9:4a:05:e4:01:b6:6d:56:7e:21:6d:39:d1:bd:1d:6e: 01:ed:28:1d:fb:e6:2f:ec:53:f7:70:c0:26:a5:95:a0: d5:b0:5b:ff:e8:94:ff:9c:eb:73:24:fb:83:a4:e2:9e: c1:9c:d9:9c:f8:6e:72:e0:26:24:57:f6:40:f9:74:87: 7f:fb:82:50:1b:6e:ca:2a:6a:00:4d:59:58:ba:e9:60: e8:f7:96:f1:ef:bc:c2:02:7d:f3:f7:a8:90:d6:02:0c Fingerprint (SHA-256): 9E:2F:68:59:09:06:DF:A9:3D:F3:99:DD:75:71:CE:61:12:D8:C3:9B:22:FF:B0:43:54:91:E6:89:6C:57:7A:0B Fingerprint (SHA1): 1D:B1:B6:3E:2B:E5:94:E1:D7:67:C0:CE:B4:0B:77:8A:6D:9E:B2:F2 Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #9754: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154007 (0x6724c97) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 21:17:44 2016 Not After : Fri Jan 08 21:17:44 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:89:12:e7:9f:24:7e:2b:de:6f:d3:16:79:31:ae:3f: df:27:62:9e:fe:9a:2a:ea:5d:c4:e6:1b:d6:44:1c:ef: 9c:65:cf:c6:15:ce:b4:9c:0d:31:8b:fc:dd:6f:7d:86: 78:81:7c:ea:b3:aa:ca:43:86:62:e1:83:e3:d6:30:80: aa:eb:f6:d7:08:e2:98:86:17:59:16:c8:7f:5b:d9:2d: 79:3c:9a:12:ba:2f:11:bb:39:9b:e3:8e:4a:fe:f5:67: 5b:d2:d4:1c:1c:2c:08:af:92:d6:df:c6:1c:00:e1:e3: 4f:d1:f2:d7:d2:dc:03:f5:02:7a:2f:0b:7d:4d:ec:17: d8:97:7d:17:48:94:64:04:6b:53:dd:6e:83:30:86:90: ea:30:7b:0b:53:86:3a:07:7d:e0:d4:2c:67:45:4c:c3: c5:43:bb:08:3e:8d:de:5b:8c:5b:43:65:7d:a9:6c:66: 18:d9:75:68:41:f4:a0:3e:a3:77:12:7e:b3:e1:be:d4: f1:88:d2:b5:46:50:3e:b3:43:87:d9:20:65:ec:f1:01: 27:59:13:c4:f3:a4:4e:2f:bd:ef:04:82:4f:e6:40:ca: 56:62:b5:79:c0:14:45:54:05:8f:b5:a6:5c:a9:0f:0f: 3a:e6:a7:fe:22:19:cd:99:f1:fb:07:c7:4a:c6:ee:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:2c:46:c7:ce:c6:1c:da:44:63:7d:a9:e7:c0:80:d4: 66:d0:f6:02:1f:ad:f3:d0:7b:a3:4f:59:d4:62:c5:b9: 44:8e:8b:ea:14:c9:82:9d:49:cc:12:2a:04:41:a3:ae: 18:73:9a:e4:2e:58:f0:97:70:71:e6:24:74:14:fd:52: 5d:11:26:0d:0a:34:ea:d6:23:98:78:00:8a:56:33:ad: e2:88:1c:46:97:fa:e0:01:a1:83:d9:3d:94:fa:4d:3c: 4c:e7:16:4d:a4:3c:36:b2:6c:39:9c:20:a7:69:a1:56: 34:d2:a6:1d:7c:b0:25:64:db:04:bd:c7:0d:0b:02:2a: db:e6:55:35:6c:68:d2:56:6a:80:23:18:b0:49:73:62: ba:23:78:45:cd:15:04:6f:dd:83:36:64:ca:dd:3b:77: f9:4a:05:e4:01:b6:6d:56:7e:21:6d:39:d1:bd:1d:6e: 01:ed:28:1d:fb:e6:2f:ec:53:f7:70:c0:26:a5:95:a0: d5:b0:5b:ff:e8:94:ff:9c:eb:73:24:fb:83:a4:e2:9e: c1:9c:d9:9c:f8:6e:72:e0:26:24:57:f6:40:f9:74:87: 7f:fb:82:50:1b:6e:ca:2a:6a:00:4d:59:58:ba:e9:60: e8:f7:96:f1:ef:bc:c2:02:7d:f3:f7:a8:90:d6:02:0c Fingerprint (SHA-256): 9E:2F:68:59:09:06:DF:A9:3D:F3:99:DD:75:71:CE:61:12:D8:C3:9B:22:FF:B0:43:54:91:E6:89:6C:57:7A:0B Fingerprint (SHA1): 1D:B1:B6:3E:2B:E5:94:E1:D7:67:C0:CE:B4:0B:77:8A:6D:9E:B2:F2 Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #9755: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154007 (0x6724c97) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 21:17:44 2016 Not After : Fri Jan 08 21:17:44 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:89:12:e7:9f:24:7e:2b:de:6f:d3:16:79:31:ae:3f: df:27:62:9e:fe:9a:2a:ea:5d:c4:e6:1b:d6:44:1c:ef: 9c:65:cf:c6:15:ce:b4:9c:0d:31:8b:fc:dd:6f:7d:86: 78:81:7c:ea:b3:aa:ca:43:86:62:e1:83:e3:d6:30:80: aa:eb:f6:d7:08:e2:98:86:17:59:16:c8:7f:5b:d9:2d: 79:3c:9a:12:ba:2f:11:bb:39:9b:e3:8e:4a:fe:f5:67: 5b:d2:d4:1c:1c:2c:08:af:92:d6:df:c6:1c:00:e1:e3: 4f:d1:f2:d7:d2:dc:03:f5:02:7a:2f:0b:7d:4d:ec:17: d8:97:7d:17:48:94:64:04:6b:53:dd:6e:83:30:86:90: ea:30:7b:0b:53:86:3a:07:7d:e0:d4:2c:67:45:4c:c3: c5:43:bb:08:3e:8d:de:5b:8c:5b:43:65:7d:a9:6c:66: 18:d9:75:68:41:f4:a0:3e:a3:77:12:7e:b3:e1:be:d4: f1:88:d2:b5:46:50:3e:b3:43:87:d9:20:65:ec:f1:01: 27:59:13:c4:f3:a4:4e:2f:bd:ef:04:82:4f:e6:40:ca: 56:62:b5:79:c0:14:45:54:05:8f:b5:a6:5c:a9:0f:0f: 3a:e6:a7:fe:22:19:cd:99:f1:fb:07:c7:4a:c6:ee:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:2c:46:c7:ce:c6:1c:da:44:63:7d:a9:e7:c0:80:d4: 66:d0:f6:02:1f:ad:f3:d0:7b:a3:4f:59:d4:62:c5:b9: 44:8e:8b:ea:14:c9:82:9d:49:cc:12:2a:04:41:a3:ae: 18:73:9a:e4:2e:58:f0:97:70:71:e6:24:74:14:fd:52: 5d:11:26:0d:0a:34:ea:d6:23:98:78:00:8a:56:33:ad: e2:88:1c:46:97:fa:e0:01:a1:83:d9:3d:94:fa:4d:3c: 4c:e7:16:4d:a4:3c:36:b2:6c:39:9c:20:a7:69:a1:56: 34:d2:a6:1d:7c:b0:25:64:db:04:bd:c7:0d:0b:02:2a: db:e6:55:35:6c:68:d2:56:6a:80:23:18:b0:49:73:62: ba:23:78:45:cd:15:04:6f:dd:83:36:64:ca:dd:3b:77: f9:4a:05:e4:01:b6:6d:56:7e:21:6d:39:d1:bd:1d:6e: 01:ed:28:1d:fb:e6:2f:ec:53:f7:70:c0:26:a5:95:a0: d5:b0:5b:ff:e8:94:ff:9c:eb:73:24:fb:83:a4:e2:9e: c1:9c:d9:9c:f8:6e:72:e0:26:24:57:f6:40:f9:74:87: 7f:fb:82:50:1b:6e:ca:2a:6a:00:4d:59:58:ba:e9:60: e8:f7:96:f1:ef:bc:c2:02:7d:f3:f7:a8:90:d6:02:0c Fingerprint (SHA-256): 9E:2F:68:59:09:06:DF:A9:3D:F3:99:DD:75:71:CE:61:12:D8:C3:9B:22:FF:B0:43:54:91:E6:89:6C:57:7A:0B Fingerprint (SHA1): 1D:B1:B6:3E:2B:E5:94:E1:D7:67:C0:CE:B4:0B:77:8A:6D:9E:B2:F2 Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #9756: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154007 (0x6724c97) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 21:17:44 2016 Not After : Fri Jan 08 21:17:44 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:89:12:e7:9f:24:7e:2b:de:6f:d3:16:79:31:ae:3f: df:27:62:9e:fe:9a:2a:ea:5d:c4:e6:1b:d6:44:1c:ef: 9c:65:cf:c6:15:ce:b4:9c:0d:31:8b:fc:dd:6f:7d:86: 78:81:7c:ea:b3:aa:ca:43:86:62:e1:83:e3:d6:30:80: aa:eb:f6:d7:08:e2:98:86:17:59:16:c8:7f:5b:d9:2d: 79:3c:9a:12:ba:2f:11:bb:39:9b:e3:8e:4a:fe:f5:67: 5b:d2:d4:1c:1c:2c:08:af:92:d6:df:c6:1c:00:e1:e3: 4f:d1:f2:d7:d2:dc:03:f5:02:7a:2f:0b:7d:4d:ec:17: d8:97:7d:17:48:94:64:04:6b:53:dd:6e:83:30:86:90: ea:30:7b:0b:53:86:3a:07:7d:e0:d4:2c:67:45:4c:c3: c5:43:bb:08:3e:8d:de:5b:8c:5b:43:65:7d:a9:6c:66: 18:d9:75:68:41:f4:a0:3e:a3:77:12:7e:b3:e1:be:d4: f1:88:d2:b5:46:50:3e:b3:43:87:d9:20:65:ec:f1:01: 27:59:13:c4:f3:a4:4e:2f:bd:ef:04:82:4f:e6:40:ca: 56:62:b5:79:c0:14:45:54:05:8f:b5:a6:5c:a9:0f:0f: 3a:e6:a7:fe:22:19:cd:99:f1:fb:07:c7:4a:c6:ee:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:2c:46:c7:ce:c6:1c:da:44:63:7d:a9:e7:c0:80:d4: 66:d0:f6:02:1f:ad:f3:d0:7b:a3:4f:59:d4:62:c5:b9: 44:8e:8b:ea:14:c9:82:9d:49:cc:12:2a:04:41:a3:ae: 18:73:9a:e4:2e:58:f0:97:70:71:e6:24:74:14:fd:52: 5d:11:26:0d:0a:34:ea:d6:23:98:78:00:8a:56:33:ad: e2:88:1c:46:97:fa:e0:01:a1:83:d9:3d:94:fa:4d:3c: 4c:e7:16:4d:a4:3c:36:b2:6c:39:9c:20:a7:69:a1:56: 34:d2:a6:1d:7c:b0:25:64:db:04:bd:c7:0d:0b:02:2a: db:e6:55:35:6c:68:d2:56:6a:80:23:18:b0:49:73:62: ba:23:78:45:cd:15:04:6f:dd:83:36:64:ca:dd:3b:77: f9:4a:05:e4:01:b6:6d:56:7e:21:6d:39:d1:bd:1d:6e: 01:ed:28:1d:fb:e6:2f:ec:53:f7:70:c0:26:a5:95:a0: d5:b0:5b:ff:e8:94:ff:9c:eb:73:24:fb:83:a4:e2:9e: c1:9c:d9:9c:f8:6e:72:e0:26:24:57:f6:40:f9:74:87: 7f:fb:82:50:1b:6e:ca:2a:6a:00:4d:59:58:ba:e9:60: e8:f7:96:f1:ef:bc:c2:02:7d:f3:f7:a8:90:d6:02:0c Fingerprint (SHA-256): 9E:2F:68:59:09:06:DF:A9:3D:F3:99:DD:75:71:CE:61:12:D8:C3:9B:22:FF:B0:43:54:91:E6:89:6C:57:7A:0B Fingerprint (SHA1): 1D:B1:B6:3E:2B:E5:94:E1:D7:67:C0:CE:B4:0B:77:8A:6D:9E:B2:F2 Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #9757: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154007 (0x6724c97) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 21:17:44 2016 Not After : Fri Jan 08 21:17:44 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:89:12:e7:9f:24:7e:2b:de:6f:d3:16:79:31:ae:3f: df:27:62:9e:fe:9a:2a:ea:5d:c4:e6:1b:d6:44:1c:ef: 9c:65:cf:c6:15:ce:b4:9c:0d:31:8b:fc:dd:6f:7d:86: 78:81:7c:ea:b3:aa:ca:43:86:62:e1:83:e3:d6:30:80: aa:eb:f6:d7:08:e2:98:86:17:59:16:c8:7f:5b:d9:2d: 79:3c:9a:12:ba:2f:11:bb:39:9b:e3:8e:4a:fe:f5:67: 5b:d2:d4:1c:1c:2c:08:af:92:d6:df:c6:1c:00:e1:e3: 4f:d1:f2:d7:d2:dc:03:f5:02:7a:2f:0b:7d:4d:ec:17: d8:97:7d:17:48:94:64:04:6b:53:dd:6e:83:30:86:90: ea:30:7b:0b:53:86:3a:07:7d:e0:d4:2c:67:45:4c:c3: c5:43:bb:08:3e:8d:de:5b:8c:5b:43:65:7d:a9:6c:66: 18:d9:75:68:41:f4:a0:3e:a3:77:12:7e:b3:e1:be:d4: f1:88:d2:b5:46:50:3e:b3:43:87:d9:20:65:ec:f1:01: 27:59:13:c4:f3:a4:4e:2f:bd:ef:04:82:4f:e6:40:ca: 56:62:b5:79:c0:14:45:54:05:8f:b5:a6:5c:a9:0f:0f: 3a:e6:a7:fe:22:19:cd:99:f1:fb:07:c7:4a:c6:ee:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:2c:46:c7:ce:c6:1c:da:44:63:7d:a9:e7:c0:80:d4: 66:d0:f6:02:1f:ad:f3:d0:7b:a3:4f:59:d4:62:c5:b9: 44:8e:8b:ea:14:c9:82:9d:49:cc:12:2a:04:41:a3:ae: 18:73:9a:e4:2e:58:f0:97:70:71:e6:24:74:14:fd:52: 5d:11:26:0d:0a:34:ea:d6:23:98:78:00:8a:56:33:ad: e2:88:1c:46:97:fa:e0:01:a1:83:d9:3d:94:fa:4d:3c: 4c:e7:16:4d:a4:3c:36:b2:6c:39:9c:20:a7:69:a1:56: 34:d2:a6:1d:7c:b0:25:64:db:04:bd:c7:0d:0b:02:2a: db:e6:55:35:6c:68:d2:56:6a:80:23:18:b0:49:73:62: ba:23:78:45:cd:15:04:6f:dd:83:36:64:ca:dd:3b:77: f9:4a:05:e4:01:b6:6d:56:7e:21:6d:39:d1:bd:1d:6e: 01:ed:28:1d:fb:e6:2f:ec:53:f7:70:c0:26:a5:95:a0: d5:b0:5b:ff:e8:94:ff:9c:eb:73:24:fb:83:a4:e2:9e: c1:9c:d9:9c:f8:6e:72:e0:26:24:57:f6:40:f9:74:87: 7f:fb:82:50:1b:6e:ca:2a:6a:00:4d:59:58:ba:e9:60: e8:f7:96:f1:ef:bc:c2:02:7d:f3:f7:a8:90:d6:02:0c Fingerprint (SHA-256): 9E:2F:68:59:09:06:DF:A9:3D:F3:99:DD:75:71:CE:61:12:D8:C3:9B:22:FF:B0:43:54:91:E6:89:6C:57:7A:0B Fingerprint (SHA1): 1D:B1:B6:3E:2B:E5:94:E1:D7:67:C0:CE:B4:0B:77:8A:6D:9E:B2:F2 Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #9758: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9759: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #9760: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108154037 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9761: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #9762: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #9763: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9764: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 108154038 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9765: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9766: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #9767: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9768: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 108154039 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9769: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9770: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #9771: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9772: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 108154040 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9773: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9774: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #9775: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9776: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 108154041 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9777: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9778: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #9779: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9780: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 108154042 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9781: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9782: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #9783: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9784: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 108154043 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9785: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9786: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #9787: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154037 (0x6724cb5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:24:27 2016 Not After : Fri Jan 08 21:24:27 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:f4:e9:24:08:da:a2:d3:7a:09:cd:5a:b0:99:08:6c: 48:55:a4:d7:15:05:37:ee:00:44:76:40:f9:99:d1:5a: c5:b3:b4:f9:6e:ae:59:82:ea:eb:78:24:51:ae:b4:88: a1:79:6e:64:f4:66:98:b2:c5:78:dc:6f:a4:ca:0b:88: 76:d0:16:c3:b7:2c:04:53:8d:1a:d2:02:f3:ce:1a:5e: a2:35:02:8d:5e:27:f8:af:44:4a:13:4a:9f:36:a7:d8: b5:e3:a9:0a:7b:88:b4:88:ae:6b:ee:ac:5c:c0:00:da: c8:12:5c:51:16:89:b4:53:f4:40:a1:26:e8:6b:52:b9: 3f:77:ee:de:68:10:0c:e3:07:14:05:aa:3a:13:f3:ad: 76:9d:76:32:c8:fa:50:75:14:19:d8:d0:c4:b5:55:cd: 34:ac:98:d8:c2:ea:07:3b:2c:01:f0:c2:97:ee:b8:8e: e8:81:db:b4:1c:02:91:29:5e:84:1c:b1:ff:de:5d:06: d5:37:f9:21:6f:91:fd:82:c8:d0:6b:7b:73:e2:7d:cc: 9f:50:93:a2:cd:aa:c9:7b:3c:aa:d1:61:ab:85:b5:cd: 69:6a:1b:d1:9b:9d:52:2e:2e:2c:72:3e:1a:fe:a8:2b: 59:db:a1:42:94:24:84:d1:46:e5:64:c1:66:b4:33:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2f:2f:38:a6:7b:9e:2f:98:b4:5a:58:ab:3c:b0:f0:06: bf:9f:c8:3d:4e:ff:73:fd:5c:26:8f:02:37:96:ae:6a: 0b:e8:44:ad:a2:3e:87:17:8f:6f:39:6b:4c:f8:d3:1e: 81:f8:88:0d:42:6c:92:bc:e5:96:08:8c:08:2e:2e:83: 21:9e:cd:6e:79:d1:28:08:60:fd:75:e9:2e:e5:05:90: 69:b7:57:f4:1d:02:cb:78:21:64:03:ea:5b:fe:c2:08: 38:bd:b4:39:28:eb:69:03:ab:28:98:c1:55:22:7a:aa: b3:0f:45:a9:8c:cd:e8:8c:37:ce:ef:89:60:10:e2:9d: a7:92:e9:3e:15:ad:fc:e1:b7:da:0b:fa:d4:c5:66:5c: 27:b5:63:b1:d1:22:0c:94:a3:0d:ec:ee:53:ab:4f:f1: db:1b:51:9f:74:9b:1e:a9:58:40:8d:01:10:0a:f5:ec: 49:24:3b:44:29:f1:c6:a4:16:99:6e:18:59:8e:06:17: 28:c7:de:fa:af:9f:1b:a9:30:dc:37:cc:32:bc:68:27: cd:e6:9c:54:df:4a:e8:e8:b0:e6:6d:b3:8b:3b:e0:83: 90:ea:74:12:5a:1b:4c:4b:10:e4:10:4b:e0:ff:02:99: 9c:ff:57:0d:b4:80:f3:dd:d4:d8:7c:3d:f5:0e:f9:25 Fingerprint (SHA-256): 30:D8:DD:C3:34:3C:E5:C7:3A:70:F0:EA:8E:D0:B6:9D:A0:AC:DA:84:66:46:4E:AA:C4:FE:D7:D5:00:30:E3:B7 Fingerprint (SHA1): D2:0B:27:13:74:F9:CE:35:B9:30:61:EF:8C:46:BC:E6:C1:5A:4F:42 Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #9788: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9789: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9790: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #9791: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154037 (0x6724cb5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:24:27 2016 Not After : Fri Jan 08 21:24:27 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:f4:e9:24:08:da:a2:d3:7a:09:cd:5a:b0:99:08:6c: 48:55:a4:d7:15:05:37:ee:00:44:76:40:f9:99:d1:5a: c5:b3:b4:f9:6e:ae:59:82:ea:eb:78:24:51:ae:b4:88: a1:79:6e:64:f4:66:98:b2:c5:78:dc:6f:a4:ca:0b:88: 76:d0:16:c3:b7:2c:04:53:8d:1a:d2:02:f3:ce:1a:5e: a2:35:02:8d:5e:27:f8:af:44:4a:13:4a:9f:36:a7:d8: b5:e3:a9:0a:7b:88:b4:88:ae:6b:ee:ac:5c:c0:00:da: c8:12:5c:51:16:89:b4:53:f4:40:a1:26:e8:6b:52:b9: 3f:77:ee:de:68:10:0c:e3:07:14:05:aa:3a:13:f3:ad: 76:9d:76:32:c8:fa:50:75:14:19:d8:d0:c4:b5:55:cd: 34:ac:98:d8:c2:ea:07:3b:2c:01:f0:c2:97:ee:b8:8e: e8:81:db:b4:1c:02:91:29:5e:84:1c:b1:ff:de:5d:06: d5:37:f9:21:6f:91:fd:82:c8:d0:6b:7b:73:e2:7d:cc: 9f:50:93:a2:cd:aa:c9:7b:3c:aa:d1:61:ab:85:b5:cd: 69:6a:1b:d1:9b:9d:52:2e:2e:2c:72:3e:1a:fe:a8:2b: 59:db:a1:42:94:24:84:d1:46:e5:64:c1:66:b4:33:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2f:2f:38:a6:7b:9e:2f:98:b4:5a:58:ab:3c:b0:f0:06: bf:9f:c8:3d:4e:ff:73:fd:5c:26:8f:02:37:96:ae:6a: 0b:e8:44:ad:a2:3e:87:17:8f:6f:39:6b:4c:f8:d3:1e: 81:f8:88:0d:42:6c:92:bc:e5:96:08:8c:08:2e:2e:83: 21:9e:cd:6e:79:d1:28:08:60:fd:75:e9:2e:e5:05:90: 69:b7:57:f4:1d:02:cb:78:21:64:03:ea:5b:fe:c2:08: 38:bd:b4:39:28:eb:69:03:ab:28:98:c1:55:22:7a:aa: b3:0f:45:a9:8c:cd:e8:8c:37:ce:ef:89:60:10:e2:9d: a7:92:e9:3e:15:ad:fc:e1:b7:da:0b:fa:d4:c5:66:5c: 27:b5:63:b1:d1:22:0c:94:a3:0d:ec:ee:53:ab:4f:f1: db:1b:51:9f:74:9b:1e:a9:58:40:8d:01:10:0a:f5:ec: 49:24:3b:44:29:f1:c6:a4:16:99:6e:18:59:8e:06:17: 28:c7:de:fa:af:9f:1b:a9:30:dc:37:cc:32:bc:68:27: cd:e6:9c:54:df:4a:e8:e8:b0:e6:6d:b3:8b:3b:e0:83: 90:ea:74:12:5a:1b:4c:4b:10:e4:10:4b:e0:ff:02:99: 9c:ff:57:0d:b4:80:f3:dd:d4:d8:7c:3d:f5:0e:f9:25 Fingerprint (SHA-256): 30:D8:DD:C3:34:3C:E5:C7:3A:70:F0:EA:8E:D0:B6:9D:A0:AC:DA:84:66:46:4E:AA:C4:FE:D7:D5:00:30:E3:B7 Fingerprint (SHA1): D2:0B:27:13:74:F9:CE:35:B9:30:61:EF:8C:46:BC:E6:C1:5A:4F:42 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #9792: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9793: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9794: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #9795: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108154044 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9796: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #9797: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9798: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9799: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108154045 --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #9800: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9801: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #9802: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9803: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108154046 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9804: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9805: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #9806: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9807: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108154047 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9808: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9809: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #9810: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #9811: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #9812: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #9813: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154044 (0x6724cbc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:25:31 2016 Not After : Fri Jan 08 21:25:31 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:18:14:c5:5c:df:22:d3:1e:fb:db:ab:00:7f:df:8b: ad:23:59:03:a4:e1:07:97:09:84:25:60:02:88:fb:36: 5a:eb:9a:91:dd:c9:ea:15:57:d5:c2:40:73:ca:9d:cf: 1d:de:13:04:c6:f9:c6:bd:f0:43:57:97:f0:2e:51:13: f2:4a:71:df:7f:4c:5e:d4:23:e8:73:a3:5a:6d:b8:20: ad:af:ab:f1:18:43:52:5f:50:2d:e3:b6:df:f9:d6:0a: 54:12:e0:ac:5f:f8:7f:f3:aa:28:d8:32:19:b4:28:3f: e5:5e:9f:cb:37:95:8b:0c:5e:d5:d6:21:a9:1c:67:b8: 31:59:e3:54:46:b7:a6:18:d7:52:ee:21:3a:be:6c:63: 7f:8e:4a:18:e9:b2:dc:d2:f0:8d:c0:63:45:df:29:a6: 0b:b4:4c:fb:68:04:46:8b:07:cc:43:10:ff:26:07:3f: 98:19:22:a4:00:c5:6b:b8:5d:40:77:b7:18:e8:d4:90: a6:e5:52:e3:30:3f:ec:e9:ec:e3:b7:c9:55:1f:2a:a0: d0:bd:de:84:cd:9c:c0:2b:b6:a8:3d:43:91:5f:04:e2: 30:0b:fa:4f:c4:9b:bd:e9:bf:66:36:b9:1c:ca:09:ad: 21:2b:64:8f:8b:86:4f:9e:34:fa:45:3d:4b:1a:a4:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bd:58:2e:98:00:c8:af:6c:1e:df:8d:36:a1:1b:0b:55: fe:61:5f:2e:4a:bd:54:4f:76:87:f0:c9:59:ef:64:46: 4c:2e:5e:21:ca:f6:b2:9f:37:48:6a:60:63:b6:25:14: 82:9a:ca:ce:f0:9a:7f:7b:59:f4:55:01:ad:b7:5c:a0: 94:c4:bf:e2:9f:a4:1a:e5:7c:91:3e:19:18:7b:67:39: 29:b4:34:91:a5:90:d9:9c:79:ae:ac:27:59:f4:67:68: 87:1a:b4:a3:b5:73:4d:ce:40:dd:30:cb:9f:ac:7f:ec: 5b:80:ab:07:9b:4d:07:86:75:e2:e1:59:fe:eb:3f:fd: 99:49:01:c4:14:77:76:92:09:44:33:de:d1:89:d5:37: 63:1c:4e:0f:25:ef:da:9c:3e:fc:d3:e3:f3:e7:6d:53: c0:b0:65:5f:fb:39:df:1c:93:2c:99:a0:9c:c9:6c:1d: 85:27:cc:8d:fd:ba:8f:e0:45:fe:fb:73:c4:ed:a8:fd: f8:79:cd:21:ea:e2:6d:4d:19:c0:ef:a6:4f:21:98:c8: 79:e6:9b:07:03:35:13:24:98:4b:ef:0b:de:19:e1:07: 21:0b:59:ad:ed:48:41:e8:45:f3:1e:36:ea:7f:0e:6e: cb:b5:56:b8:16:20:de:a1:e8:8e:aa:59:11:be:72:09 Fingerprint (SHA-256): D1:9E:2C:10:FC:2E:41:E9:C5:85:B8:95:AB:B7:A2:9A:57:CF:76:1B:24:07:2A:1C:4E:8E:CF:72:72:72:CB:B6 Fingerprint (SHA1): 3A:EF:A7:8F:D2:85:AA:E6:22:BA:37:90:5C:26:3A:54:10:0F:06:38 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9814: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9815: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9816: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154045 (0x6724cbd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:25:40 2016 Not After : Fri Jan 08 21:25:40 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:ab:38:1c:bc:74:10:ba:02:c0:06:e6:bf:cb:53:fe: 7f:21:53:a4:83:0e:5a:e3:53:56:9b:d4:f1:44:1a:60: af:d0:fd:b3:d1:78:5b:7e:28:d0:2c:09:f6:4c:cf:3d: 8c:9e:97:a8:58:b7:b1:8d:1b:11:95:85:37:83:cc:ce: db:5a:4b:76:e5:24:4e:88:9b:bb:ef:f4:b2:9f:5a:68: e9:08:ef:45:35:55:22:3a:79:a2:1e:28:50:4a:a5:8c: 21:4c:38:45:36:c3:73:e0:ea:66:fb:e0:c7:1c:d5:a0: b7:ce:73:5c:c0:19:17:84:fa:e9:75:d4:77:35:18:f6: ac:8b:b8:01:1c:24:ef:a2:76:a2:a1:4a:f4:31:37:ed: f6:0d:fc:6c:34:02:07:2b:f4:4e:cd:4f:1c:e6:e8:fc: c1:95:7f:2c:b3:db:c2:70:b7:44:6a:83:79:f6:75:fd: 41:6e:15:31:a1:12:70:c2:58:67:72:bc:59:10:52:a4: af:a8:85:7a:a6:e7:85:a0:33:a9:80:60:b8:0d:19:11: 39:e5:eb:1a:d7:7f:f9:fa:59:62:7b:1f:86:8d:4b:e3: 9b:50:98:53:05:25:89:4a:02:b7:52:c8:cf:ca:50:48: 6f:d4:7c:36:c3:0a:88:7f:06:82:a3:2e:9c:2a:2d:e7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:fa:ab:29:13:83:d6:c8:d0:d4:10:07:4b:3e:57:fd: d6:93:5a:b9:57:94:82:ba:57:48:cf:b5:27:33:14:4a: c7:42:9b:09:48:c6:93:ff:68:63:67:71:1e:c2:24:25: 25:ac:50:46:74:15:d4:69:fb:0e:98:fc:00:d1:e4:2b: 5f:53:ce:99:50:91:e6:47:c8:37:7d:a3:1b:73:89:cd: 5e:07:c5:0f:5b:4a:2e:9b:5c:18:a1:03:77:89:7e:0a: ad:e7:df:1e:ce:1f:52:13:37:5a:f1:7c:63:50:bb:36: 52:c2:bf:ba:62:5d:d9:81:ee:e7:23:a1:c7:8d:c7:1e: 1e:68:8e:77:9f:63:73:62:b9:ff:79:68:3d:ce:34:81: a8:c6:5b:27:71:ff:2a:87:a7:b4:af:ce:07:97:24:fd: e1:ee:95:97:2c:14:02:76:d9:5e:0b:92:60:1c:79:5b: 53:73:f3:fd:1a:7e:a7:c4:b2:1f:6b:6e:d5:41:84:8e: e3:26:05:60:e2:bb:e9:af:c9:be:c5:47:3c:f3:97:18: 63:c5:e9:f8:8d:63:e7:4c:3e:b1:d0:e6:f3:93:ec:6d: 27:c2:f7:35:82:52:18:47:5e:71:8e:75:92:34:be:16: 00:ab:09:38:86:98:e6:3b:f2:fa:3d:85:19:ca:a0:2e Fingerprint (SHA-256): EA:92:1A:0F:07:D2:D2:64:35:4D:CA:28:44:41:05:21:6E:5C:54:1A:AA:CA:62:D7:AC:1F:27:BB:39:6B:87:35 Fingerprint (SHA1): EE:E3:FF:C3:20:3C:85:C6:D8:75:A4:B1:09:64:EE:5F:0D:DA:90:59 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #9817: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9818: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154046 (0x6724cbe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 21:25:56 2016 Not After : Fri Jan 08 21:25:56 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:be:97:73:13:61:a5:bc:d3:9c:96:4f:f1:95:0d:f5: c1:7b:d7:fc:75:2d:b1:ed:7e:b0:b0:5b:fb:35:ed:ef: e0:9d:7e:03:d5:d8:4e:fb:d7:91:82:65:d3:27:8a:20: 7c:af:e9:e9:14:ee:14:24:d6:7b:6c:06:31:9f:eb:69: db:6a:1d:b3:c4:6f:cc:31:8a:a7:45:d7:90:ca:ea:d5: 20:ae:0f:0f:d7:de:9f:3e:83:69:35:05:45:51:89:12: 16:8e:fc:6f:82:e0:42:b9:4a:02:b1:7c:5c:47:e4:1c: 42:fa:c1:c0:22:b8:fc:38:5d:10:24:7e:f0:f9:d1:9a: 3e:2c:73:ee:bf:c6:70:83:03:b3:52:fb:8c:e0:58:8c: c0:e8:51:f8:da:87:2c:46:24:4b:8a:d4:3c:67:7f:21: bd:98:4d:69:51:5c:a9:8f:2f:22:5f:45:c6:4b:67:3a: 6a:d3:a1:e5:db:2e:1e:73:38:11:2b:9d:66:e4:ba:6b: e1:c6:7d:ce:23:dd:a7:49:d1:46:97:77:e3:d5:33:ba: c5:af:ba:49:bc:d9:65:3b:5b:0c:94:4d:96:93:cd:d8: 76:58:a3:7f:a0:42:5d:55:25:7f:d1:96:78:a6:fc:21: 2c:75:97:7a:c5:cc:e3:40:89:8f:bd:d3:39:c2:52:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:53:b3:dc:fa:6d:b5:d8:71:41:e1:23:f6:84:ac:52: 5a:a3:4b:4c:1d:a2:b6:1c:1a:bf:0f:64:04:8b:cf:68: f7:07:b4:ab:50:6b:df:38:4b:e2:0a:21:06:52:64:0e: 8d:1b:60:6b:4c:93:22:d9:55:f6:e2:04:3f:5c:ce:d8: 93:18:59:f8:67:0c:11:f0:81:9f:12:e6:2a:0b:83:2f: 32:81:c2:6d:de:f3:96:37:67:e2:e9:a4:49:2b:d9:26: f9:2f:b1:90:ea:ab:76:42:7d:ea:c5:48:6e:23:6b:d3: 2f:9e:b1:67:a5:42:fb:6a:29:ba:40:5d:20:dd:c2:07: b7:37:66:12:1b:7f:57:ef:17:c6:b4:6b:1e:10:28:a4: a1:0b:97:e1:14:5a:b4:22:50:28:c2:57:2b:d4:45:db: 26:fa:cf:c2:18:29:3b:9e:e9:f5:06:3e:4a:d0:f3:18: ae:e9:a8:5c:5d:48:2e:6b:b3:41:1a:01:f8:65:ff:03: 1a:32:ef:d8:1c:43:9b:f5:05:6a:c8:c2:71:a9:2a:6d: 7c:23:2e:06:8a:dc:ec:04:cb:08:d3:a3:33:36:91:84: b9:f2:53:c6:a1:a7:17:22:f6:48:59:92:44:39:27:a7: d8:1d:bf:09:5a:6c:00:ac:ee:c9:ff:c1:be:d0:f4:46 Fingerprint (SHA-256): 07:85:BD:76:6C:D2:C0:EB:A9:BC:AE:FB:0C:B0:35:D1:C8:AF:DB:9A:B4:8A:C2:47:16:A5:7D:1F:FD:E3:48:4F Fingerprint (SHA1): CF:9F:27:BB:1E:31:69:1D:31:7F:B6:27:21:C6:F2:31:74:98:A5:23 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #9819: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #9820: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108154048 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9821: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #9822: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9823: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9824: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108154049 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9825: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9826: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #9827: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9828: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108154050 --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #9829: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9830: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #9831: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9832: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 108154051 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9833: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9834: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #9835: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9836: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 108154052 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9837: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9838: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #9839: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #9840: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #9841: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #9842: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #9843: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154048 (0x6724cc0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:26:28 2016 Not After : Fri Jan 08 21:26:28 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:c2:3e:90:00:67:f0:ff:c6:2e:2c:0b:f2:19:fc:c3: f4:aa:dd:b7:63:7e:54:5d:8c:e9:7f:40:5f:e1:81:e1: 59:c5:5b:17:67:e7:df:12:46:ca:3a:20:f5:ba:20:d7: e7:eb:90:ca:06:5e:3a:a7:1f:20:69:71:3a:7c:ec:e5: b0:6a:94:9d:3d:31:89:c9:fb:56:94:e3:eb:7a:91:25: 83:07:e1:70:d0:3d:a9:eb:8c:f3:21:5f:e1:03:22:ea: cf:a9:98:ec:14:b0:c9:38:6a:c8:66:69:c1:6d:74:63: ef:90:a2:c6:f2:74:f1:fe:89:81:98:c1:83:2d:f4:02: bc:ef:9c:08:37:1e:ea:a1:04:95:e0:c7:2d:ec:ad:c4: 46:bc:55:2c:9b:af:22:cb:9a:be:2f:22:56:56:90:f1: 05:16:04:01:bb:ed:31:cc:88:15:69:6e:72:13:dd:e4: 41:22:2e:0a:22:5f:4a:1c:51:fb:8e:17:9a:84:a9:36: 3a:73:63:3f:c7:43:b0:08:c0:4c:5b:9c:5d:2e:b2:82: 2e:b5:fc:79:e8:dc:67:ad:5d:22:ae:46:5c:79:f7:38: ee:40:fc:36:84:0c:b8:c8:31:37:6e:35:ba:10:94:92: 57:6c:83:8e:dc:49:23:55:64:c0:0e:19:b4:3c:48:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:1d:f3:84:10:d0:cb:0f:67:25:4d:31:69:64:f3:c6: a5:d5:b8:6f:c9:62:7f:38:1b:d7:4b:16:15:28:85:c9: 83:2c:4a:99:d7:32:d2:aa:a7:4c:cc:b1:d8:11:5c:f8: 13:90:44:33:4c:ab:6e:7d:04:52:90:81:67:1d:24:c8: 9d:49:b6:2b:b0:85:c6:8f:d8:43:bc:ad:37:61:a4:f5: 1c:40:0e:5c:34:4f:64:8a:37:e0:c2:fa:2b:de:1e:a9: 00:2d:11:f0:88:7a:d8:c4:d6:a1:6d:02:54:c4:16:21: de:da:6a:90:7f:f7:f3:a0:76:89:db:9d:12:00:0d:03: 70:6f:48:03:55:d1:1f:19:a6:43:32:e1:38:86:17:cb: 1d:88:58:f5:ad:67:de:18:68:bc:95:c0:bf:77:d2:31: 4e:51:9c:94:25:7e:59:fa:eb:50:25:f3:44:0d:61:96: 71:24:79:b7:93:46:95:20:16:2b:5c:09:42:d5:86:88: a4:a5:46:0d:8d:06:a5:87:37:5b:fe:f1:4f:78:d2:1f: 76:4f:20:c1:5b:a7:55:ed:af:ff:10:b2:84:a5:55:51: 13:21:9d:2d:50:05:65:d7:52:dd:6c:19:16:71:1d:26: 84:42:a1:37:ef:bf:e2:41:4d:1c:79:2e:27:33:a5:9a Fingerprint (SHA-256): 3F:F5:2D:D1:C6:7E:64:E9:20:98:1F:46:C1:23:65:96:6D:9A:E8:A2:71:C0:1C:55:21:F3:E0:5B:C4:D8:F6:79 Fingerprint (SHA1): 5C:D0:78:EA:72:78:BF:72:0B:4D:E2:1C:78:A6:45:CE:00:65:DE:B2 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9844: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9845: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154049 (0x6724cc1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:26:37 2016 Not After : Fri Jan 08 21:26:37 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:b8:35:88:b0:cb:e8:b6:c0:19:f9:5a:31:30:d0:26: 4d:d8:91:1e:e9:53:ff:c8:13:30:7b:59:c9:8d:94:c6: f5:93:83:bc:6f:cf:e0:72:88:20:91:81:9d:64:a4:3a: ca:ab:e4:9a:f6:30:29:cc:c7:e5:ea:bc:23:d0:1d:be: f9:af:a2:0a:22:b4:12:f6:ac:40:ad:c4:39:b8:22:6b: fe:66:4b:2a:dc:bd:41:39:88:f7:19:eb:54:99:c1:31: bb:e9:16:b6:6d:cc:6c:0c:2f:85:10:51:3b:64:0c:14: df:d7:1c:39:3d:a4:32:68:bc:81:b9:27:a4:0a:83:b3: a9:e5:db:08:81:1c:d0:cc:94:33:2d:65:09:db:76:7c: 97:5d:43:28:c5:92:c7:bf:2a:19:f3:23:e2:37:d6:61: 04:92:d3:5d:af:52:0d:da:a7:de:f9:48:16:d0:6d:4d: 46:de:13:38:1c:c2:e8:d6:2b:0b:19:6f:f8:a8:04:5a: e2:c4:d8:4a:ac:be:66:63:14:ed:53:39:97:4d:f1:85: 09:b6:86:2c:33:b8:41:43:d6:a8:9f:43:dd:73:0c:40: d5:5e:4e:10:01:95:a7:a7:40:e3:52:4a:9d:a9:37:cf: 89:59:bc:67:94:01:2b:88:8e:51:6c:0e:ea:1a:40:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:9c:da:87:d0:a1:0e:bc:2c:00:fb:e8:e1:5e:a1:c6: c6:75:ce:42:66:c7:2c:b0:8b:3c:bf:7d:e4:74:04:07: 64:0a:ab:cf:ca:e8:b3:90:7b:3b:55:02:24:23:1a:74: cf:16:3f:25:1b:51:9b:fd:67:59:29:63:c4:58:68:51: 2a:c2:d4:60:63:98:df:44:cc:7a:ee:7f:b1:6a:80:b8: ab:93:68:de:c3:5d:eb:30:b5:23:d5:80:d0:8d:2b:9f: 71:16:66:9b:87:11:f3:20:58:9f:07:d5:eb:1a:7a:8e: ce:5c:4c:ab:91:59:58:c0:25:0d:9a:34:b0:d4:dc:ec: b9:42:e7:b9:a4:e0:cd:25:79:47:91:5c:5e:46:e2:1a: 1e:ab:2a:01:91:5d:a1:42:01:fd:56:f6:8d:31:f6:f6: e4:78:12:6e:f9:86:dd:02:d0:12:e8:b5:cf:17:69:61: e6:86:3b:96:18:01:99:b7:60:a8:7f:5f:7f:c3:d1:9d: f4:2d:9a:10:22:31:b8:78:fe:ec:18:4e:90:ad:12:d7: 3e:96:ca:6b:09:2c:5a:ef:af:01:e2:19:ad:81:ab:32: ec:42:f9:42:64:ee:1d:7b:23:d3:ac:82:b3:dc:72:c7: e4:1f:ea:a1:f7:36:92:e7:1a:c7:e8:c5:bc:c9:f3:47 Fingerprint (SHA-256): 38:18:17:0F:B0:17:B9:19:5A:56:77:1E:FB:0C:0E:43:06:A6:50:0A:8C:26:37:29:97:16:2F:55:3F:22:F2:21 Fingerprint (SHA1): 73:7A:96:E3:E0:97:B7:5D:EE:4C:0A:DE:45:67:71:DF:E7:A3:A6:D7 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #9846: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9847: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9848: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154050 (0x6724cc2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 21:26:53 2016 Not After : Fri Jan 08 21:26:53 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:44:40:88:e1:ec:a0:1c:3f:5e:5b:e6:d8:6b:fb:9c: ad:50:29:21:69:8f:c6:79:de:65:52:1b:2c:90:c9:e6: de:68:c6:83:1e:5d:fc:50:24:00:d5:7d:9a:94:2a:ec: dd:ed:62:a6:9f:5d:43:c3:15:69:6a:4d:90:26:d2:a0: 3d:49:0a:ae:a3:96:5f:67:8c:9f:73:cf:4d:9f:ec:f5: a2:40:fd:fe:5a:51:a4:48:b5:ca:7f:57:ea:79:17:7d: b9:3c:05:4a:0e:03:b7:aa:7f:28:d8:a4:23:e6:f5:71: 71:b6:15:a7:f7:5c:b9:ca:3e:31:e5:c8:28:66:ee:84: b6:e8:2c:b6:2b:4c:3f:bf:93:78:ef:fe:79:a1:05:e4: 7f:27:97:27:08:5f:4c:30:53:6f:59:c2:c6:a6:11:16: 4c:77:e9:41:3a:9c:02:e8:8d:cd:d5:ee:e9:ee:59:01: c8:6f:fb:95:82:25:29:17:28:b4:97:b6:90:94:30:46: 0d:ac:12:54:fd:1d:37:6b:6b:dc:45:3f:34:d6:13:e9: 8f:b5:19:00:59:03:82:12:df:d5:76:81:49:00:db:e0: 37:1f:d7:7f:c5:b9:72:8a:6b:8b:30:28:8a:1c:49:e5: 83:4b:fd:24:99:e9:28:b7:32:17:95:2b:ca:7f:60:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:e9:32:60:13:fc:79:ef:db:a1:92:8a:56:27:0b:13: 6a:cc:29:14:d0:e9:c8:87:a5:87:4d:73:24:29:d1:cc: 95:29:3e:75:87:fa:e1:30:f0:11:b0:8b:41:8f:86:61: eb:8c:71:6b:9f:c2:88:17:ad:06:72:f4:24:0f:ca:91: 25:67:26:a3:d5:34:6b:99:07:4c:74:e0:61:50:df:23: c2:ee:14:b8:dc:bf:47:69:60:7d:87:59:90:37:42:4d: 2f:f1:93:07:d0:6e:fd:8e:ef:c8:8f:c5:c8:90:c9:6d: 1f:91:4f:f5:22:24:df:7f:0b:19:41:19:5a:f1:f5:3b: f2:07:9c:79:99:13:bc:e4:4e:67:0e:93:06:94:b2:3f: 29:f6:b5:6d:26:14:b8:40:d7:e2:7b:2c:b4:28:9d:56: 4e:20:84:0f:49:da:ba:69:5d:12:0a:21:27:25:67:ed: cb:4b:2c:08:41:d5:72:f4:bf:7c:2c:a9:ca:66:1e:c2: e7:45:40:8d:54:e9:73:2b:93:e3:e5:b9:6d:03:17:e0: ca:e4:69:c0:b5:30:eb:8b:c8:2c:20:d4:ed:fe:0a:7f: 7d:0d:18:70:3d:1c:fd:d4:dd:fd:b6:3c:ec:90:3f:8a: 4a:ff:41:35:03:94:4c:c3:5c:1c:59:10:e7:85:88:d4 Fingerprint (SHA-256): B7:38:9D:44:72:86:03:93:2F:FA:87:22:23:37:C2:91:3B:36:04:55:C8:F8:5A:48:9B:26:36:87:69:C2:F7:1A Fingerprint (SHA1): 3D:DA:C5:08:39:FA:09:C6:92:94:20:94:33:07:C8:38:98:E3:5A:54 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #9849: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #9850: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108154053 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9851: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #9852: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9853: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9854: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108154054 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9855: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9856: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #9857: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9858: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108154055 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA1Root-108153832.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #9859: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9860: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #9861: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9862: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108154056 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9863: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9864: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #9865: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154053 (0x6724cc5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:27:44 2016 Not After : Fri Jan 08 21:27:44 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:cc:bd:83:9f:ea:d5:1a:f5:2f:ad:67:3a:81:82:a1: 65:1b:26:80:e3:5a:23:04:d6:67:e1:51:62:97:de:d0: bc:60:86:a7:00:3c:6c:ad:80:4a:25:34:32:72:2b:0f: 94:6d:45:ff:83:37:9d:19:2c:7f:d8:79:b8:17:5a:9e: 32:85:77:4b:f1:44:09:f0:d1:0c:e3:52:6d:db:12:9f: 4a:25:03:27:39:5a:e8:0c:de:bf:d4:d6:06:02:eb:07: e2:4f:30:75:f8:ae:17:53:2b:c4:a8:a2:e0:2d:ce:d9: e3:69:5e:21:ba:17:d0:1b:d9:c8:00:cd:45:d5:3d:04: 85:e0:26:84:6f:7f:88:0b:c6:ba:18:cc:8b:dd:f2:1a: e3:8f:85:f1:6a:b8:c3:d3:ae:e9:e7:b6:ba:54:d2:54: 08:73:74:70:96:e3:65:8d:5d:2a:f8:68:42:1d:e1:cf: 5e:30:70:16:04:95:cd:8e:a6:e6:5e:9f:d3:ba:bb:73: cc:8f:ef:63:38:8d:9a:d4:64:d7:84:66:cb:9b:0b:15: df:83:98:e2:cc:34:96:0f:ba:56:1b:7c:69:1a:b1:f6: 32:77:23:07:5a:6d:26:37:d5:1f:21:e5:34:1f:60:3c: 3c:6b:e3:62:0f:9e:da:d6:84:87:73:a4:2a:28:31:e7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:c7:66:01:d4:04:ba:6f:92:5f:7e:15:bf:03:6c:52: 17:07:8c:86:05:ca:bc:cf:6a:fc:3a:be:50:40:09:ac: 89:52:24:44:4a:6d:91:c5:be:94:eb:fa:fa:a9:9e:43: 7b:56:3a:fd:af:09:fb:3f:95:15:7f:c8:f6:cc:74:1f: 3e:ec:b3:9a:38:1e:e4:54:23:02:f2:35:7b:f5:10:a9: f5:b0:ff:f1:93:b5:df:85:91:b6:eb:84:63:80:3d:c6: c8:21:a4:bc:1d:b0:3e:1d:aa:44:16:02:67:50:09:5d: b8:9a:33:af:9d:1e:96:93:b6:2c:db:d8:0d:35:2d:b9: f9:cb:41:b8:9f:6b:72:4c:3d:01:01:ff:b6:c2:87:62: 46:c9:d5:fb:61:b0:50:9a:83:14:19:fc:e4:a2:18:53: 99:58:fd:c8:80:74:82:4b:97:e9:2d:32:d1:08:b3:38: 19:6a:8a:01:65:3d:5a:61:b1:1f:fe:34:75:48:2e:16: 0e:13:bb:bc:fd:4e:1b:f2:7d:10:4b:cb:66:39:27:bb: 8a:07:8d:11:94:6a:df:1b:1a:83:96:20:8f:0d:76:34: f3:f2:94:dd:c8:60:b2:a6:3e:3b:ec:39:4a:bf:30:18: 86:33:bb:9c:5a:29:8c:e6:ad:65:96:72:0a:0e:92:d6 Fingerprint (SHA-256): FD:B6:D5:DE:9F:E9:EB:49:26:97:B5:F6:F5:B3:B6:77:ED:23:C6:30:E2:CC:D7:F7:C2:23:98:D8:16:7E:41:D7 Fingerprint (SHA1): 86:82:EB:C6:C6:61:62:1E:47:A4:63:E4:2C:AC:A5:55:B8:C1:A5:8D Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #9866: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #9867: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108154057 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9868: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #9869: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #9870: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108154058 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9871: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #9872: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #9873: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9874: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108154059 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9875: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9876: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108154060 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9877: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9878: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #9879: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9880: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9881: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108154061 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-Bridge-108153833.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #9882: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9883: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #9884: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9885: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108154062 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9886: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9887: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #9888: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #9889: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154058 (0x6724cca) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 21:28:34 2016 Not After : Fri Jan 08 21:28:34 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:a9:7c:ad:a1:36:d2:fe:60:6b:e7:c6:3d:9c:09:8e: 88:c6:8a:70:b5:54:2a:a6:99:25:46:4b:0e:b4:38:41: a1:52:10:40:fb:76:19:9c:80:9e:2c:10:af:76:09:da: a7:98:c8:c5:3f:c9:e1:69:3e:98:34:d0:dc:04:31:44: e5:c8:77:b3:39:8e:44:60:18:b9:dc:a4:a5:f8:d7:e5: 1c:7b:61:4a:93:08:b7:e1:03:25:3f:38:c5:3b:a7:fb: 70:d4:2a:01:e2:8f:0d:ae:22:ec:d6:f3:f8:74:64:a6: cd:1f:08:88:ac:32:12:c0:9c:67:6b:57:c6:ea:cf:33: 25:d8:22:79:b3:38:17:da:d6:70:82:ae:f3:cf:34:cb: 4e:17:8f:18:30:67:98:0f:eb:0d:87:31:18:da:c5:4c: 27:e3:b4:e6:11:70:b4:60:29:96:ce:89:c5:e7:7f:e3: 29:9a:92:33:27:eb:cc:58:fb:c3:c6:be:c4:6b:ea:e9: 86:88:8e:59:98:75:5e:f8:e0:59:a2:46:1e:43:a1:6a: 54:22:6e:f3:cc:73:76:d2:50:af:14:15:1c:2f:84:0d: d7:ea:2d:77:36:29:30:a4:16:9d:c8:bb:00:f9:cc:80: 42:e1:b5:3c:38:bb:4b:2b:59:f7:6a:55:5f:a2:1c:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0d:62:3b:2e:d6:3b:ed:a1:9e:fd:4b:93:48:96:e8:e0: 18:58:44:c5:01:5f:39:b3:ba:0f:e2:bc:8a:24:d1:02: 88:88:80:b0:ff:78:38:d4:99:ef:f0:75:f0:3a:85:93: 30:65:48:20:48:ff:99:bc:9d:e0:5b:35:be:29:0b:84: eb:19:7e:f9:ce:30:d4:0e:23:95:7b:80:e7:ae:ba:d7: 97:a9:d6:b4:78:6d:3f:4e:a9:a3:fa:e6:01:f3:d0:b0: aa:90:c3:32:5a:35:eb:b9:1c:1f:80:8c:c7:a8:00:43: 0e:f5:ac:12:8c:89:42:bd:5c:6c:b0:cd:c5:ce:a4:25: f9:24:65:74:90:7d:e6:85:b6:22:66:1a:d6:b0:8e:b7: 07:c0:02:94:0b:8b:08:6d:a1:8c:e3:a1:6c:cd:a1:9d: 6b:36:e6:6b:a4:22:c5:53:3c:15:a8:eb:8f:c0:3b:cb: 05:ca:27:b8:5d:58:64:5a:21:fa:b9:09:54:45:bd:8c: 9a:24:50:7b:cf:ae:a3:b2:86:e6:70:5f:8d:80:13:39: 89:f1:7d:f3:35:70:53:e1:2c:62:4c:41:c5:e9:8f:23: 6c:c7:33:b8:03:8a:57:5b:c5:d1:5a:51:c4:1f:84:a6: 7a:58:8e:bd:2b:be:7f:86:ce:05:cb:07:a7:91:45:b0 Fingerprint (SHA-256): E7:AB:CC:FF:A2:92:C5:3D:EF:7A:B3:91:8D:17:00:57:BA:C2:38:57:8D:20:97:E5:87:06:80:3E:76:4D:66:6F Fingerprint (SHA1): D2:05:70:5F:33:DA:D1:97:46:65:AC:59:E4:12:6C:77:39:57:4C:EB Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9890: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154058 (0x6724cca) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 21:28:34 2016 Not After : Fri Jan 08 21:28:34 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:a9:7c:ad:a1:36:d2:fe:60:6b:e7:c6:3d:9c:09:8e: 88:c6:8a:70:b5:54:2a:a6:99:25:46:4b:0e:b4:38:41: a1:52:10:40:fb:76:19:9c:80:9e:2c:10:af:76:09:da: a7:98:c8:c5:3f:c9:e1:69:3e:98:34:d0:dc:04:31:44: e5:c8:77:b3:39:8e:44:60:18:b9:dc:a4:a5:f8:d7:e5: 1c:7b:61:4a:93:08:b7:e1:03:25:3f:38:c5:3b:a7:fb: 70:d4:2a:01:e2:8f:0d:ae:22:ec:d6:f3:f8:74:64:a6: cd:1f:08:88:ac:32:12:c0:9c:67:6b:57:c6:ea:cf:33: 25:d8:22:79:b3:38:17:da:d6:70:82:ae:f3:cf:34:cb: 4e:17:8f:18:30:67:98:0f:eb:0d:87:31:18:da:c5:4c: 27:e3:b4:e6:11:70:b4:60:29:96:ce:89:c5:e7:7f:e3: 29:9a:92:33:27:eb:cc:58:fb:c3:c6:be:c4:6b:ea:e9: 86:88:8e:59:98:75:5e:f8:e0:59:a2:46:1e:43:a1:6a: 54:22:6e:f3:cc:73:76:d2:50:af:14:15:1c:2f:84:0d: d7:ea:2d:77:36:29:30:a4:16:9d:c8:bb:00:f9:cc:80: 42:e1:b5:3c:38:bb:4b:2b:59:f7:6a:55:5f:a2:1c:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0d:62:3b:2e:d6:3b:ed:a1:9e:fd:4b:93:48:96:e8:e0: 18:58:44:c5:01:5f:39:b3:ba:0f:e2:bc:8a:24:d1:02: 88:88:80:b0:ff:78:38:d4:99:ef:f0:75:f0:3a:85:93: 30:65:48:20:48:ff:99:bc:9d:e0:5b:35:be:29:0b:84: eb:19:7e:f9:ce:30:d4:0e:23:95:7b:80:e7:ae:ba:d7: 97:a9:d6:b4:78:6d:3f:4e:a9:a3:fa:e6:01:f3:d0:b0: aa:90:c3:32:5a:35:eb:b9:1c:1f:80:8c:c7:a8:00:43: 0e:f5:ac:12:8c:89:42:bd:5c:6c:b0:cd:c5:ce:a4:25: f9:24:65:74:90:7d:e6:85:b6:22:66:1a:d6:b0:8e:b7: 07:c0:02:94:0b:8b:08:6d:a1:8c:e3:a1:6c:cd:a1:9d: 6b:36:e6:6b:a4:22:c5:53:3c:15:a8:eb:8f:c0:3b:cb: 05:ca:27:b8:5d:58:64:5a:21:fa:b9:09:54:45:bd:8c: 9a:24:50:7b:cf:ae:a3:b2:86:e6:70:5f:8d:80:13:39: 89:f1:7d:f3:35:70:53:e1:2c:62:4c:41:c5:e9:8f:23: 6c:c7:33:b8:03:8a:57:5b:c5:d1:5a:51:c4:1f:84:a6: 7a:58:8e:bd:2b:be:7f:86:ce:05:cb:07:a7:91:45:b0 Fingerprint (SHA-256): E7:AB:CC:FF:A2:92:C5:3D:EF:7A:B3:91:8D:17:00:57:BA:C2:38:57:8D:20:97:E5:87:06:80:3E:76:4D:66:6F Fingerprint (SHA1): D2:05:70:5F:33:DA:D1:97:46:65:AC:59:E4:12:6C:77:39:57:4C:EB Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9891: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #9892: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108154063 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9893: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #9894: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #9895: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108154064 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9896: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #9897: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #9898: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9899: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108154065 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9900: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9901: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108154066 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9902: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9903: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #9904: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9905: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9906: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108154067 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-Bridge-108153834.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #9907: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9908: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #9909: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9910: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108154068 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9911: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9912: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #9913: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9914: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 108154069 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-BridgeNavy-108153835.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #9915: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9916: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #9917: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9918: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108154070 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9919: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9920: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #9921: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #9922: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154064 (0x6724cd0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 21:29:33 2016 Not After : Fri Jan 08 21:29:33 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:39:bb:d1:36:ae:65:73:87:c8:d6:49:f3:b0:84:54: 2e:ec:12:29:59:ec:50:5c:b5:d1:17:34:76:d4:34:53: 35:fa:5b:06:35:57:48:e8:30:04:dd:f2:5d:bc:ef:e1: d2:59:51:07:91:d2:cb:7a:ce:5d:72:a9:d6:83:a9:98: 0c:ec:b8:69:86:2c:c5:68:09:c3:08:79:d6:fd:47:d0: 5c:76:06:8a:e9:8c:c3:a3:59:a7:f1:c8:1a:c9:c3:18: ca:91:6a:73:a5:be:47:5f:26:a0:2e:a3:ab:7d:20:50: dc:fc:92:8e:21:a0:3d:27:7c:b2:68:e3:ef:5f:59:fc: 29:3f:55:dd:8f:bd:6d:79:fb:0d:73:85:41:c1:e9:03: f9:ef:d7:8b:2e:e5:23:90:b5:09:ee:64:1a:f1:8c:6a: 50:e3:8e:30:4a:1c:a6:8c:c5:ed:68:5c:a7:4e:36:44: 52:9a:fc:56:3d:ab:66:1d:5d:c6:f9:01:7e:d5:70:90: 2f:28:87:0c:ce:06:e6:02:04:fb:77:8b:d6:f3:10:5f: a4:c7:80:2b:47:f1:40:d9:9c:6c:c9:82:6e:97:0b:b6: 3f:63:d0:0f:14:95:cf:05:f8:f0:09:10:74:2c:27:1f: 25:35:fb:83:87:ce:6c:8e:ef:92:32:cd:18:f2:25:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 34:01:49:e3:8d:ec:8d:62:d4:01:06:59:67:ae:eb:13: 0e:0a:df:b5:2b:d6:4f:48:71:93:31:b1:bb:a1:1a:41: 2a:1b:cb:b5:74:7c:a4:16:b0:33:f7:67:8a:30:c6:b2: 9a:4b:8b:c2:ae:d3:6c:b0:f0:35:8b:49:0f:8a:74:af: 5b:8e:e1:09:34:2a:81:d1:1a:64:22:c3:e0:be:74:03: 89:44:07:70:32:c7:a5:4c:a5:6a:c5:22:48:48:82:ee: 39:e8:19:3a:06:fe:2d:40:eb:e0:7e:e4:91:50:2f:88: a6:03:98:61:55:ec:8b:a6:20:db:13:e9:ca:e5:0c:65: 7c:d0:0f:60:3f:30:e3:11:45:da:c7:b6:7f:80:5b:f5: b6:fd:43:e4:9b:42:99:64:77:a7:be:80:1b:fa:06:d0: 1f:3c:8a:d3:0d:2a:5b:65:0a:01:77:9f:3a:b1:a9:36: a7:70:ce:bc:a7:b4:8d:f9:ed:ab:cf:2c:02:e3:2a:f8: fb:4d:ad:99:0d:82:73:90:9c:44:ff:1d:a3:5d:0f:7e: 26:19:f5:c7:98:75:49:30:fe:4a:73:39:a5:ee:ed:f6: 3a:8f:31:32:39:c7:2e:83:68:8f:0d:d4:3d:d8:d0:b3: 5f:98:c5:00:53:3e:ca:dc:d6:fc:cd:71:f9:18:28:fb Fingerprint (SHA-256): 3F:F4:32:F2:2A:41:5A:B0:27:F9:1F:D0:1D:00:EC:59:86:C8:8C:E6:20:34:4F:F7:34:E0:D1:45:11:56:8E:DA Fingerprint (SHA1): 28:35:AF:23:DE:29:6A:27:98:43:4D:2D:49:0D:2C:7C:98:5E:40:10 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9923: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154064 (0x6724cd0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 21:29:33 2016 Not After : Fri Jan 08 21:29:33 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:39:bb:d1:36:ae:65:73:87:c8:d6:49:f3:b0:84:54: 2e:ec:12:29:59:ec:50:5c:b5:d1:17:34:76:d4:34:53: 35:fa:5b:06:35:57:48:e8:30:04:dd:f2:5d:bc:ef:e1: d2:59:51:07:91:d2:cb:7a:ce:5d:72:a9:d6:83:a9:98: 0c:ec:b8:69:86:2c:c5:68:09:c3:08:79:d6:fd:47:d0: 5c:76:06:8a:e9:8c:c3:a3:59:a7:f1:c8:1a:c9:c3:18: ca:91:6a:73:a5:be:47:5f:26:a0:2e:a3:ab:7d:20:50: dc:fc:92:8e:21:a0:3d:27:7c:b2:68:e3:ef:5f:59:fc: 29:3f:55:dd:8f:bd:6d:79:fb:0d:73:85:41:c1:e9:03: f9:ef:d7:8b:2e:e5:23:90:b5:09:ee:64:1a:f1:8c:6a: 50:e3:8e:30:4a:1c:a6:8c:c5:ed:68:5c:a7:4e:36:44: 52:9a:fc:56:3d:ab:66:1d:5d:c6:f9:01:7e:d5:70:90: 2f:28:87:0c:ce:06:e6:02:04:fb:77:8b:d6:f3:10:5f: a4:c7:80:2b:47:f1:40:d9:9c:6c:c9:82:6e:97:0b:b6: 3f:63:d0:0f:14:95:cf:05:f8:f0:09:10:74:2c:27:1f: 25:35:fb:83:87:ce:6c:8e:ef:92:32:cd:18:f2:25:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 34:01:49:e3:8d:ec:8d:62:d4:01:06:59:67:ae:eb:13: 0e:0a:df:b5:2b:d6:4f:48:71:93:31:b1:bb:a1:1a:41: 2a:1b:cb:b5:74:7c:a4:16:b0:33:f7:67:8a:30:c6:b2: 9a:4b:8b:c2:ae:d3:6c:b0:f0:35:8b:49:0f:8a:74:af: 5b:8e:e1:09:34:2a:81:d1:1a:64:22:c3:e0:be:74:03: 89:44:07:70:32:c7:a5:4c:a5:6a:c5:22:48:48:82:ee: 39:e8:19:3a:06:fe:2d:40:eb:e0:7e:e4:91:50:2f:88: a6:03:98:61:55:ec:8b:a6:20:db:13:e9:ca:e5:0c:65: 7c:d0:0f:60:3f:30:e3:11:45:da:c7:b6:7f:80:5b:f5: b6:fd:43:e4:9b:42:99:64:77:a7:be:80:1b:fa:06:d0: 1f:3c:8a:d3:0d:2a:5b:65:0a:01:77:9f:3a:b1:a9:36: a7:70:ce:bc:a7:b4:8d:f9:ed:ab:cf:2c:02:e3:2a:f8: fb:4d:ad:99:0d:82:73:90:9c:44:ff:1d:a3:5d:0f:7e: 26:19:f5:c7:98:75:49:30:fe:4a:73:39:a5:ee:ed:f6: 3a:8f:31:32:39:c7:2e:83:68:8f:0d:d4:3d:d8:d0:b3: 5f:98:c5:00:53:3e:ca:dc:d6:fc:cd:71:f9:18:28:fb Fingerprint (SHA-256): 3F:F4:32:F2:2A:41:5A:B0:27:F9:1F:D0:1D:00:EC:59:86:C8:8C:E6:20:34:4F:F7:34:E0:D1:45:11:56:8E:DA Fingerprint (SHA1): 28:35:AF:23:DE:29:6A:27:98:43:4D:2D:49:0D:2C:7C:98:5E:40:10 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9924: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #9925: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154063 (0x6724ccf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 21:29:28 2016 Not After : Fri Jan 08 21:29:28 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:48:9c:b5:a4:65:17:a5:a3:65:42:dc:30:0b:0a:d2: 5c:8c:c5:c2:f8:a2:61:b9:44:99:d7:4f:1a:90:85:28: 3d:60:67:06:77:5a:e5:f3:ca:06:43:02:30:be:14:fd: 0f:ce:e8:af:82:f0:e6:64:53:72:53:fe:d3:06:89:74: fe:50:9c:2d:77:e4:ec:ff:a0:a1:30:3b:70:e9:f9:5a: dd:3f:60:91:54:cb:ab:28:3e:b9:ab:e2:ed:dd:d5:cd: 16:86:3d:70:83:27:cd:15:e7:99:14:42:2d:e4:10:91: d2:02:1d:c4:be:a8:25:46:04:58:a6:c2:01:57:ee:8f: 76:16:ed:11:43:7d:1f:90:ab:8b:0d:d7:04:aa:8a:6c: a0:bb:af:f9:8a:4d:96:23:7f:46:f2:ad:95:93:af:de: ce:fe:df:fb:c7:18:bb:c4:be:58:c8:bd:19:f9:6d:33: 44:64:3c:8c:ca:61:06:bb:06:b3:79:33:36:b0:dd:74: c4:fd:1e:3f:a8:3f:c4:13:85:bb:b4:c0:d2:d6:e1:2d: cb:1c:b9:db:39:22:e0:6f:95:f9:42:ef:58:12:e5:01: 25:f3:cb:1d:b6:0e:ed:9b:cc:b8:9e:d1:98:06:c3:3d: 33:84:00:ae:5d:c7:cc:cc:56:92:35:64:f7:0d:b3:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3a:65:68:3a:1b:e2:e4:ee:5c:e6:a0:a7:39:e4:74:cc: a3:f8:8a:1a:00:d9:d1:5e:0c:db:28:c9:b1:e1:c3:79: 53:6b:a1:24:54:f6:ec:3c:a6:c6:94:5e:93:6b:04:40: 01:2e:c8:e1:f4:15:d5:37:9c:5d:8c:e3:33:ca:e0:e5: 20:46:60:c8:a7:4e:1e:b4:ad:b8:9c:81:cd:20:52:cb: 86:0b:69:a1:c9:2d:d1:82:fe:75:5f:7d:80:95:2d:46: de:71:c2:b2:cb:85:12:2a:b6:d4:8a:20:76:80:a3:65: 8b:2f:c2:8f:21:bc:f3:c9:f0:c0:c5:f9:b1:70:c3:db: ca:83:08:5d:f2:79:16:24:2e:64:af:5d:30:c8:58:ec: 2e:37:18:ca:29:a8:5d:c0:85:74:b8:ff:64:7e:89:a6: 85:88:d5:58:13:83:f8:97:6a:3b:e0:d0:53:ed:7d:13: e0:88:92:da:22:d0:ce:d7:ce:35:d7:94:45:70:53:35: 1d:e7:50:fe:81:26:a2:d4:2d:84:e5:27:4e:2f:5c:d9: 96:ba:a3:b8:48:04:ee:3d:3f:47:e0:76:d0:60:ef:dd: 5c:b9:fb:74:ee:44:e3:9b:a2:e3:74:36:8e:e3:41:e9: 9c:b0:7a:b9:71:38:ff:b3:9a:14:14:cb:45:72:a4:e3 Fingerprint (SHA-256): FE:E5:54:3E:40:18:AD:28:B6:57:F7:E2:D1:A5:AA:3F:5E:42:D7:2B:89:C5:66:54:79:59:04:0E:FB:4A:4B:79 Fingerprint (SHA1): 13:5E:58:B7:E3:F0:E2:4E:65:A6:F4:D7:39:E4:39:DB:B0:DA:89:FD Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9926: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154064 (0x6724cd0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 21:29:33 2016 Not After : Fri Jan 08 21:29:33 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:39:bb:d1:36:ae:65:73:87:c8:d6:49:f3:b0:84:54: 2e:ec:12:29:59:ec:50:5c:b5:d1:17:34:76:d4:34:53: 35:fa:5b:06:35:57:48:e8:30:04:dd:f2:5d:bc:ef:e1: d2:59:51:07:91:d2:cb:7a:ce:5d:72:a9:d6:83:a9:98: 0c:ec:b8:69:86:2c:c5:68:09:c3:08:79:d6:fd:47:d0: 5c:76:06:8a:e9:8c:c3:a3:59:a7:f1:c8:1a:c9:c3:18: ca:91:6a:73:a5:be:47:5f:26:a0:2e:a3:ab:7d:20:50: dc:fc:92:8e:21:a0:3d:27:7c:b2:68:e3:ef:5f:59:fc: 29:3f:55:dd:8f:bd:6d:79:fb:0d:73:85:41:c1:e9:03: f9:ef:d7:8b:2e:e5:23:90:b5:09:ee:64:1a:f1:8c:6a: 50:e3:8e:30:4a:1c:a6:8c:c5:ed:68:5c:a7:4e:36:44: 52:9a:fc:56:3d:ab:66:1d:5d:c6:f9:01:7e:d5:70:90: 2f:28:87:0c:ce:06:e6:02:04:fb:77:8b:d6:f3:10:5f: a4:c7:80:2b:47:f1:40:d9:9c:6c:c9:82:6e:97:0b:b6: 3f:63:d0:0f:14:95:cf:05:f8:f0:09:10:74:2c:27:1f: 25:35:fb:83:87:ce:6c:8e:ef:92:32:cd:18:f2:25:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 34:01:49:e3:8d:ec:8d:62:d4:01:06:59:67:ae:eb:13: 0e:0a:df:b5:2b:d6:4f:48:71:93:31:b1:bb:a1:1a:41: 2a:1b:cb:b5:74:7c:a4:16:b0:33:f7:67:8a:30:c6:b2: 9a:4b:8b:c2:ae:d3:6c:b0:f0:35:8b:49:0f:8a:74:af: 5b:8e:e1:09:34:2a:81:d1:1a:64:22:c3:e0:be:74:03: 89:44:07:70:32:c7:a5:4c:a5:6a:c5:22:48:48:82:ee: 39:e8:19:3a:06:fe:2d:40:eb:e0:7e:e4:91:50:2f:88: a6:03:98:61:55:ec:8b:a6:20:db:13:e9:ca:e5:0c:65: 7c:d0:0f:60:3f:30:e3:11:45:da:c7:b6:7f:80:5b:f5: b6:fd:43:e4:9b:42:99:64:77:a7:be:80:1b:fa:06:d0: 1f:3c:8a:d3:0d:2a:5b:65:0a:01:77:9f:3a:b1:a9:36: a7:70:ce:bc:a7:b4:8d:f9:ed:ab:cf:2c:02:e3:2a:f8: fb:4d:ad:99:0d:82:73:90:9c:44:ff:1d:a3:5d:0f:7e: 26:19:f5:c7:98:75:49:30:fe:4a:73:39:a5:ee:ed:f6: 3a:8f:31:32:39:c7:2e:83:68:8f:0d:d4:3d:d8:d0:b3: 5f:98:c5:00:53:3e:ca:dc:d6:fc:cd:71:f9:18:28:fb Fingerprint (SHA-256): 3F:F4:32:F2:2A:41:5A:B0:27:F9:1F:D0:1D:00:EC:59:86:C8:8C:E6:20:34:4F:F7:34:E0:D1:45:11:56:8E:DA Fingerprint (SHA1): 28:35:AF:23:DE:29:6A:27:98:43:4D:2D:49:0D:2C:7C:98:5E:40:10 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9927: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154064 (0x6724cd0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 21:29:33 2016 Not After : Fri Jan 08 21:29:33 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:39:bb:d1:36:ae:65:73:87:c8:d6:49:f3:b0:84:54: 2e:ec:12:29:59:ec:50:5c:b5:d1:17:34:76:d4:34:53: 35:fa:5b:06:35:57:48:e8:30:04:dd:f2:5d:bc:ef:e1: d2:59:51:07:91:d2:cb:7a:ce:5d:72:a9:d6:83:a9:98: 0c:ec:b8:69:86:2c:c5:68:09:c3:08:79:d6:fd:47:d0: 5c:76:06:8a:e9:8c:c3:a3:59:a7:f1:c8:1a:c9:c3:18: ca:91:6a:73:a5:be:47:5f:26:a0:2e:a3:ab:7d:20:50: dc:fc:92:8e:21:a0:3d:27:7c:b2:68:e3:ef:5f:59:fc: 29:3f:55:dd:8f:bd:6d:79:fb:0d:73:85:41:c1:e9:03: f9:ef:d7:8b:2e:e5:23:90:b5:09:ee:64:1a:f1:8c:6a: 50:e3:8e:30:4a:1c:a6:8c:c5:ed:68:5c:a7:4e:36:44: 52:9a:fc:56:3d:ab:66:1d:5d:c6:f9:01:7e:d5:70:90: 2f:28:87:0c:ce:06:e6:02:04:fb:77:8b:d6:f3:10:5f: a4:c7:80:2b:47:f1:40:d9:9c:6c:c9:82:6e:97:0b:b6: 3f:63:d0:0f:14:95:cf:05:f8:f0:09:10:74:2c:27:1f: 25:35:fb:83:87:ce:6c:8e:ef:92:32:cd:18:f2:25:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 34:01:49:e3:8d:ec:8d:62:d4:01:06:59:67:ae:eb:13: 0e:0a:df:b5:2b:d6:4f:48:71:93:31:b1:bb:a1:1a:41: 2a:1b:cb:b5:74:7c:a4:16:b0:33:f7:67:8a:30:c6:b2: 9a:4b:8b:c2:ae:d3:6c:b0:f0:35:8b:49:0f:8a:74:af: 5b:8e:e1:09:34:2a:81:d1:1a:64:22:c3:e0:be:74:03: 89:44:07:70:32:c7:a5:4c:a5:6a:c5:22:48:48:82:ee: 39:e8:19:3a:06:fe:2d:40:eb:e0:7e:e4:91:50:2f:88: a6:03:98:61:55:ec:8b:a6:20:db:13:e9:ca:e5:0c:65: 7c:d0:0f:60:3f:30:e3:11:45:da:c7:b6:7f:80:5b:f5: b6:fd:43:e4:9b:42:99:64:77:a7:be:80:1b:fa:06:d0: 1f:3c:8a:d3:0d:2a:5b:65:0a:01:77:9f:3a:b1:a9:36: a7:70:ce:bc:a7:b4:8d:f9:ed:ab:cf:2c:02:e3:2a:f8: fb:4d:ad:99:0d:82:73:90:9c:44:ff:1d:a3:5d:0f:7e: 26:19:f5:c7:98:75:49:30:fe:4a:73:39:a5:ee:ed:f6: 3a:8f:31:32:39:c7:2e:83:68:8f:0d:d4:3d:d8:d0:b3: 5f:98:c5:00:53:3e:ca:dc:d6:fc:cd:71:f9:18:28:fb Fingerprint (SHA-256): 3F:F4:32:F2:2A:41:5A:B0:27:F9:1F:D0:1D:00:EC:59:86:C8:8C:E6:20:34:4F:F7:34:E0:D1:45:11:56:8E:DA Fingerprint (SHA1): 28:35:AF:23:DE:29:6A:27:98:43:4D:2D:49:0D:2C:7C:98:5E:40:10 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #9928: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #9929: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108154071 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9930: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #9931: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #9932: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108154072 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9933: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #9934: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #9935: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9936: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 108154073 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9937: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9938: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #9939: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9940: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 108154074 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9941: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9942: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #9943: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9944: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 108154075 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #9945: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9946: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 108154076 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #9947: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9948: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #9949: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9950: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9951: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108154077 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9952: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9953: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #9954: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9955: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 108154078 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9956: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9957: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #9958: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9959: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108154079 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9960: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9961: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #9962: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #9963: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108154080 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #9964: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #9965: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9966: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154071 (0x6724cd7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 21:30:36 2016 Not After : Fri Jan 08 21:30:36 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:1d:d5:0f:85:b5:93:e5:98:59:a3:6d:c8:f4:3f:3a: 36:ab:13:72:b2:1e:b3:85:dd:30:07:19:e6:1e:95:bf: 57:2e:f8:24:cb:2e:58:0d:6d:95:1c:38:e3:89:52:5b: cf:9b:98:dd:e4:d1:02:00:db:b2:3f:76:2d:3e:b6:4f: f4:8c:28:30:0a:fb:f7:41:5c:f6:b8:db:14:b1:9a:f9: 64:8f:42:4d:7c:db:42:e8:24:0c:21:b6:0e:aa:c1:eb: 4e:39:0e:44:fa:b0:3a:9f:50:b3:47:42:6d:96:db:a1: 0d:cc:8f:e3:8c:37:1b:88:d6:ff:ec:81:c9:77:c7:3d: 53:86:11:31:72:20:1b:9c:2d:54:34:ac:fc:07:df:94: b8:0c:1f:a1:b3:dd:9d:7f:12:5e:62:e0:c0:b7:13:fa: 60:31:10:10:43:fa:1a:b6:30:bb:3f:a9:45:bd:d3:b0: fe:b9:bb:50:d7:59:ef:06:27:32:3d:22:c4:f0:ed:43: 2b:4a:e4:9f:0b:ae:79:1c:db:ca:95:06:c2:b8:15:63: 20:7a:fa:0b:32:39:ec:2d:52:e4:5f:b8:69:e2:f6:61: 5b:54:26:a8:2e:ca:0f:5f:3c:ea:65:a4:c3:4f:ac:8c: 05:76:a2:66:02:e5:cb:e6:38:5b:08:40:9a:99:fb:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:dd:67:5b:69:a1:a0:64:72:fc:36:54:76:85:ba:60: f0:df:91:4b:e3:6e:a1:78:a7:b3:39:55:97:95:24:8f: f0:c8:8e:c6:16:74:9d:cc:34:87:d5:7d:52:b9:45:2e: b8:22:6a:fd:c4:2c:c8:52:80:a2:96:f6:d9:d1:ef:bc: da:58:77:54:fd:e4:3c:f8:4c:f7:fb:07:9a:c2:d3:98: f9:f1:41:4b:59:2b:37:f3:00:aa:97:f2:4a:19:41:6c: 16:3e:23:64:e9:6a:af:f5:32:ba:25:ae:63:bd:6a:b7: 0d:62:61:81:91:a8:bf:72:23:37:ac:7b:2c:f9:0c:22: 14:35:b4:2c:aa:03:fe:a4:34:74:ee:99:7b:06:8d:d4: d7:ac:b9:cb:ec:1d:b9:3b:1e:53:39:41:9a:3d:97:b5: d4:2a:d0:6c:23:bc:d8:6e:07:bf:35:eb:d4:7c:c2:59: 51:95:05:c1:c5:b3:8e:b0:46:99:2b:1f:f0:a6:76:47: 02:3a:8d:df:95:1f:6b:45:63:ed:46:c9:1b:9a:3a:ba: df:14:2c:04:14:1e:d7:87:ee:5a:6d:ce:60:01:40:b6: a1:8e:59:0c:cd:9a:01:63:5d:f6:51:c1:da:e6:aa:6b: 69:99:a8:96:9d:37:84:e1:c2:46:0b:14:e9:91:62:1b Fingerprint (SHA-256): A2:A0:D3:EF:70:C9:31:0C:90:ED:7D:3F:1D:B1:EA:9F:4C:0A:E1:EF:F5:C4:F2:A1:75:8F:97:4B:CF:8C:35:DD Fingerprint (SHA1): 9D:45:AC:C3:3A:A3:4D:EF:32:8E:D8:FB:7A:5A:C1:AF:B6:1C:8F:FE Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #9967: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9968: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9969: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9970: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9971: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9972: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9973: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9974: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9975: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154072 (0x6724cd8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 21:30:42 2016 Not After : Fri Jan 08 21:30:42 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:9a:44:d5:07:14:a7:c5:46:81:b5:cd:a1:12:7f:5d: 0b:83:37:3b:ec:cc:8a:23:03:df:d2:d6:5a:b0:1e:89: 6b:22:d2:6b:1f:91:c5:87:3f:d9:55:46:ba:ad:14:34: d2:c5:18:86:bc:9e:db:f9:b6:29:15:61:9c:c7:7b:c8: ac:8f:22:63:c2:3d:72:bc:4a:27:49:4f:4c:ed:af:10: 33:32:4f:d8:e4:6e:7a:56:7f:97:9c:9c:85:99:ba:61: 3e:ae:18:33:df:5c:13:67:6e:74:d3:f1:94:42:22:fe: fb:e4:e6:a2:7c:7a:4e:a9:04:01:74:1a:38:ca:a6:66: 0f:aa:2f:eb:ad:fc:89:34:3c:26:3b:ec:f1:2f:ad:41: 2a:6b:21:07:58:e0:f7:48:7c:f3:76:ce:fc:b9:3e:6c: b1:df:2a:75:43:5d:76:07:0f:3e:d2:87:56:b1:6e:90: 3a:a6:7a:18:5d:d3:50:f1:72:9e:64:90:61:f3:a2:0b: 2d:ad:40:0b:df:20:17:76:ac:1e:88:33:8e:c3:9f:09: 9c:34:0b:a1:99:6b:0f:a7:17:07:44:7c:cb:de:f3:d2: 79:1b:88:03:3d:b8:f2:9e:9e:cb:a6:32:c0:dc:b7:aa: b8:48:12:0b:00:94:99:70:73:e7:a3:f8:97:5a:27:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:4b:51:59:3e:b8:00:70:e6:25:f0:4d:8b:ac:fb:cd: 39:60:5f:29:42:d0:0d:57:df:1d:1d:8a:7f:e2:bf:d0: 59:e0:0f:3e:81:1c:79:7a:89:74:0c:c5:b6:eb:f5:2c: f4:84:81:22:39:34:be:3c:a4:55:16:1c:a4:3b:b9:59: bc:07:f1:c2:38:d7:82:a7:93:eb:92:44:71:10:23:7a: 42:46:25:be:6b:aa:f6:1f:a1:63:bc:93:5d:e0:d8:3d: fb:7d:8e:57:35:14:3c:a2:aa:c8:f6:98:80:59:b1:8a: 7d:14:50:7d:f0:ac:cb:8e:0d:bb:d4:09:ae:41:af:c8: bd:7e:62:28:f8:03:2d:a2:f8:cd:62:d2:d1:58:63:fa: 52:2d:1c:09:73:be:1c:29:6b:03:1d:e0:df:be:2f:ec: cb:67:9f:58:b6:86:fb:83:95:5c:a4:0d:d0:4a:d1:6b: b3:60:30:53:77:5e:39:60:38:f9:76:5f:aa:ff:62:16: e2:47:4e:91:5c:10:59:d1:c3:0d:20:89:2e:38:36:31: b4:f6:53:c3:13:25:2f:d9:35:ce:80:0a:fc:15:e7:ef: 3d:c6:16:43:50:b5:0b:96:43:9f:86:de:8f:d1:2f:f4: 9d:dd:36:63:0d:c9:ef:5e:be:f9:54:56:2d:15:05:6b Fingerprint (SHA-256): F2:38:57:77:F1:A9:C6:12:7C:0F:92:40:AB:7A:2B:F3:5F:49:59:8B:C2:0D:3A:62:D5:A7:23:44:D6:CD:4C:E0 Fingerprint (SHA1): A4:CD:28:83:E3:4B:48:47:D8:C4:25:E5:66:6F:E1:DA:2B:22:ED:D9 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #9976: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9977: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9978: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9979: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9980: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #9981: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #9982: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #9983: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #9984: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #9985: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #9986: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #9987: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #9988: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #9989: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #9990: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #9991: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.114412.1.1 /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=paypal.com,OU=PayPal Production,O="PayPal, Inc.",L =San Jose,ST=California,C=US" Certificate 2 Subject: "CN=DigiCert SHA2 High Assurance Server CA,OU=www.digi cert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #9992: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #9993: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #9994: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108154081 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #9995: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #9996: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #9997: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #9998: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108154082 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #9999: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10000: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #10001: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10002: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108154083 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10003: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10004: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #10005: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10006: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 108154084 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10007: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10008: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #10009: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10010: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108154085 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10011: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10012: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #10013: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10014: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 108154086 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10015: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10016: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #10017: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10018: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 108154087 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10019: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10020: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #10021: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10022: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 108154088 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10023: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10024: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #10025: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10026: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 108154089 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10027: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10028: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #10029: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154081 (0x6724ce1) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:32:13 2016 Not After : Fri Jan 08 21:32:13 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 1a:3f:5a:f9:81:2f:6e:79:8c:5a:65:29:1e:a1:04:2b: 45:99:40:94:0a:c3:4b:87:db:bb:ee:16:5c:15:c4:bd: 03:66:a2:03:b5:50:49:88:64:6f:4c:76:18:8e:89:5d: 88:b2:d4:e6:08:60:03:a8:f9:b2:99:ae:76:29:3b:f6: 8f:83:2d:b3:d3:a9:ad:ff:d8:17:ad:37:bc:0b:74:58: 3a:c3:1e:be:07:54:7c:01:1b:b6:ed:54:a2:eb:c4:84: 02:a0:32:5e:1a:17:42:d9:d0:0b:db:89:fc:a2:5e:17: 00:3c:54:00:ef:00:7e:72:6c:1f:06:bd:76:98:f3:7b: 21:10:ef:65:cb:9f:2c:af:b0:ec:0c:22:6e:53:60:9a: 47:e7:7b:a2:a5:ff:55:1b:73:8a:00:dc:db:14:82:01: 77:d2:74:67:fe:7b:8a:a6:19:11:0a:01:de:d5:f2:5f: f4:39:2b:bc:3a:55:81:10:c5:81:7d:58:63:15:1b:c8: a5:06:bf:3a:e2:07:15:14:23:f6:cb:e4:98:57:fc:ec: a4:e9:7d:1d:d1:c3:89:d3:de:25:c0:b5:72:54:2c:37: 89:b6:dd:69:2b:55:01:7e:2c:fb:be:91:f4:79:0f:fd: 7f:0b:57:8c:aa:79:c6:28:5c:94:b2:5d:bc:7a:48:fd Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:46:6f:0b:2d:21:e0:e7:70:68:09:bf:b5: e8:98:5c:32:66:ea:1b:8c:1c:0b:a5:4d:28:01:c0:f6: 02:1d:00:ac:bd:99:41:81:62:01:46:7e:74:ba:c0:f0: c6:51:43:94:ca:c8:bc:62:b7:32:b3:f4:50:75:b4 Fingerprint (SHA-256): F9:8E:13:F3:EB:58:C7:70:F0:37:63:F1:54:B0:93:99:D0:46:B9:9F:13:8E:BA:C9:DE:3D:C2:D9:74:A7:04:BD Fingerprint (SHA1): 11:C7:CB:F4:8A:E3:36:7F:42:EA:1C:9B:CA:96:98:58:97:E2:1B:04 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #10030: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154081 (0x6724ce1) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:32:13 2016 Not After : Fri Jan 08 21:32:13 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 1a:3f:5a:f9:81:2f:6e:79:8c:5a:65:29:1e:a1:04:2b: 45:99:40:94:0a:c3:4b:87:db:bb:ee:16:5c:15:c4:bd: 03:66:a2:03:b5:50:49:88:64:6f:4c:76:18:8e:89:5d: 88:b2:d4:e6:08:60:03:a8:f9:b2:99:ae:76:29:3b:f6: 8f:83:2d:b3:d3:a9:ad:ff:d8:17:ad:37:bc:0b:74:58: 3a:c3:1e:be:07:54:7c:01:1b:b6:ed:54:a2:eb:c4:84: 02:a0:32:5e:1a:17:42:d9:d0:0b:db:89:fc:a2:5e:17: 00:3c:54:00:ef:00:7e:72:6c:1f:06:bd:76:98:f3:7b: 21:10:ef:65:cb:9f:2c:af:b0:ec:0c:22:6e:53:60:9a: 47:e7:7b:a2:a5:ff:55:1b:73:8a:00:dc:db:14:82:01: 77:d2:74:67:fe:7b:8a:a6:19:11:0a:01:de:d5:f2:5f: f4:39:2b:bc:3a:55:81:10:c5:81:7d:58:63:15:1b:c8: a5:06:bf:3a:e2:07:15:14:23:f6:cb:e4:98:57:fc:ec: a4:e9:7d:1d:d1:c3:89:d3:de:25:c0:b5:72:54:2c:37: 89:b6:dd:69:2b:55:01:7e:2c:fb:be:91:f4:79:0f:fd: 7f:0b:57:8c:aa:79:c6:28:5c:94:b2:5d:bc:7a:48:fd Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:46:6f:0b:2d:21:e0:e7:70:68:09:bf:b5: e8:98:5c:32:66:ea:1b:8c:1c:0b:a5:4d:28:01:c0:f6: 02:1d:00:ac:bd:99:41:81:62:01:46:7e:74:ba:c0:f0: c6:51:43:94:ca:c8:bc:62:b7:32:b3:f4:50:75:b4 Fingerprint (SHA-256): F9:8E:13:F3:EB:58:C7:70:F0:37:63:F1:54:B0:93:99:D0:46:B9:9F:13:8E:BA:C9:DE:3D:C2:D9:74:A7:04:BD Fingerprint (SHA1): 11:C7:CB:F4:8A:E3:36:7F:42:EA:1C:9B:CA:96:98:58:97:E2:1B:04 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #10031: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154081 (0x6724ce1) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:32:13 2016 Not After : Fri Jan 08 21:32:13 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 1a:3f:5a:f9:81:2f:6e:79:8c:5a:65:29:1e:a1:04:2b: 45:99:40:94:0a:c3:4b:87:db:bb:ee:16:5c:15:c4:bd: 03:66:a2:03:b5:50:49:88:64:6f:4c:76:18:8e:89:5d: 88:b2:d4:e6:08:60:03:a8:f9:b2:99:ae:76:29:3b:f6: 8f:83:2d:b3:d3:a9:ad:ff:d8:17:ad:37:bc:0b:74:58: 3a:c3:1e:be:07:54:7c:01:1b:b6:ed:54:a2:eb:c4:84: 02:a0:32:5e:1a:17:42:d9:d0:0b:db:89:fc:a2:5e:17: 00:3c:54:00:ef:00:7e:72:6c:1f:06:bd:76:98:f3:7b: 21:10:ef:65:cb:9f:2c:af:b0:ec:0c:22:6e:53:60:9a: 47:e7:7b:a2:a5:ff:55:1b:73:8a:00:dc:db:14:82:01: 77:d2:74:67:fe:7b:8a:a6:19:11:0a:01:de:d5:f2:5f: f4:39:2b:bc:3a:55:81:10:c5:81:7d:58:63:15:1b:c8: a5:06:bf:3a:e2:07:15:14:23:f6:cb:e4:98:57:fc:ec: a4:e9:7d:1d:d1:c3:89:d3:de:25:c0:b5:72:54:2c:37: 89:b6:dd:69:2b:55:01:7e:2c:fb:be:91:f4:79:0f:fd: 7f:0b:57:8c:aa:79:c6:28:5c:94:b2:5d:bc:7a:48:fd Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:46:6f:0b:2d:21:e0:e7:70:68:09:bf:b5: e8:98:5c:32:66:ea:1b:8c:1c:0b:a5:4d:28:01:c0:f6: 02:1d:00:ac:bd:99:41:81:62:01:46:7e:74:ba:c0:f0: c6:51:43:94:ca:c8:bc:62:b7:32:b3:f4:50:75:b4 Fingerprint (SHA-256): F9:8E:13:F3:EB:58:C7:70:F0:37:63:F1:54:B0:93:99:D0:46:B9:9F:13:8E:BA:C9:DE:3D:C2:D9:74:A7:04:BD Fingerprint (SHA1): 11:C7:CB:F4:8A:E3:36:7F:42:EA:1C:9B:CA:96:98:58:97:E2:1B:04 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #10032: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154081 (0x6724ce1) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:32:13 2016 Not After : Fri Jan 08 21:32:13 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 1a:3f:5a:f9:81:2f:6e:79:8c:5a:65:29:1e:a1:04:2b: 45:99:40:94:0a:c3:4b:87:db:bb:ee:16:5c:15:c4:bd: 03:66:a2:03:b5:50:49:88:64:6f:4c:76:18:8e:89:5d: 88:b2:d4:e6:08:60:03:a8:f9:b2:99:ae:76:29:3b:f6: 8f:83:2d:b3:d3:a9:ad:ff:d8:17:ad:37:bc:0b:74:58: 3a:c3:1e:be:07:54:7c:01:1b:b6:ed:54:a2:eb:c4:84: 02:a0:32:5e:1a:17:42:d9:d0:0b:db:89:fc:a2:5e:17: 00:3c:54:00:ef:00:7e:72:6c:1f:06:bd:76:98:f3:7b: 21:10:ef:65:cb:9f:2c:af:b0:ec:0c:22:6e:53:60:9a: 47:e7:7b:a2:a5:ff:55:1b:73:8a:00:dc:db:14:82:01: 77:d2:74:67:fe:7b:8a:a6:19:11:0a:01:de:d5:f2:5f: f4:39:2b:bc:3a:55:81:10:c5:81:7d:58:63:15:1b:c8: a5:06:bf:3a:e2:07:15:14:23:f6:cb:e4:98:57:fc:ec: a4:e9:7d:1d:d1:c3:89:d3:de:25:c0:b5:72:54:2c:37: 89:b6:dd:69:2b:55:01:7e:2c:fb:be:91:f4:79:0f:fd: 7f:0b:57:8c:aa:79:c6:28:5c:94:b2:5d:bc:7a:48:fd Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:46:6f:0b:2d:21:e0:e7:70:68:09:bf:b5: e8:98:5c:32:66:ea:1b:8c:1c:0b:a5:4d:28:01:c0:f6: 02:1d:00:ac:bd:99:41:81:62:01:46:7e:74:ba:c0:f0: c6:51:43:94:ca:c8:bc:62:b7:32:b3:f4:50:75:b4 Fingerprint (SHA-256): F9:8E:13:F3:EB:58:C7:70:F0:37:63:F1:54:B0:93:99:D0:46:B9:9F:13:8E:BA:C9:DE:3D:C2:D9:74:A7:04:BD Fingerprint (SHA1): 11:C7:CB:F4:8A:E3:36:7F:42:EA:1C:9B:CA:96:98:58:97:E2:1B:04 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #10033: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #10034: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 10 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #10035: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #10036: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #10037: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10038: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10039: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10040: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #10041: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10042: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10043: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10044: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #10045: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10046: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10047: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10048: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #10049: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10050: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10051: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10052: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #10053: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10054: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10055: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10056: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #10057: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10058: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10059: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10060: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160108213530Z nextupdate=20170108213530Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Jan 08 21:35:30 2016 Next Update: Sun Jan 08 21:35:30 2017 CRL Extensions: chains.sh: #10061: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108213530Z nextupdate=20170108213530Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 21:35:30 2016 Next Update: Sun Jan 08 21:35:30 2017 CRL Extensions: chains.sh: #10062: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108213531Z nextupdate=20170108213531Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 21:35:31 2016 Next Update: Sun Jan 08 21:35:31 2017 CRL Extensions: chains.sh: #10063: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160108213531Z nextupdate=20170108213532Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Jan 08 21:35:31 2016 Next Update: Sun Jan 08 21:35:32 2017 CRL Extensions: chains.sh: #10064: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108213532Z addcert 14 20160108213532Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 21:35:32 2016 Next Update: Sun Jan 08 21:35:31 2017 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Fri Jan 08 21:35:32 2016 CRL Extensions: chains.sh: #10065: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108213533Z addcert 15 20160108213533Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 21:35:33 2016 Next Update: Sun Jan 08 21:35:30 2017 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Fri Jan 08 21:35:33 2016 CRL Extensions: chains.sh: #10066: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #10067: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10068: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #10069: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #10070: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #10071: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #10072: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #10073: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #10074: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #10075: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:33:49 2016 Not After : Fri Jan 08 21:33:49 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:8e:c8:8e:76:cb:81:5f:84:c5:dd:0b:f0:bf:2c:47: b7:fb:12:19:db:8b:4b:7e:17:de:65:87:04:26:ef:13: 73:45:f4:b7:fd:19:b0:9b:66:25:f5:d3:9d:e5:12:1f: b6:be:38:0e:d8:2f:6f:7d:83:91:71:7c:21:f9:b7:87: 71:1a:91:07:8d:94:57:55:34:81:15:f2:2f:00:45:56: 4a:bf:cb:03:9f:89:7d:74:a0:48:08:e5:86:4e:f4:cf: 04:bb:15:cf:fc:48:ad:51:45:63:43:ec:4e:3d:62:24: 4a:22:6d:93:ac:bd:63:9f:47:7f:d3:b7:de:67:0b:1d: 7d:02:1d:92:05:30:30:3d:f4:b8:a7:70:c1:ce:5b:68: 2b:79:8a:4e:90:18:6e:53:c3:62:0e:50:31:64:00:51: 2d:b8:b4:23:ef:50:a0:b5:f5:82:df:38:83:26:06:b7: b9:f3:c8:2b:50:db:7f:ee:10:66:7f:2a:a6:7b:b6:ac: 25:3e:04:84:60:cf:c6:28:2c:a9:7c:09:1f:c5:f2:16: 0f:b6:f9:db:a7:ca:ec:84:70:54:22:54:5d:f2:52:f1: ae:96:14:59:3d:28:92:41:fb:ba:1f:21:e2:56:e0:5c: 29:91:90:3b:7a:fb:63:a0:d9:ee:e0:b9:7c:97:37:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bb:1f:96:2a:61:4b:7b:8c:e3:3c:b8:fa:ba:87:62:e2: 66:b8:10:71:0b:26:7c:9a:75:f5:d8:47:76:2b:fe:b7: 0d:82:e5:eb:4b:aa:d0:b2:2b:66:ea:5a:f3:17:3d:ac: 9a:8f:a9:b6:22:ed:1b:22:85:cc:be:96:80:11:76:18: bb:e9:a8:ab:62:f7:c4:ba:cf:b8:ab:b0:f1:f4:5c:14: 38:0a:f5:18:50:b2:01:55:1f:5e:34:ef:a6:38:44:33: a8:b5:bd:8b:ad:ef:ad:c6:8a:95:5e:22:dc:ce:7b:c3: 49:ac:27:db:05:ca:d9:3b:d7:f9:ce:78:00:e7:30:dd: 98:8c:8f:51:84:8c:67:59:30:bf:42:35:9b:e7:77:7a: b7:91:19:2a:b7:ed:90:b1:76:d8:8c:e0:9a:95:d4:f9: 94:5a:d1:b7:d7:d0:33:21:8c:60:e7:9e:1c:3b:c7:dc: 7a:f6:60:f6:a5:ca:06:a3:ea:46:da:f2:9c:ea:e4:57: dc:7b:5b:fb:a2:4d:7b:d4:d9:30:eb:d5:9e:49:40:66: 29:b0:2f:c5:3e:73:65:64:d2:ac:91:54:eb:ad:46:85: e8:48:28:1a:50:e5:13:ad:20:dc:8e:2c:d1:2c:30:ba: 0c:be:d8:bf:6f:88:1a:23:50:d4:34:93:8e:e6:e0:41 Fingerprint (SHA-256): 28:57:EB:E9:AA:3E:1E:90:5D:27:EC:E0:32:55:21:D2:06:6A:F1:0E:E7:B1:D7:A8:25:4A:03:E5:D3:74:F9:09 Fingerprint (SHA1): 10:C9:74:FA:79:44:37:9E:3F:C4:19:6F:5F:FE:E5:22:98:9E:85:AF Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #10076: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #10077: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:33:49 2016 Not After : Fri Jan 08 21:33:49 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:8e:c8:8e:76:cb:81:5f:84:c5:dd:0b:f0:bf:2c:47: b7:fb:12:19:db:8b:4b:7e:17:de:65:87:04:26:ef:13: 73:45:f4:b7:fd:19:b0:9b:66:25:f5:d3:9d:e5:12:1f: b6:be:38:0e:d8:2f:6f:7d:83:91:71:7c:21:f9:b7:87: 71:1a:91:07:8d:94:57:55:34:81:15:f2:2f:00:45:56: 4a:bf:cb:03:9f:89:7d:74:a0:48:08:e5:86:4e:f4:cf: 04:bb:15:cf:fc:48:ad:51:45:63:43:ec:4e:3d:62:24: 4a:22:6d:93:ac:bd:63:9f:47:7f:d3:b7:de:67:0b:1d: 7d:02:1d:92:05:30:30:3d:f4:b8:a7:70:c1:ce:5b:68: 2b:79:8a:4e:90:18:6e:53:c3:62:0e:50:31:64:00:51: 2d:b8:b4:23:ef:50:a0:b5:f5:82:df:38:83:26:06:b7: b9:f3:c8:2b:50:db:7f:ee:10:66:7f:2a:a6:7b:b6:ac: 25:3e:04:84:60:cf:c6:28:2c:a9:7c:09:1f:c5:f2:16: 0f:b6:f9:db:a7:ca:ec:84:70:54:22:54:5d:f2:52:f1: ae:96:14:59:3d:28:92:41:fb:ba:1f:21:e2:56:e0:5c: 29:91:90:3b:7a:fb:63:a0:d9:ee:e0:b9:7c:97:37:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bb:1f:96:2a:61:4b:7b:8c:e3:3c:b8:fa:ba:87:62:e2: 66:b8:10:71:0b:26:7c:9a:75:f5:d8:47:76:2b:fe:b7: 0d:82:e5:eb:4b:aa:d0:b2:2b:66:ea:5a:f3:17:3d:ac: 9a:8f:a9:b6:22:ed:1b:22:85:cc:be:96:80:11:76:18: bb:e9:a8:ab:62:f7:c4:ba:cf:b8:ab:b0:f1:f4:5c:14: 38:0a:f5:18:50:b2:01:55:1f:5e:34:ef:a6:38:44:33: a8:b5:bd:8b:ad:ef:ad:c6:8a:95:5e:22:dc:ce:7b:c3: 49:ac:27:db:05:ca:d9:3b:d7:f9:ce:78:00:e7:30:dd: 98:8c:8f:51:84:8c:67:59:30:bf:42:35:9b:e7:77:7a: b7:91:19:2a:b7:ed:90:b1:76:d8:8c:e0:9a:95:d4:f9: 94:5a:d1:b7:d7:d0:33:21:8c:60:e7:9e:1c:3b:c7:dc: 7a:f6:60:f6:a5:ca:06:a3:ea:46:da:f2:9c:ea:e4:57: dc:7b:5b:fb:a2:4d:7b:d4:d9:30:eb:d5:9e:49:40:66: 29:b0:2f:c5:3e:73:65:64:d2:ac:91:54:eb:ad:46:85: e8:48:28:1a:50:e5:13:ad:20:dc:8e:2c:d1:2c:30:ba: 0c:be:d8:bf:6f:88:1a:23:50:d4:34:93:8e:e6:e0:41 Fingerprint (SHA-256): 28:57:EB:E9:AA:3E:1E:90:5D:27:EC:E0:32:55:21:D2:06:6A:F1:0E:E7:B1:D7:A8:25:4A:03:E5:D3:74:F9:09 Fingerprint (SHA1): 10:C9:74:FA:79:44:37:9E:3F:C4:19:6F:5F:FE:E5:22:98:9E:85:AF Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #10078: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #10079: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #10080: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108154090 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #10081: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #10082: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #10083: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10084: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 108154091 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10085: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10086: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #10087: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9169/localhost-27064-CA0-108153862.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #10088: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0Root-108153836.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #10089: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10090: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #10091: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0-108153862.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #10092: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 108154092 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10093: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10094: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #10095: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9169/localhost-27064-CA0-108153862.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #10096: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0Root-108153837.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #10097: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10098: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #10099: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10100: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 108154093 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10101: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10102: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #10103: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0-108153862.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #10104: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0Root-108153838.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #10105: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10106: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #10107: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0-108153862.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #10108: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0Root-108153839.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #10109: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10110: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160108213702Z nextupdate=20170108213702Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Jan 08 21:37:02 2016 Next Update: Sun Jan 08 21:37:02 2017 CRL Extensions: chains.sh: #10111: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108213703Z nextupdate=20170108213703Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 21:37:03 2016 Next Update: Sun Jan 08 21:37:03 2017 CRL Extensions: chains.sh: #10112: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108213703Z nextupdate=20170108213703Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 21:37:03 2016 Next Update: Sun Jan 08 21:37:03 2017 CRL Extensions: chains.sh: #10113: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160108213704Z nextupdate=20170108213704Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Jan 08 21:37:04 2016 Next Update: Sun Jan 08 21:37:04 2017 CRL Extensions: chains.sh: #10114: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108213705Z addcert 20 20160108213705Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 21:37:05 2016 Next Update: Sun Jan 08 21:37:03 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Jan 08 21:37:05 2016 CRL Extensions: chains.sh: #10115: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108213706Z addcert 40 20160108213706Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 21:37:06 2016 Next Update: Sun Jan 08 21:37:03 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Jan 08 21:37:05 2016 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Fri Jan 08 21:37:06 2016 CRL Extensions: chains.sh: #10116: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #10117: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10118: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #10119: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154090 (0x6724cea) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:36:03 2016 Not After : Fri Jan 08 21:36:03 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:da:6f:6d:5e:0a:b0:71:f8:b2:6d:2c:07:31:c9:72: de:7d:23:ed:b2:69:94:38:cf:fc:4a:53:75:d5:99:3a: 45:b4:74:1a:e6:4d:2c:59:f6:da:5e:41:d0:86:c1:b8: 98:42:f9:37:1e:76:b1:d4:97:81:18:52:fe:64:79:a5: 30:f2:47:8f:cb:33:86:d1:36:1d:f7:f2:bd:35:ec:6c: 34:ab:3a:64:3f:f3:41:c8:03:65:64:9b:18:fd:7b:b5: d2:7e:e1:74:bc:83:07:36:3d:78:dc:99:a4:65:cb:cc: 95:e3:ae:5c:c3:1f:00:9c:73:e3:02:c5:21:c6:08:40: d4:bc:d0:78:ef:8c:75:e1:20:65:d1:bc:fb:e6:ff:27: c3:93:0c:e8:6d:bf:1e:14:3e:77:0b:b8:e4:ca:59:fe: 27:6f:a5:d8:35:1f:fd:dd:c6:84:70:6b:e4:29:93:e7: c9:e8:2c:92:85:a4:ee:02:5d:e5:0d:26:9d:cc:99:13: 15:a6:93:91:08:34:c8:4a:a3:95:4b:7d:71:bb:b6:c3: 8c:e9:58:3c:d2:63:9a:c9:1e:79:ea:a0:db:20:f8:83: 19:b2:27:8d:67:b7:89:bc:69:ec:df:f4:ff:4b:dd:ce: 51:cb:32:9e:4c:c3:7a:f5:6b:07:bc:9a:e7:6b:19:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:28:21:73:37:a3:c5:7c:68:f5:2f:ee:d7:fc:f0:20: 11:8e:9d:3d:f3:24:d2:74:b7:97:24:fb:96:19:22:4d: de:70:21:60:28:f0:73:2c:02:60:b4:0d:38:04:e5:3c: 2c:91:cd:0e:e2:6b:9e:b9:26:19:63:5a:88:56:2c:b1: 11:50:62:34:b6:ae:4e:d3:ff:09:ec:99:8d:fb:6c:08: 37:cb:cf:a6:60:cc:b7:35:c0:ab:c4:d6:01:f2:81:90: a0:00:66:c5:4c:51:b3:b1:82:9f:17:1f:fe:a7:09:9e: dc:71:b4:ab:a7:ee:b2:12:3b:19:0c:c3:2f:f9:44:10: 3b:26:1e:3a:08:6f:cd:b2:7d:6d:d1:9d:be:d9:02:15: f2:d5:07:62:f9:84:0e:79:1b:1f:82:8a:47:88:8e:c0: 7f:e5:bf:d5:26:0a:30:4a:24:4e:21:07:c7:fc:1b:33: 14:ec:46:54:92:8f:5d:cd:04:42:b9:45:47:91:a6:0e: a6:ee:91:31:13:8a:a9:d1:dc:87:7d:44:3f:6f:27:e7: 71:d4:f5:c2:6c:a3:4c:12:86:65:f8:2f:4d:c4:ad:d7: 36:ee:a9:cb:42:f1:e3:b6:1c:7b:bb:1d:f5:b3:c1:83: 1e:85:05:5d:f9:1c:34:a4:ef:75:88:89:6b:ea:99:a1 Fingerprint (SHA-256): C8:7D:41:AB:80:95:49:FE:71:EB:5E:63:8E:D1:DA:B3:5D:FE:F6:63:CE:92:18:0B:56:13:5F:51:1D:90:CA:54 Fingerprint (SHA1): A3:ED:D1:18:42:F6:DE:9F:75:0B:99:6B:66:26:14:0A:59:F6:26:D2 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #10120: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #10121: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154090 (0x6724cea) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 21:36:03 2016 Not After : Fri Jan 08 21:36:03 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:da:6f:6d:5e:0a:b0:71:f8:b2:6d:2c:07:31:c9:72: de:7d:23:ed:b2:69:94:38:cf:fc:4a:53:75:d5:99:3a: 45:b4:74:1a:e6:4d:2c:59:f6:da:5e:41:d0:86:c1:b8: 98:42:f9:37:1e:76:b1:d4:97:81:18:52:fe:64:79:a5: 30:f2:47:8f:cb:33:86:d1:36:1d:f7:f2:bd:35:ec:6c: 34:ab:3a:64:3f:f3:41:c8:03:65:64:9b:18:fd:7b:b5: d2:7e:e1:74:bc:83:07:36:3d:78:dc:99:a4:65:cb:cc: 95:e3:ae:5c:c3:1f:00:9c:73:e3:02:c5:21:c6:08:40: d4:bc:d0:78:ef:8c:75:e1:20:65:d1:bc:fb:e6:ff:27: c3:93:0c:e8:6d:bf:1e:14:3e:77:0b:b8:e4:ca:59:fe: 27:6f:a5:d8:35:1f:fd:dd:c6:84:70:6b:e4:29:93:e7: c9:e8:2c:92:85:a4:ee:02:5d:e5:0d:26:9d:cc:99:13: 15:a6:93:91:08:34:c8:4a:a3:95:4b:7d:71:bb:b6:c3: 8c:e9:58:3c:d2:63:9a:c9:1e:79:ea:a0:db:20:f8:83: 19:b2:27:8d:67:b7:89:bc:69:ec:df:f4:ff:4b:dd:ce: 51:cb:32:9e:4c:c3:7a:f5:6b:07:bc:9a:e7:6b:19:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:28:21:73:37:a3:c5:7c:68:f5:2f:ee:d7:fc:f0:20: 11:8e:9d:3d:f3:24:d2:74:b7:97:24:fb:96:19:22:4d: de:70:21:60:28:f0:73:2c:02:60:b4:0d:38:04:e5:3c: 2c:91:cd:0e:e2:6b:9e:b9:26:19:63:5a:88:56:2c:b1: 11:50:62:34:b6:ae:4e:d3:ff:09:ec:99:8d:fb:6c:08: 37:cb:cf:a6:60:cc:b7:35:c0:ab:c4:d6:01:f2:81:90: a0:00:66:c5:4c:51:b3:b1:82:9f:17:1f:fe:a7:09:9e: dc:71:b4:ab:a7:ee:b2:12:3b:19:0c:c3:2f:f9:44:10: 3b:26:1e:3a:08:6f:cd:b2:7d:6d:d1:9d:be:d9:02:15: f2:d5:07:62:f9:84:0e:79:1b:1f:82:8a:47:88:8e:c0: 7f:e5:bf:d5:26:0a:30:4a:24:4e:21:07:c7:fc:1b:33: 14:ec:46:54:92:8f:5d:cd:04:42:b9:45:47:91:a6:0e: a6:ee:91:31:13:8a:a9:d1:dc:87:7d:44:3f:6f:27:e7: 71:d4:f5:c2:6c:a3:4c:12:86:65:f8:2f:4d:c4:ad:d7: 36:ee:a9:cb:42:f1:e3:b6:1c:7b:bb:1d:f5:b3:c1:83: 1e:85:05:5d:f9:1c:34:a4:ef:75:88:89:6b:ea:99:a1 Fingerprint (SHA-256): C8:7D:41:AB:80:95:49:FE:71:EB:5E:63:8E:D1:DA:B3:5D:FE:F6:63:CE:92:18:0B:56:13:5F:51:1D:90:CA:54 Fingerprint (SHA1): A3:ED:D1:18:42:F6:DE:9F:75:0B:99:6B:66:26:14:0A:59:F6:26:D2 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #10122: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #10123: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #10124: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108154094 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #10125: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #10126: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #10127: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10128: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108154095 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10129: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10130: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #10131: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10132: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108154096 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10133: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10134: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #10135: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10136: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 108154097 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10137: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10138: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #10139: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -m 108154098 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #10140: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #10141: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #10142: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10143: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 108154099 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10144: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10145: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #10146: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10147: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 108154100 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #10148: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10149: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #10150: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #10151: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #10152: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154094 (0x6724cee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 21:37:15 2016 Not After : Fri Jan 08 21:37:15 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:75:7a:2b:aa:c0:dd:c1:1a:b5:a1:3d:08:79:24:99: d0:0c:bd:1f:9b:09:c2:d7:b5:bb:05:3a:5d:4e:20:5a: 24:a1:e3:9a:8e:39:ad:b1:b3:f8:09:eb:bf:55:55:bf: 28:c9:14:d3:80:d0:71:97:15:1e:6b:6d:e1:a0:55:58: f4:cf:12:d8:69:76:95:41:1d:62:47:4f:9d:fb:6d:c3: ef:13:22:fd:b7:87:a2:62:08:b2:53:d0:7b:77:14:85: 39:1f:06:f6:a2:7d:c1:5d:31:22:d0:36:ee:45:1d:ab: 8b:a1:18:b0:a7:a4:c1:d8:c7:f1:f7:cd:17:65:79:69: f0:e9:5d:a6:3e:b6:17:81:6b:8f:98:c5:51:f7:b5:46: 76:a6:8b:06:73:8b:63:63:6f:ad:60:89:2e:fa:bb:59: 1b:b3:51:d7:e1:68:4c:e4:b2:cb:99:52:db:6a:d5:a3: da:95:f7:dc:55:b0:11:2b:df:b4:26:e7:af:d1:dc:f6: 32:72:1e:a8:81:b6:24:be:c5:48:1f:8d:0f:5d:fc:1f: 96:fa:80:dd:3f:69:b6:31:73:9e:da:01:f8:2d:f4:81: 1f:ec:70:ef:87:eb:0e:70:72:ee:1c:04:9f:c8:6a:84: 91:97:7e:99:b3:f5:cf:c2:72:43:25:21:dd:9d:1f:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 90:81:d2:62:66:f7:56:4e:f9:cd:ef:39:71:c2:9d:7b: a8:96:e6:ad:7a:11:0a:0b:98:c5:9b:d4:14:b5:ee:9e: 2c:4f:8f:f6:f5:f9:13:05:23:16:5a:38:3a:78:51:ec: d7:18:8c:da:0b:8d:a7:11:74:20:9e:54:6d:7d:ad:eb: 04:62:8a:c6:d4:42:56:56:9b:7f:20:a5:2f:bd:0d:a2: 46:f5:bc:e3:01:ef:64:c2:f3:19:a6:cb:78:e5:df:f1: 91:9c:d5:9b:07:eb:82:25:19:54:3b:cb:3c:bb:42:a0: 86:36:24:ed:6f:d2:5c:a0:3c:f3:0f:a8:55:61:77:6e: 57:b9:14:4a:20:bb:3c:e7:b3:25:d0:cb:51:1f:fe:ce: 15:df:b8:5d:59:22:14:35:65:96:a4:3d:cb:8e:3f:38: aa:ba:30:80:d0:1d:16:c2:de:8b:14:ac:6e:49:42:a3: c1:2d:48:46:a4:fd:ff:c7:77:6f:e3:23:8c:cb:d6:bf: cc:b2:14:01:af:79:4e:ad:7d:c3:50:27:8a:a8:32:31: fc:c8:c9:57:a0:60:9f:94:92:17:34:d0:a1:6e:94:79: 31:59:ab:32:bb:88:be:b4:e7:80:13:7e:b2:e8:5e:85: 88:6d:a5:4b:a6:88:f2:55:2a:fe:65:84:2d:2b:2f:88 Fingerprint (SHA-256): C6:39:9A:B6:86:86:4D:EB:DC:07:1F:B6:12:34:E3:77:60:DE:C2:F4:A7:8C:50:63:9E:E0:3F:16:10:DF:06:41 Fingerprint (SHA1): A9:3A:A6:D9:55:E5:C9:FD:4F:E4:F0:A8:06:0B:83:C2:30:8B:B1:77 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #10153: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154096 (0x6724cf0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 21:37:31 2016 Not After : Fri Jan 08 21:37:31 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:ac:e1:09:6f:1e:a1:3d:b8:e7:7d:40:c7:bb:59:78: f0:e4:bb:3a:61:0d:b4:73:3d:c6:2c:e8:13:2f:3f:8b: 3e:9d:ca:cf:be:29:53:ba:dd:d3:62:49:7b:14:e0:b7: 1a:99:d9:60:f3:2c:00:5e:43:0f:ce:72:1e:bd:77:4d: 96:18:1e:07:a4:2f:ca:5e:61:9a:30:9c:55:ec:62:ab: cf:0a:2e:55:99:1b:5e:03:43:73:73:e9:1c:50:f2:f2: 90:38:98:41:d7:e4:f4:35:fc:5b:e8:68:71:e2:e8:7f: 61:c3:cd:84:2a:f8:45:aa:58:46:fc:58:4b:17:77:f5: af:b0:5f:f9:b2:fe:ef:e8:8c:1d:df:ff:6a:bf:88:4c: 99:e2:7e:67:95:1d:00:e0:40:bd:73:3f:b8:2d:b2:87: d2:e3:73:cd:4a:ef:6b:99:70:73:ca:bb:6e:cd:4b:2d: 25:3a:72:f8:c9:76:97:1a:41:9a:d0:30:74:29:6d:af: 76:65:3d:26:40:c8:61:da:2f:bc:e7:5b:39:e0:31:6a: 1d:4e:d7:4f:a3:57:4a:93:40:c2:fb:ed:99:18:f3:45: e2:9a:f0:7c:fc:df:18:75:ea:64:80:46:2a:ae:fb:4f: a8:7b:dc:ab:ff:cf:06:ee:1b:1a:1a:78:72:a4:c2:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: dc:c5:07:e3:4e:58:54:ab:c2:a6:81:a4:74:ab:01:9f: 93:18:3e:12:d7:4f:82:6b:5c:20:bf:73:e3:04:1c:5e: 91:9c:db:20:1d:61:7e:ae:fb:87:7c:3a:93:14:02:dd: 2a:0f:1d:de:5f:c9:a2:76:e6:01:89:03:e8:0b:4f:fe: 3c:8b:53:b0:b7:4b:15:a7:75:e5:e6:58:27:91:8e:9d: fe:b2:bb:d5:46:a7:98:02:52:a6:da:8f:fb:97:8d:b8: 52:19:81:16:c5:4c:22:40:86:39:65:e0:3d:7e:86:53: 2a:07:27:fd:64:af:e5:c0:5e:80:61:05:ae:3c:e2:8b: ea:5e:84:6b:7a:05:79:11:11:ac:dd:ba:a7:f4:11:da: 66:1d:ca:f7:e1:89:1c:48:94:55:22:0a:9c:8b:8a:32: 68:ea:c8:7d:84:81:37:c1:83:27:ca:fb:ab:53:06:ab: ae:0d:41:b4:c7:a0:06:bd:25:48:09:e5:9b:2d:3f:75: 13:9b:c9:cf:e2:b3:ab:93:d3:ca:9a:87:ac:b4:35:77: ab:d9:48:4e:f8:db:ec:c2:a2:54:9e:d0:f2:b0:4f:33: d0:07:f5:b5:6a:c1:b8:d5:69:97:39:1c:fd:66:f6:ed: 34:f5:82:ce:04:3e:37:c0:f1:e8:93:f1:93:bb:89:f6 Fingerprint (SHA-256): 19:37:31:16:9E:C1:07:07:63:B8:04:33:56:1B:39:53:A5:6B:4F:A0:C8:00:9F:82:CC:AC:81:40:89:AB:97:92 Fingerprint (SHA1): A0:B0:39:87:1A:95:42:DD:2D:AE:73:F3:50:57:C3:6F:4A:7A:19:16 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #10154: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154094 (0x6724cee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 21:37:15 2016 Not After : Fri Jan 08 21:37:15 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:75:7a:2b:aa:c0:dd:c1:1a:b5:a1:3d:08:79:24:99: d0:0c:bd:1f:9b:09:c2:d7:b5:bb:05:3a:5d:4e:20:5a: 24:a1:e3:9a:8e:39:ad:b1:b3:f8:09:eb:bf:55:55:bf: 28:c9:14:d3:80:d0:71:97:15:1e:6b:6d:e1:a0:55:58: f4:cf:12:d8:69:76:95:41:1d:62:47:4f:9d:fb:6d:c3: ef:13:22:fd:b7:87:a2:62:08:b2:53:d0:7b:77:14:85: 39:1f:06:f6:a2:7d:c1:5d:31:22:d0:36:ee:45:1d:ab: 8b:a1:18:b0:a7:a4:c1:d8:c7:f1:f7:cd:17:65:79:69: f0:e9:5d:a6:3e:b6:17:81:6b:8f:98:c5:51:f7:b5:46: 76:a6:8b:06:73:8b:63:63:6f:ad:60:89:2e:fa:bb:59: 1b:b3:51:d7:e1:68:4c:e4:b2:cb:99:52:db:6a:d5:a3: da:95:f7:dc:55:b0:11:2b:df:b4:26:e7:af:d1:dc:f6: 32:72:1e:a8:81:b6:24:be:c5:48:1f:8d:0f:5d:fc:1f: 96:fa:80:dd:3f:69:b6:31:73:9e:da:01:f8:2d:f4:81: 1f:ec:70:ef:87:eb:0e:70:72:ee:1c:04:9f:c8:6a:84: 91:97:7e:99:b3:f5:cf:c2:72:43:25:21:dd:9d:1f:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 90:81:d2:62:66:f7:56:4e:f9:cd:ef:39:71:c2:9d:7b: a8:96:e6:ad:7a:11:0a:0b:98:c5:9b:d4:14:b5:ee:9e: 2c:4f:8f:f6:f5:f9:13:05:23:16:5a:38:3a:78:51:ec: d7:18:8c:da:0b:8d:a7:11:74:20:9e:54:6d:7d:ad:eb: 04:62:8a:c6:d4:42:56:56:9b:7f:20:a5:2f:bd:0d:a2: 46:f5:bc:e3:01:ef:64:c2:f3:19:a6:cb:78:e5:df:f1: 91:9c:d5:9b:07:eb:82:25:19:54:3b:cb:3c:bb:42:a0: 86:36:24:ed:6f:d2:5c:a0:3c:f3:0f:a8:55:61:77:6e: 57:b9:14:4a:20:bb:3c:e7:b3:25:d0:cb:51:1f:fe:ce: 15:df:b8:5d:59:22:14:35:65:96:a4:3d:cb:8e:3f:38: aa:ba:30:80:d0:1d:16:c2:de:8b:14:ac:6e:49:42:a3: c1:2d:48:46:a4:fd:ff:c7:77:6f:e3:23:8c:cb:d6:bf: cc:b2:14:01:af:79:4e:ad:7d:c3:50:27:8a:a8:32:31: fc:c8:c9:57:a0:60:9f:94:92:17:34:d0:a1:6e:94:79: 31:59:ab:32:bb:88:be:b4:e7:80:13:7e:b2:e8:5e:85: 88:6d:a5:4b:a6:88:f2:55:2a:fe:65:84:2d:2b:2f:88 Fingerprint (SHA-256): C6:39:9A:B6:86:86:4D:EB:DC:07:1F:B6:12:34:E3:77:60:DE:C2:F4:A7:8C:50:63:9E:E0:3F:16:10:DF:06:41 Fingerprint (SHA1): A9:3A:A6:D9:55:E5:C9:FD:4F:E4:F0:A8:06:0B:83:C2:30:8B:B1:77 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #10155: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #10156: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154094 (0x6724cee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 21:37:15 2016 Not After : Fri Jan 08 21:37:15 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:75:7a:2b:aa:c0:dd:c1:1a:b5:a1:3d:08:79:24:99: d0:0c:bd:1f:9b:09:c2:d7:b5:bb:05:3a:5d:4e:20:5a: 24:a1:e3:9a:8e:39:ad:b1:b3:f8:09:eb:bf:55:55:bf: 28:c9:14:d3:80:d0:71:97:15:1e:6b:6d:e1:a0:55:58: f4:cf:12:d8:69:76:95:41:1d:62:47:4f:9d:fb:6d:c3: ef:13:22:fd:b7:87:a2:62:08:b2:53:d0:7b:77:14:85: 39:1f:06:f6:a2:7d:c1:5d:31:22:d0:36:ee:45:1d:ab: 8b:a1:18:b0:a7:a4:c1:d8:c7:f1:f7:cd:17:65:79:69: f0:e9:5d:a6:3e:b6:17:81:6b:8f:98:c5:51:f7:b5:46: 76:a6:8b:06:73:8b:63:63:6f:ad:60:89:2e:fa:bb:59: 1b:b3:51:d7:e1:68:4c:e4:b2:cb:99:52:db:6a:d5:a3: da:95:f7:dc:55:b0:11:2b:df:b4:26:e7:af:d1:dc:f6: 32:72:1e:a8:81:b6:24:be:c5:48:1f:8d:0f:5d:fc:1f: 96:fa:80:dd:3f:69:b6:31:73:9e:da:01:f8:2d:f4:81: 1f:ec:70:ef:87:eb:0e:70:72:ee:1c:04:9f:c8:6a:84: 91:97:7e:99:b3:f5:cf:c2:72:43:25:21:dd:9d:1f:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 90:81:d2:62:66:f7:56:4e:f9:cd:ef:39:71:c2:9d:7b: a8:96:e6:ad:7a:11:0a:0b:98:c5:9b:d4:14:b5:ee:9e: 2c:4f:8f:f6:f5:f9:13:05:23:16:5a:38:3a:78:51:ec: d7:18:8c:da:0b:8d:a7:11:74:20:9e:54:6d:7d:ad:eb: 04:62:8a:c6:d4:42:56:56:9b:7f:20:a5:2f:bd:0d:a2: 46:f5:bc:e3:01:ef:64:c2:f3:19:a6:cb:78:e5:df:f1: 91:9c:d5:9b:07:eb:82:25:19:54:3b:cb:3c:bb:42:a0: 86:36:24:ed:6f:d2:5c:a0:3c:f3:0f:a8:55:61:77:6e: 57:b9:14:4a:20:bb:3c:e7:b3:25:d0:cb:51:1f:fe:ce: 15:df:b8:5d:59:22:14:35:65:96:a4:3d:cb:8e:3f:38: aa:ba:30:80:d0:1d:16:c2:de:8b:14:ac:6e:49:42:a3: c1:2d:48:46:a4:fd:ff:c7:77:6f:e3:23:8c:cb:d6:bf: cc:b2:14:01:af:79:4e:ad:7d:c3:50:27:8a:a8:32:31: fc:c8:c9:57:a0:60:9f:94:92:17:34:d0:a1:6e:94:79: 31:59:ab:32:bb:88:be:b4:e7:80:13:7e:b2:e8:5e:85: 88:6d:a5:4b:a6:88:f2:55:2a:fe:65:84:2d:2b:2f:88 Fingerprint (SHA-256): C6:39:9A:B6:86:86:4D:EB:DC:07:1F:B6:12:34:E3:77:60:DE:C2:F4:A7:8C:50:63:9E:E0:3F:16:10:DF:06:41 Fingerprint (SHA1): A9:3A:A6:D9:55:E5:C9:FD:4F:E4:F0:A8:06:0B:83:C2:30:8B:B1:77 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #10157: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154096 (0x6724cf0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 21:37:31 2016 Not After : Fri Jan 08 21:37:31 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:ac:e1:09:6f:1e:a1:3d:b8:e7:7d:40:c7:bb:59:78: f0:e4:bb:3a:61:0d:b4:73:3d:c6:2c:e8:13:2f:3f:8b: 3e:9d:ca:cf:be:29:53:ba:dd:d3:62:49:7b:14:e0:b7: 1a:99:d9:60:f3:2c:00:5e:43:0f:ce:72:1e:bd:77:4d: 96:18:1e:07:a4:2f:ca:5e:61:9a:30:9c:55:ec:62:ab: cf:0a:2e:55:99:1b:5e:03:43:73:73:e9:1c:50:f2:f2: 90:38:98:41:d7:e4:f4:35:fc:5b:e8:68:71:e2:e8:7f: 61:c3:cd:84:2a:f8:45:aa:58:46:fc:58:4b:17:77:f5: af:b0:5f:f9:b2:fe:ef:e8:8c:1d:df:ff:6a:bf:88:4c: 99:e2:7e:67:95:1d:00:e0:40:bd:73:3f:b8:2d:b2:87: d2:e3:73:cd:4a:ef:6b:99:70:73:ca:bb:6e:cd:4b:2d: 25:3a:72:f8:c9:76:97:1a:41:9a:d0:30:74:29:6d:af: 76:65:3d:26:40:c8:61:da:2f:bc:e7:5b:39:e0:31:6a: 1d:4e:d7:4f:a3:57:4a:93:40:c2:fb:ed:99:18:f3:45: e2:9a:f0:7c:fc:df:18:75:ea:64:80:46:2a:ae:fb:4f: a8:7b:dc:ab:ff:cf:06:ee:1b:1a:1a:78:72:a4:c2:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: dc:c5:07:e3:4e:58:54:ab:c2:a6:81:a4:74:ab:01:9f: 93:18:3e:12:d7:4f:82:6b:5c:20:bf:73:e3:04:1c:5e: 91:9c:db:20:1d:61:7e:ae:fb:87:7c:3a:93:14:02:dd: 2a:0f:1d:de:5f:c9:a2:76:e6:01:89:03:e8:0b:4f:fe: 3c:8b:53:b0:b7:4b:15:a7:75:e5:e6:58:27:91:8e:9d: fe:b2:bb:d5:46:a7:98:02:52:a6:da:8f:fb:97:8d:b8: 52:19:81:16:c5:4c:22:40:86:39:65:e0:3d:7e:86:53: 2a:07:27:fd:64:af:e5:c0:5e:80:61:05:ae:3c:e2:8b: ea:5e:84:6b:7a:05:79:11:11:ac:dd:ba:a7:f4:11:da: 66:1d:ca:f7:e1:89:1c:48:94:55:22:0a:9c:8b:8a:32: 68:ea:c8:7d:84:81:37:c1:83:27:ca:fb:ab:53:06:ab: ae:0d:41:b4:c7:a0:06:bd:25:48:09:e5:9b:2d:3f:75: 13:9b:c9:cf:e2:b3:ab:93:d3:ca:9a:87:ac:b4:35:77: ab:d9:48:4e:f8:db:ec:c2:a2:54:9e:d0:f2:b0:4f:33: d0:07:f5:b5:6a:c1:b8:d5:69:97:39:1c:fd:66:f6:ed: 34:f5:82:ce:04:3e:37:c0:f1:e8:93:f1:93:bb:89:f6 Fingerprint (SHA-256): 19:37:31:16:9E:C1:07:07:63:B8:04:33:56:1B:39:53:A5:6B:4F:A0:C8:00:9F:82:CC:AC:81:40:89:AB:97:92 Fingerprint (SHA1): A0:B0:39:87:1A:95:42:DD:2D:AE:73:F3:50:57:C3:6F:4A:7A:19:16 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #10158: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #10159: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #10160: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #10161: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154094 (0x6724cee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 21:37:15 2016 Not After : Fri Jan 08 21:37:15 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:75:7a:2b:aa:c0:dd:c1:1a:b5:a1:3d:08:79:24:99: d0:0c:bd:1f:9b:09:c2:d7:b5:bb:05:3a:5d:4e:20:5a: 24:a1:e3:9a:8e:39:ad:b1:b3:f8:09:eb:bf:55:55:bf: 28:c9:14:d3:80:d0:71:97:15:1e:6b:6d:e1:a0:55:58: f4:cf:12:d8:69:76:95:41:1d:62:47:4f:9d:fb:6d:c3: ef:13:22:fd:b7:87:a2:62:08:b2:53:d0:7b:77:14:85: 39:1f:06:f6:a2:7d:c1:5d:31:22:d0:36:ee:45:1d:ab: 8b:a1:18:b0:a7:a4:c1:d8:c7:f1:f7:cd:17:65:79:69: f0:e9:5d:a6:3e:b6:17:81:6b:8f:98:c5:51:f7:b5:46: 76:a6:8b:06:73:8b:63:63:6f:ad:60:89:2e:fa:bb:59: 1b:b3:51:d7:e1:68:4c:e4:b2:cb:99:52:db:6a:d5:a3: da:95:f7:dc:55:b0:11:2b:df:b4:26:e7:af:d1:dc:f6: 32:72:1e:a8:81:b6:24:be:c5:48:1f:8d:0f:5d:fc:1f: 96:fa:80:dd:3f:69:b6:31:73:9e:da:01:f8:2d:f4:81: 1f:ec:70:ef:87:eb:0e:70:72:ee:1c:04:9f:c8:6a:84: 91:97:7e:99:b3:f5:cf:c2:72:43:25:21:dd:9d:1f:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 90:81:d2:62:66:f7:56:4e:f9:cd:ef:39:71:c2:9d:7b: a8:96:e6:ad:7a:11:0a:0b:98:c5:9b:d4:14:b5:ee:9e: 2c:4f:8f:f6:f5:f9:13:05:23:16:5a:38:3a:78:51:ec: d7:18:8c:da:0b:8d:a7:11:74:20:9e:54:6d:7d:ad:eb: 04:62:8a:c6:d4:42:56:56:9b:7f:20:a5:2f:bd:0d:a2: 46:f5:bc:e3:01:ef:64:c2:f3:19:a6:cb:78:e5:df:f1: 91:9c:d5:9b:07:eb:82:25:19:54:3b:cb:3c:bb:42:a0: 86:36:24:ed:6f:d2:5c:a0:3c:f3:0f:a8:55:61:77:6e: 57:b9:14:4a:20:bb:3c:e7:b3:25:d0:cb:51:1f:fe:ce: 15:df:b8:5d:59:22:14:35:65:96:a4:3d:cb:8e:3f:38: aa:ba:30:80:d0:1d:16:c2:de:8b:14:ac:6e:49:42:a3: c1:2d:48:46:a4:fd:ff:c7:77:6f:e3:23:8c:cb:d6:bf: cc:b2:14:01:af:79:4e:ad:7d:c3:50:27:8a:a8:32:31: fc:c8:c9:57:a0:60:9f:94:92:17:34:d0:a1:6e:94:79: 31:59:ab:32:bb:88:be:b4:e7:80:13:7e:b2:e8:5e:85: 88:6d:a5:4b:a6:88:f2:55:2a:fe:65:84:2d:2b:2f:88 Fingerprint (SHA-256): C6:39:9A:B6:86:86:4D:EB:DC:07:1F:B6:12:34:E3:77:60:DE:C2:F4:A7:8C:50:63:9E:E0:3F:16:10:DF:06:41 Fingerprint (SHA1): A9:3A:A6:D9:55:E5:C9:FD:4F:E4:F0:A8:06:0B:83:C2:30:8B:B1:77 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #10162: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154098 (0x6724cf2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Jan 08 21:38:13 2016 Not After : Fri Jan 08 21:38:13 2066 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:9a:54:2f:e9:86:97:51:76:71:f1:d0:1d:96:41:0f: 6a:0d:9c:fa:06:f6:76:47:87:ac:ae:dc:8d:23:d2:6e: 5a:fc:87:d7:f4:48:7c:02:59:02:fc:5a:e9:ec:67:b8: 53:b3:04:0b:c6:3f:6c:a7:27:46:42:d2:68:fb:01:3a: e3:84:ab:e6:35:54:f4:27:37:37:32:7f:ca:b9:31:56: 9e:40:37:a4:de:ee:47:d6:74:f5:7e:00:70:9b:9e:45: de:d8:17:7f:d7:9b:34:d7:d3:e9:db:f7:4c:21:6d:6f: 19:fd:1a:ce:b0:fe:fb:a7:bd:ae:4e:00:2c:30:5c:44: d1:31:8f:de:85:db:1c:88:db:58:58:37:53:50:86:75: 42:60:53:fa:57:f7:0a:c2:8b:6b:1b:7b:58:a5:eb:6e: d0:27:c0:69:98:9d:eb:33:de:80:26:ad:4c:0e:c1:3d: a1:02:78:de:6a:dc:29:cb:30:64:3b:cd:ee:bd:50:c6: c2:11:e1:57:79:27:93:62:1d:7b:d9:fd:92:b7:a9:69: f0:9c:fa:88:bc:ac:bb:89:24:e7:d1:f6:13:31:70:7a: cf:be:85:c1:90:90:fb:f0:5f:bd:43:4a:4b:1e:01:52: a9:10:87:20:7d:aa:51:da:35:6a:45:da:97:dd:48:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:17:14:af:ae:c0:55:60:fb:06:fb:15:7e:87:6f:f0: 1d:ed:5b:db:33:2c:e1:63:c1:52:fc:fb:37:5f:97:9d: b9:dd:6c:a3:be:0b:5c:94:39:f2:2b:5a:69:65:6b:97: d4:15:0e:d7:c4:5b:e8:4a:7c:c3:d4:b8:cf:4d:82:ca: d8:59:f1:8a:b1:88:ee:78:0a:f7:8c:63:a0:58:18:2d: f1:bf:d2:3c:96:34:35:b1:2d:0e:0a:f2:f3:97:e8:a0: a9:25:bb:c7:38:53:c4:be:f1:00:2f:c0:fe:2b:28:b4: ab:f1:ce:a1:90:f5:18:28:7e:a7:c1:15:23:da:10:97: cd:87:3f:3c:47:c2:ae:43:cc:90:e6:16:bd:b8:f8:59: 2c:03:98:2c:5d:6a:ca:80:2f:e5:18:fa:b3:23:3e:a3: 83:92:9b:11:74:6c:57:c8:d4:89:7d:db:a3:ed:c2:09: de:15:7d:01:28:3e:19:e5:a2:35:b5:f1:c6:26:d9:97: 57:64:02:d2:7e:d5:fd:16:0d:89:b0:ce:6d:6a:11:67: c9:13:7e:d7:ab:61:7b:66:b2:fd:1f:67:a5:02:51:97: b3:dd:33:fd:e6:fa:b4:8c:6d:32:65:57:11:4d:ef:b5: ee:2b:ba:85:19:03:10:48:db:a0:ef:f8:df:cf:03:f2 Fingerprint (SHA-256): 4E:EA:B4:6E:4F:A4:D6:F0:21:F8:6B:CB:09:59:E3:07:3A:4B:DD:AD:25:68:A6:E7:CA:19:87:9C:66:2C:EB:CC Fingerprint (SHA1): 2A:1E:9B:17:FE:5D:D9:65:2D:33:94:F3:2B:45:81:B9:B0:8F:5E:E5 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #10163: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154094 (0x6724cee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 21:37:15 2016 Not After : Fri Jan 08 21:37:15 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:75:7a:2b:aa:c0:dd:c1:1a:b5:a1:3d:08:79:24:99: d0:0c:bd:1f:9b:09:c2:d7:b5:bb:05:3a:5d:4e:20:5a: 24:a1:e3:9a:8e:39:ad:b1:b3:f8:09:eb:bf:55:55:bf: 28:c9:14:d3:80:d0:71:97:15:1e:6b:6d:e1:a0:55:58: f4:cf:12:d8:69:76:95:41:1d:62:47:4f:9d:fb:6d:c3: ef:13:22:fd:b7:87:a2:62:08:b2:53:d0:7b:77:14:85: 39:1f:06:f6:a2:7d:c1:5d:31:22:d0:36:ee:45:1d:ab: 8b:a1:18:b0:a7:a4:c1:d8:c7:f1:f7:cd:17:65:79:69: f0:e9:5d:a6:3e:b6:17:81:6b:8f:98:c5:51:f7:b5:46: 76:a6:8b:06:73:8b:63:63:6f:ad:60:89:2e:fa:bb:59: 1b:b3:51:d7:e1:68:4c:e4:b2:cb:99:52:db:6a:d5:a3: da:95:f7:dc:55:b0:11:2b:df:b4:26:e7:af:d1:dc:f6: 32:72:1e:a8:81:b6:24:be:c5:48:1f:8d:0f:5d:fc:1f: 96:fa:80:dd:3f:69:b6:31:73:9e:da:01:f8:2d:f4:81: 1f:ec:70:ef:87:eb:0e:70:72:ee:1c:04:9f:c8:6a:84: 91:97:7e:99:b3:f5:cf:c2:72:43:25:21:dd:9d:1f:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 90:81:d2:62:66:f7:56:4e:f9:cd:ef:39:71:c2:9d:7b: a8:96:e6:ad:7a:11:0a:0b:98:c5:9b:d4:14:b5:ee:9e: 2c:4f:8f:f6:f5:f9:13:05:23:16:5a:38:3a:78:51:ec: d7:18:8c:da:0b:8d:a7:11:74:20:9e:54:6d:7d:ad:eb: 04:62:8a:c6:d4:42:56:56:9b:7f:20:a5:2f:bd:0d:a2: 46:f5:bc:e3:01:ef:64:c2:f3:19:a6:cb:78:e5:df:f1: 91:9c:d5:9b:07:eb:82:25:19:54:3b:cb:3c:bb:42:a0: 86:36:24:ed:6f:d2:5c:a0:3c:f3:0f:a8:55:61:77:6e: 57:b9:14:4a:20:bb:3c:e7:b3:25:d0:cb:51:1f:fe:ce: 15:df:b8:5d:59:22:14:35:65:96:a4:3d:cb:8e:3f:38: aa:ba:30:80:d0:1d:16:c2:de:8b:14:ac:6e:49:42:a3: c1:2d:48:46:a4:fd:ff:c7:77:6f:e3:23:8c:cb:d6:bf: cc:b2:14:01:af:79:4e:ad:7d:c3:50:27:8a:a8:32:31: fc:c8:c9:57:a0:60:9f:94:92:17:34:d0:a1:6e:94:79: 31:59:ab:32:bb:88:be:b4:e7:80:13:7e:b2:e8:5e:85: 88:6d:a5:4b:a6:88:f2:55:2a:fe:65:84:2d:2b:2f:88 Fingerprint (SHA-256): C6:39:9A:B6:86:86:4D:EB:DC:07:1F:B6:12:34:E3:77:60:DE:C2:F4:A7:8C:50:63:9E:E0:3F:16:10:DF:06:41 Fingerprint (SHA1): A9:3A:A6:D9:55:E5:C9:FD:4F:E4:F0:A8:06:0B:83:C2:30:8B:B1:77 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #10164: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #10165: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #10166: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #10167: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #10168: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #10169: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108154099 (0x6724cf3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Jan 08 21:38:20 2016 Not After : Fri Jan 08 21:38:20 2021 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:48:53:68:11:20:4e:9f:dc:21:f1:ee:f1:2e:0e:16: b3:06:f3:88:2e:3a:90:33:9a:88:62:db:7f:99:6a:d5: a1:62:6a:67:5d:0d:72:75:d1:02:aa:65:d7:d7:f7:87: e8:e5:ea:d7:5c:66:95:98:12:c3:e2:b6:94:25:6f:51: b6:60:3b:c8:f6:71:14:65:8c:6c:0b:b1:f5:f0:73:9d: 09:54:d0:d8:c4:ae:e9:70:d0:90:e9:43:7d:49:c5:26: 3d:19:64:2d:8a:51:3f:f5:65:79:7b:67:49:e7:25:9f: 6a:8d:32:c6:90:06:cf:9a:79:34:eb:95:b4:61:82:75: f4:1e:c7:54:8a:15:7e:30:a7:7b:99:49:ae:5e:14:95: 59:2b:47:e9:9d:db:7e:db:b1:56:8e:a6:bd:ff:7d:02: 24:1c:38:62:86:ec:62:79:f3:97:cc:b1:ca:a4:1f:5a: b2:50:60:6c:7f:6e:cd:a8:64:fa:3e:ad:4b:90:3b:47: be:f5:58:c9:4b:c9:de:d2:b3:5f:65:8a:37:07:de:8d: 56:c0:51:6f:54:d4:eb:38:39:27:05:ee:8f:42:40:3d: 4b:11:84:55:aa:9d:1d:e5:ac:b1:72:c6:19:7a:2a:ef: 97:49:9c:97:fa:dd:6a:a1:f2:fd:78:37:b7:05:f8:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:a3:d7:37:a8:bd:ed:c5:25:86:3b:14:71:69:45:b1: 8d:30:fb:58:6e:d2:6d:e8:83:10:09:2c:3d:38:23:09: ca:6f:48:30:b2:bc:5f:63:cd:3a:dc:a8:a9:ae:0b:ef: fc:f0:14:e2:c4:f4:c7:01:07:d1:c0:7b:e1:da:12:8b: 96:e9:0e:74:1f:bd:39:19:65:62:f6:7e:1b:04:61:a6: 1d:c5:60:e8:34:0e:a2:47:b6:63:8a:08:25:1c:a1:8f: ec:36:3f:80:6e:34:81:4d:f4:42:e5:5b:e0:26:f0:2c: ad:4a:9e:51:a9:d2:50:68:6e:c2:6a:55:b6:f5:e9:34: 53:6f:47:a0:85:f5:fe:37:aa:72:47:a1:45:21:e7:98: 8d:57:ef:56:d2:20:a9:58:66:57:73:bd:b0:e9:7c:e3: 1c:c7:57:e7:4f:e9:e5:99:4c:9c:b5:6f:7e:49:83:c9: 02:39:3c:47:a8:a3:86:b9:65:72:dd:5a:75:f9:06:b1: 3a:ed:72:29:36:a1:a2:56:d2:ec:38:25:72:fb:ac:f0: 16:c1:8f:8a:e3:09:7e:a8:ea:77:c2:87:24:17:ac:df: 3a:23:34:f9:06:27:fe:4b:93:07:37:fa:10:39:5e:fc: 9f:a3:f9:31:8c:33:5d:e5:3c:ed:aa:3c:e0:60:dd:e8 Fingerprint (SHA-256): B8:1E:51:EE:0F:CF:9D:A4:8E:62:6C:12:FA:7B:04:75:DC:46:65:CE:68:96:DD:45:A9:53:27:EF:F2:2A:0B:4D Fingerprint (SHA1): A7:3C:34:71:03:3F:A0:B4:70:09:2B:DA:C0:A9:D8:DD:A9:7E:E1:F6 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #10170: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #10171: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #10172: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #10173: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #10174: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #10175: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #10176: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #10177: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #10178: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #10179: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #10180: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #10181: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #10182: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #10183: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #10184: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #10185: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #10186: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #10187: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #10188: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #10189: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #10190: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #10191: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #10192: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #10193: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED trying to kill httpserv with PID 12209 at Fri Jan 8 16:38:54 EST 2016 kill -USR1 12209 httpserv: normal termination httpserv -b -p 9169 2>/dev/null; httpserv with PID 12209 killed at Fri Jan 8 16:38:55 EST 2016 TIMESTAMP chains END: Fri Jan 8 16:38:55 EST 2016 chains.sh: Testing with upgraded library =============================== cp: cannot stat '/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/cert.done': No such file or directory Running tests for dbupgrade TIMESTAMP dbupgrade BEGIN: Fri Jan 8 16:38:55 EST 2016 dbupgrade.sh: DB upgrade tests =============================== Reset databases to their initial values: certutil: could not find certificate named "objsigner": SEC_ERROR_BAD_DATABASE: security library: bad database. Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu dbupgrade.sh: Legacy to shared Library update =============================== alicedir upgrading db alicedir Generating key. This may take a few moments... dbupgrade.sh: #10194: Upgrading alicedir - PASSED bobdir upgrading db bobdir Generating key. This may take a few moments... dbupgrade.sh: #10195: Upgrading bobdir - PASSED CA upgrading db CA Generating key. This may take a few moments... dbupgrade.sh: #10196: Upgrading CA - PASSED cert_extensions upgrading db cert_extensions Generating key. This may take a few moments... dbupgrade.sh: #10197: Upgrading cert_extensions - PASSED client upgrading db client Generating key. This may take a few moments... dbupgrade.sh: #10198: Upgrading client - PASSED clientCA upgrading db clientCA Generating key. This may take a few moments... dbupgrade.sh: #10199: Upgrading clientCA - PASSED dave upgrading db dave Generating key. This may take a few moments... dbupgrade.sh: #10200: Upgrading dave - PASSED eccurves upgrading db eccurves Generating key. This may take a few moments... dbupgrade.sh: #10201: Upgrading eccurves - PASSED eve upgrading db eve Generating key. This may take a few moments... dbupgrade.sh: #10202: Upgrading eve - PASSED ext_client upgrading db ext_client Generating key. This may take a few moments... dbupgrade.sh: #10203: Upgrading ext_client - PASSED ext_server upgrading db ext_server Generating key. This may take a few moments... dbupgrade.sh: #10204: Upgrading ext_server - PASSED SDR upgrading db SDR Generating key. This may take a few moments... dbupgrade.sh: #10205: Upgrading SDR - PASSED server upgrading db server Generating key. This may take a few moments... dbupgrade.sh: #10206: Upgrading server - PASSED serverCA upgrading db serverCA Generating key. This may take a few moments... dbupgrade.sh: #10207: Upgrading serverCA - PASSED ssl_gtests skipping db ssl_gtests dbupgrade.sh: #10208: No directory ssl_gtests - PASSED stapling upgrading db stapling Generating key. This may take a few moments... dbupgrade.sh: #10209: Upgrading stapling - PASSED tools/copydir skipping db tools/copydir dbupgrade.sh: #10210: No directory tools/copydir - PASSED upgrading db fips Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. dbupgrade.sh: #10211: Upgrading fips - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu TIMESTAMP dbupgrade END: Fri Jan 8 16:39:36 EST 2016 Running tests for tools TIMESTAMP tools BEGIN: Fri Jan 8 16:39:36 EST 2016 tools.sh: Tools Tests with ECC =============================== tools.sh: Exporting Alice's email cert & key - default ciphers tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10212: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 72:70:3e:e7:d5:a8:14:09:83:e1:6b:a4:34:8a:92:7e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10213: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10214: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10215: Exporting Alice's email EC cert & key (pk12util -o) - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10216: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 95:10:bd:fd:4e:ce:ac:66:8d:01:21:34:f5:d0:09:d7 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Fri Jan 08 16:08:49 2016 Not After : Fri Jan 08 16:08:49 2066 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:00:33:ca:31:22:f4:d8:f3:2b:30:08:a1:25:5e:3a: 18:7c:1d:c9:69:df:75:c9:0d:71:89:9d:69:14:d2:a1: 71:12:e3:7b:b0:ac:48:21:c6:2a:a8:29:1e:bc:39:db: 65:5e:d1:c6:96:a0:d5:c7:ca:0b:77:7b:d4:2f:d0:27: 12:c7:f6:00:a1:e5:86:fd:1b:de:e8:68:cc:ef:d8:f3: 10:11:7b:58:70:c1:f1:24:8a:de:c4:30:1d:66:95:41: 92:1d:a7:36:5d:0e:80:29:00:ea:1d:dc:07:5b:d6:0d: 74:bc:ec:9b:a6:7c:b0:48:1f:f2:f5:5d:0f:6c:8b:fd: 84:81:cd:9e:1d Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:88:02:42:01:5c:61:a4:70:42:78:d0:87:f5:1b: 83:bb:f5:d2:14:4d:f5:61:02:ae:6d:d1:e1:54:17:b8: c0:26:d4:b7:5a:64:ad:18:c2:d6:82:08:62:7f:87:61: 92:69:fd:1e:ff:5e:66:ae:42:06:23:d1:a6:3f:37:5d: f8:84:aa:ec:8a:8f:16:02:42:01:aa:66:00:3d:e1:e2: cc:bf:68:78:eb:ba:57:0f:ba:7c:16:4a:0c:a5:55:1a: 75:ff:c7:06:31:b4:fe:36:ed:f9:83:bc:0d:80:f5:b2: 01:d4:79:13:43:de:ad:86:93:e7:6e:63:04:b0:30:91: 46:b5:18:c3:c0:c3:02:25:a5:23:2e Fingerprint (SHA-256): 38:A0:E0:69:B5:86:9F:1D:18:9B:72:F6:11:41:CE:5A:E1:B8:5A:E3:96:97:5B:A8:0E:35:FE:E6:88:1B:43:8A Fingerprint (SHA1): 55:8A:95:FF:7E:05:37:B0:2A:2E:E8:27:3E:90:23:E3:E8:5C:70:35 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Fri Jan 08 16:12:03 2016 Not After : Fri Jan 08 16:12:03 2021 Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:3a:39:13:5d:9b:d6:b2:b2:28:32:e5:b6:74:34:d9: e2:b4:18:fb:c7:e9:cb:ef:24:bd:b8:27:f6:60:0e:24: 02:1d:84:b3:03:2e:c2:fe:5f:02:95:5d:70:29:bf:1c: 36:cc:a3:d8:76:59:f4:9d:b3:90:e8:f6:05:90:82:17: 6f:02:4b:97:db:31:f2:4b:71:ee:84:6e:8d:33:ba:19: b8:b3:10:09:b0:3b:c9:ea:63:f2:1c:4e:3c:19:cd:c6: 6b Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:88:02:42:00:ca:bd:de:bb:50:c3:69:7b:a6:f7: 1f:8a:1c:f5:1f:4c:b7:38:23:28:d6:8b:7c:21:b3:07: e9:84:01:3e:17:a9:e6:fd:62:8d:53:20:04:a5:44:af: ef:15:82:e7:57:91:27:7a:c0:52:44:47:5d:e0:0f:f3: 1c:d8:f1:0b:ae:46:c7:02:42:01:62:d9:a8:1f:b3:c0: b6:61:91:f4:68:e7:57:63:60:5c:c5:34:62:2b:14:19: ee:78:b9:54:c7:1d:20:cc:d3:79:ac:88:fa:e7:8e:18: 69:ac:61:85:16:49:b8:b1:5e:ae:18:28:d1:3b:52:fb: 8a:90:7a:67:b4:2a:34:7c:e0:de:2b Fingerprint (SHA-256): E3:93:0D:FE:24:E2:7C:3F:F7:58:FB:3C:83:BA:01:BE:39:60:32:5F:BF:4C:D3:FC:30:C1:4F:AF:80:F8:4C:31 Fingerprint (SHA1): 0D:1A:20:64:03:3F:AB:DA:5E:EA:B2:86:F2:25:0E:E3:89:99:59:6C Friendly Name: Alice-ec tools.sh: #10217: Listing Alice's pk12 EC file (pk12util -l) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10218: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 7d:16:cd:c8:30:0d:e8:c1:8f:7e:c2:3c:23:25:6c:e0 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10219: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10220: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10221: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: ae:10:46:c3:6b:5a:fe:61:55:66:bb:a5:40:eb:3c:53 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10222: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10223: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10224: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 23:75:88:49:aa:31:9f:d7:00:dc:30:1c:5f:26:30:78 Iteration Count: 2000 (0x7d0) tools.sh: #10225: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10226: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10227: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fe:4b:ce:a8:bd:85:e2:f9:d5:fe:66:c8:04:81:b2:a5 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10228: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10229: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10230: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ca:69:2a:00:cf:3d:f9:2a:df:53:2b:b3:f0:5b:33:9f Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10231: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10232: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10233: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0e:79:1e:b6:62:be:85:6a:94:e5:1a:d3:c4:24:50:7c Iteration Count: 2000 (0x7d0) tools.sh: #10234: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10235: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10236: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 05:32:d4:ce:c6:2c:14:09:bc:b1:e2:85:08:28:68:8e Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:0d:f5:e0:a5:35:e7:84:23:60:5f:ff:20:83:15: 25:87 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10237: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10238: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10239: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 61:47:0a:a4:3b:a4:fb:cc:2b:89:1b:a8:c8:9c:70:f5 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:53:5d:65:c3:94:18:8a:81:de:a2:c0:88:86:74: 42:f6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10240: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10241: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10242: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 15:1b:ce:72:22:fd:30:dc:4e:a0:7c:a4:24:13:aa:48 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:94:56:c6:48:eb:90:56:a1:bc:f8:69:77:15:62: 42:1d tools.sh: #10243: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10244: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10245: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 5d:d6:94:3a:a3:2a:0a:ea:40:39:39:34:b7:f4:fd:78 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:0c:ad:9e:07:18:d2:8b:04:7c:3d:3b:1a:da:6d: 61:69 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10246: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10247: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10248: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3e:d1:a3:59:6b:b8:23:05:f9:2e:72:ca:f2:e6:bd:f8 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:22:dd:3a:ba:7f:a4:df:41:ec:8b:10:2e:5a:6b: 07:7d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10249: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10250: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10251: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 20:b8:40:88:d1:5b:23:78:fd:44:93:68:0e:da:21:18 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:fa:4d:34:ca:cd:0a:8b:06:f0:31:d0:1f:a3:36: 90:f3 tools.sh: #10252: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10253: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10254: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 04:f7:ee:e3:3f:1e:72:f2:8f:35:aa:25:3b:84:c2:cb Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:2a:3d:a1:97:dc:0e:f8:b1:72:75:24:33:82:9f: a6:2c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10255: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10256: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10257: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 67:49:f0:c0:5c:54:64:35:1d:11:66:a6:dc:66:0f:29 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:84:88:c3:00:da:6b:53:e2:46:a5:a1:f4:43:d3: 84:af Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10258: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10259: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10260: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 96:97:13:df:6f:b5:df:7d:c6:7b:34:95:35:bf:ec:70 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:11:fc:a6:34:a6:dc:8b:d8:5e:46:ec:4a:b0:f4: 7b:03 tools.sh: #10261: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10262: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10263: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 59:6f:57:2a:6a:88:2b:2e:6e:c8:78:37:07:32:dc:e1 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:74:9e:cf:88:03:78:4b:40:27:66:96:ad:78:67: 48:dc Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10264: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10265: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10266: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: da:3a:a4:92:4d:10:51:5f:82:bf:c0:13:82:16:a6:ee Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:4b:ad:ad:93:99:36:7b:8d:07:32:a5:65:d5:73: 4e:05 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10267: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10268: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10269: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7c:79:5f:7a:83:ef:e8:e4:29:f5:22:0f:f6:fd:08:d2 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:91:66:06:17:2d:49:d7:8f:2f:04:49:fb:35:22: 44:1a tools.sh: #10270: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10271: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10272: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c5:ab:d6:c4:56:79:8d:f1:1d:9e:4c:09:6b:23:cf:9e Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:27:a6:55:85:fc:fc:6f:51:f3:be:17:50:61:73: 22:03 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10273: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10274: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10275: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c9:6b:3a:4b:26:db:75:62:10:b9:80:2f:84:2d:2a:89 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:8f:c9:eb:26:06:1c:69:28:58:62:fa:a4:7c:6f: 94:96 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10276: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10277: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10278: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9d:52:e1:3c:79:d9:b5:3b:6c:3f:1c:b6:68:86:39:62 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:81:2c:f4:f3:ef:0d:9e:bf:0b:4d:64:6f:19:ea: e0:66 tools.sh: #10279: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10280: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10281: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9a:f1:50:25:1e:8b:e3:78:2f:b8:01:ed:2f:7a:0e:f5 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:36:a5:fb:c9:40:dc:09:46:d2:0c:4a:54:0c:ac: 5f:0e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10282: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10283: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10284: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 34:31:33:e5:4c:c0:db:9e:6a:40:e7:31:e6:48:d3:c5 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:ea:a8:33:34:f3:30:b4:82:88:b0:55:56:0e:fb: 41:da Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10285: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10286: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10287: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 11:1e:35:c1:d9:6a:95:4b:07:54:3b:4e:db:9f:31:0d Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:91:c1:f5:50:60:26:40:84:d5:e0:3a:d5:39:17: e4:5a tools.sh: #10288: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10289: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10290: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: ae:fe:55:67:1e:e0:d1:a6:18:99:37:44:d0:1e:04:77 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10291: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10292: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10293: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: a2:85:56:a1:b2:f5:f4:c7:e5:ed:15:a2:af:e1:26:dc Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10294: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10295: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10296: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 48:5f:6f:8d:51:7e:9d:17:02:23:03:82:98:74:1b:5f Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10297: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10298: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10299: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: fb:b5:01:51:98:6e:54:ad:90:9a:12:fa:67:c5:e0:aa Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10300: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10301: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10302: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 26:55:99:84:71:7c:0c:90:36:80:24:8b:2f:b2:3b:73 Iteration Count: 2000 (0x7d0) tools.sh: #10303: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10304: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10305: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 32:11:81:31:a0:43:79:7a:fe:8c:a6:bb:d3:40:ec:53 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10306: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10307: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10308: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 5f:ad:56:d1:a9:04:c5:b1:89:68:98:f6:57:08:9f:e4 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10309: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10310: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10311: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: b3:a3:75:28:2a:fc:a8:6f:fa:9f:fd:02:ba:2e:97:c7 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10312: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10313: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10314: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 9d:78:16:c7:be:85:3f:1e:d3:b2:b1:a4:6b:b3:50:4e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10315: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10316: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10317: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: b7:a9:2f:ae:fe:e9:37:85:98:45:fe:ef:1e:28:a2:b7 Iteration Count: 2000 (0x7d0) tools.sh: #10318: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10319: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10320: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 3c:2b:c5:53:ef:26:6b:1b:2d:88:0f:0f:df:03:3f:01 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10321: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10322: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10323: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: d5:e3:bf:2b:53:8b:b5:96:4a:ef:53:cd:9d:45:1b:88 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10324: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10325: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10326: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 51:c1:6d:4f:f7:c7:c9:37:40:3d:5b:6f:94:91:7e:2a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10327: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10328: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10329: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: c7:d5:1d:11:28:41:00:cb:be:87:04:be:a3:8b:c1:13 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10330: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10331: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10332: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 63:40:6a:ea:a0:43:07:7a:7f:5f:44:a8:4c:3e:3e:d3 Iteration Count: 2000 (0x7d0) tools.sh: #10333: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10334: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10335: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: bb:55:d0:48:04:08:97:fd:a4:b8:69:80:26:d4:9b:d8 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10336: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10337: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10338: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: de:df:51:13:09:3a:1a:c3:43:4f:df:a6:7e:0c:5c:22 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10339: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10340: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10341: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 11:b7:39:00:82:97:d6:f3:8f:18:fb:50:b7:37:f9:b4 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10342: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10343: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10344: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c1:98:ba:9a:f9:71:c4:c7:08:ab:36:40:62:09:be:0a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10345: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10346: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:null] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10347: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 63:d2:ee:59:c4:fb:72:aa:65:e8:8c:c7:cd:dc:c8:ba Iteration Count: 2000 (0x7d0) tools.sh: #10348: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10349: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10350: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 89:55:d6:a1:11:44:6c:d4:b7:21:ed:7d:62:82:a4:1e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10351: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10352: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10353: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 40:88:c2:55:2c:82:6a:cf:51:ee:ca:5b:ab:7f:09:74 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10354: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10355: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10356: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3d:80:90:fd:b2:78:47:21:45:8a:fb:63:05:72:85:62 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10357: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10358: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10359: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9e:ae:a6:52:37:02:b3:b0:a4:60:57:d4:ab:53:01:02 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10360: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10361: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10362: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3a:12:27:de:47:3c:ba:71:82:f3:a4:9e:69:e0:33:34 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10363: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10364: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10365: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 59:24:44:c1:25:ec:aa:3e:89:94:d2:8d:93:8b:7a:01 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10366: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10367: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10368: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c9:04:0f:bc:d1:eb:0b:ff:10:05:e6:c8:2a:f6:cc:cc Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10369: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10370: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10371: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f5:3e:5c:fe:62:9c:43:5b:e4:18:3c:56:ff:12:56:f4 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10372: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10373: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10374: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 46:8d:d2:9d:ca:5b:44:52:0a:8c:fc:dc:d7:82:d2:27 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10375: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10376: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10377: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5a:27:90:85:6e:6b:4e:52:3b:15:99:21:f6:68:92:e7 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:07:51 2016 Not After : Fri Jan 08 16:07:51 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:21:a8:10:ea:19:01:04:5c:84:2b:d7:77:fd:88:9e: b0:7c:83:aa:a4:40:4e:5a:62:3f:62:d1:70:45:46:68: b8:12:31:da:72:7d:cd:07:b9:42:6b:a3:f5:ad:20:91: 77:94:83:81:c0:67:52:8f:e5:5a:5e:51:a4:88:33:aa: 66:2e:8e:2d:da:a9:ca:e8:e7:cb:9b:00:15:05:7d:d0: 22:e7:10:68:89:1e:ce:1e:fa:d4:13:f6:08:91:74:d5: a5:04:3e:f9:1b:a8:a6:45:13:7c:fa:2a:6b:8e:dc:ad: 9e:23:92:7d:91:3c:d1:31:62:9b:64:a3:32:28:44:76: e2:ee:39:6d:84:f2:bb:f6:f3:da:e8:b5:88:2a:a7:af: 6c:fc:d7:9c:7c:ae:5a:50:6e:b3:db:62:f0:ee:54:15: 08:99:d8:af:c7:8e:0c:f5:41:ec:34:2d:c9:3c:af:71: c8:43:b9:f1:9a:91:65:93:10:77:93:ed:af:f9:30:d0: 03:f5:19:7a:d2:51:2b:9e:e1:1d:dd:20:6e:b5:64:83: 2f:5d:05:0a:7e:83:d2:96:a0:2d:f2:2b:73:ce:72:eb: 9e:30:79:82:a4:29:7e:af:72:21:73:bd:c6:42:0c:f1: dc:ff:5d:06:a9:7a:ef:1a:1f:41:b2:42:57:27:96:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:8c:70:4f:32:68:cd:7c:a0:5e:ff:39:6c:50:fa:55: 15:40:86:7b:8b:c1:14:04:10:56:a1:9a:8c:82:cf:43: 84:97:25:10:76:a1:fc:15:5b:04:c5:87:b5:48:fc:fd: 1e:54:88:2c:bd:93:03:ba:3d:68:51:f4:2a:d0:f8:c3: 6e:ab:cd:f8:59:a4:7e:8d:58:ab:b1:fb:34:c9:48:91: 6c:4c:2f:b8:f1:25:b7:4b:41:0e:82:46:49:56:fe:1d: 54:8d:4b:83:2b:3f:2a:e5:5e:d2:34:63:fe:c4:a3:87: b5:eb:37:bf:b4:60:6d:37:4d:ca:c6:1b:36:a4:fd:d2: 28:87:2c:60:3f:f0:3f:88:60:68:fb:ac:1c:c0:fb:07: 1c:c0:e2:ac:a6:9f:47:c8:e7:48:75:f3:69:cd:16:04: 59:dc:bc:b0:d7:20:b8:55:35:eb:3e:92:13:cc:48:27: 39:8a:ac:b4:c5:81:d2:9d:00:41:1c:b6:5d:17:5e:57: 97:29:6b:47:85:e0:cf:76:ef:e4:9a:c9:f8:f8:df:3f: 38:92:66:1b:a2:1b:b5:f3:4c:ba:fc:05:a2:71:57:ec: ea:b7:26:51:db:d9:a7:2e:a1:0b:5f:df:fd:c1:de:c7: a9:d3:19:1e:30:f6:1e:0d:8c:75:d5:94:b6:18:b0:b2 Fingerprint (SHA-256): F9:4C:1C:AF:E6:FA:C2:3A:57:40:D3:12:9F:CA:7A:D6:67:39:08:83:BF:34:52:77:48:5E:C9:29:CE:4E:FA:5B Fingerprint (SHA1): 14:FE:A7:5F:20:72:89:51:9A:F1:06:ED:C4:A1:09:8E:F4:C6:71:30 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:11:58 2016 Not After : Fri Jan 08 16:11:58 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:87:e0:22:e2:0a:39:76:bc:1b:e8:de:d4:38:0d:54: e0:76:77:e3:7c:fe:b0:01:f0:a3:8d:ca:78:22:5c:39: 25:eb:0c:10:4a:0e:6d:7d:56:61:98:81:5e:c1:b3:33: be:46:2c:02:53:24:33:82:46:94:81:69:bb:5d:95:83: 67:bd:e4:7e:8e:5f:43:03:d3:a5:b1:a0:9b:85:13:24: ad:7d:68:79:89:87:5e:fc:78:5f:c2:8d:6e:da:c5:ac: 78:09:30:a0:d9:71:e0:02:6f:1d:64:3f:94:ac:63:10: ad:60:0a:87:a3:71:db:e6:50:1b:77:f2:99:32:61:41: d2:7e:d3:63:89:48:05:42:83:97:c0:e8:4a:7c:6b:3f: e0:7b:07:91:51:e9:0a:4a:59:f8:7b:2f:fd:b7:c8:6f: 5a:93:10:22:3a:33:73:75:d6:34:5a:c3:cb:4d:1d:f3: 72:34:5c:fc:5a:73:68:0f:0f:7d:02:21:2c:47:3c:3d: 17:09:bb:bb:49:28:ab:26:fd:93:ec:e0:41:bb:6c:9e: cd:ec:66:9f:3b:9f:76:ec:a1:aa:43:0f:0c:3b:6d:d4: 34:84:9a:de:6a:35:50:1a:c9:e6:a9:e0:4c:6e:7d:2b: f2:27:b3:4d:18:8c:cb:e0:50:b1:73:c8:78:52:2e:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:61:19:0b:90:52:48:d6:96:9a:fa:ae:49:7f:ac:0a: 63:bb:c4:a7:0f:a8:03:11:57:d5:56:fe:3b:ba:87:34: 57:fa:5f:db:b1:de:35:90:8a:0c:40:74:3f:75:b2:70: 0c:4d:c5:3d:36:51:d9:20:88:d3:f5:d2:5e:69:55:c6: 33:d6:7e:69:f4:0d:39:e7:0a:a6:9e:0b:0d:7c:d8:da: fd:ae:1d:32:82:d1:0d:ce:46:ac:ab:2e:d3:04:5a:97: b8:10:9d:d9:a3:e0:68:99:6b:91:8e:23:ba:74:10:ee: a3:bb:22:58:6c:71:bf:1a:36:65:a9:9c:03:3b:2b:83: 8e:8b:05:03:4f:68:3d:34:ed:b7:c5:85:6d:b8:d3:b3: 72:7b:47:aa:4f:36:49:89:fe:f6:9d:fe:b6:43:cb:52: ec:69:78:17:44:f6:3d:f9:be:42:37:ba:70:f5:6a:c8: 1b:37:04:ac:86:c3:bc:2b:b9:0e:28:c6:63:d9:2b:12: bd:6e:ed:d9:61:0b:30:c6:a3:0c:da:c8:57:fb:d8:33: b7:70:9f:d3:24:96:f8:67:e8:00:1e:92:94:7f:97:5b: 7e:72:6b:27:33:fd:f4:18:e8:86:b3:88:cf:fc:c6:b8: 5a:47:4a:d4:c4:79:5d:91:96:98:1f:b6:8a:18:8a:5a Fingerprint (SHA-256): 8C:96:E5:3D:80:27:2B:6A:92:29:6B:76:E7:06:C2:F5:F2:F9:BC:8E:D9:4C:5F:A1:9F:20:33:AD:8A:78:6C:96 Fingerprint (SHA1): 6B:ED:58:D9:F8:0B:D6:0E:11:C2:41:FC:D3:68:4A:07:C4:23:35:CB Friendly Name: Alice tools.sh: #10378: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10379: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c null pk12util: Algorithm: "null": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #10380: Exporting with [null:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10381: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #10382: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 32%) tree "../tools/html" signed successfully tools.sh: #10383: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #10384: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #10385: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html --> signjs.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #10386: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #10387: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #10388: Show who signed xpi (signtool -w) - PASSED TIMESTAMP tools END: Fri Jan 8 16:41:36 EST 2016 Running tests for fips TIMESTAMP fips BEGIN: Fri Jan 8 16:41:36 EST 2016 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. fips.sh: #10389: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #10390: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa ab2a0abf9f9504c1fd8c065c82a6a7604f1f248d FIPS_PUB_140_Test_Certificate fips.sh: #10391: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #10392: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #10393: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #10394: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #10395: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #10396: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #10397: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #10398: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #10399: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #10400: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #10401: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa ab2a0abf9f9504c1fd8c065c82a6a7604f1f248d FIPS_PUB_140_Test_Certificate fips.sh: #10402: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #10403: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #10404: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #10405: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #10406: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa ab2a0abf9f9504c1fd8c065c82a6a7604f1f248d FIPS_PUB_140_Test_Certificate fips.sh: #10407: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 106. **** **** ALL TESTS PASSED **** fips.sh: #10408: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 104. **** **** ALL TESTS PASSED **** fips.sh: #10409: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle mkdir: cannot create directory '/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle': File exists cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle/libsoftokn3.so -o -8 -b 5 Changing byte 0x00032fe4 (208868): from 21 (33) to 01 (1) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/fips/mangle dbtest -r -d ../fips fips.sh: #10410: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Fri Jan 8 16:43:12 EST 2016 Running tests for crmf TIMESTAMP crmf BEGIN: Fri Jan 8 16:43:12 EST 2016 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #10411: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #10412: CMMF test . - PASSED TIMESTAMP crmf END: Fri Jan 8 16:43:13 EST 2016 Running tests for smime TIMESTAMP smime BEGIN: Fri Jan 8 16:43:13 EST 2016 smime.sh: S/MIME Tests with ECC =============================== smime.sh: Signing Detached Message {SHA1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #10413: Create Detached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #10414: Verifying Alice's Detached Signature (SHA1) . - PASSED smime.sh: Signing Attached Message (SHA1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #10415: Create Attached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1 smime.sh: #10416: Decode Alice's Attached Signature (SHA1) . - PASSED diff alice.txt alice.data.SHA1 smime.sh: #10417: Compare Attached Signed Data and Original (SHA1) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA1} ------------------ cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1 smime.sh: #10418: Create Detached Signature Alice (ECDSA w/ SHA1) . - PASSED cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #10419: Verifying Alice's Detached Signature (ECDSA w/ SHA1) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA1) ------------------ cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1 smime.sh: #10420: Create Attached Signature Alice (ECDSA w/ SHA1) . - PASSED cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.SHA1 smime.sh: #10421: Decode Alice's Attached Signature (ECDSA w/ SHA1) . - PASSED diff alice.txt alice-ec.data.SHA1 smime.sh: #10422: Compare Attached Signed Data and Original (ECDSA w/ SHA1) . - PASSED smime.sh: Signing Detached Message {SHA256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #10423: Create Detached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #10424: Verifying Alice's Detached Signature (SHA256) . - PASSED smime.sh: Signing Attached Message (SHA256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #10425: Create Attached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256 smime.sh: #10426: Decode Alice's Attached Signature (SHA256) . - PASSED diff alice.txt alice.data.SHA256 smime.sh: #10427: Compare Attached Signed Data and Original (SHA256) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA256} ------------------ cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256 smime.sh: #10428: Create Detached Signature Alice (ECDSA w/ SHA256) . - PASSED cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #10429: Verifying Alice's Detached Signature (ECDSA w/ SHA256) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA256) ------------------ cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256 smime.sh: #10430: Create Attached Signature Alice (ECDSA w/ SHA256) . - PASSED cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.SHA256 smime.sh: #10431: Decode Alice's Attached Signature (ECDSA w/ SHA256) . - PASSED diff alice.txt alice-ec.data.SHA256 smime.sh: #10432: Compare Attached Signed Data and Original (ECDSA w/ SHA256) . - PASSED smime.sh: Signing Detached Message {SHA384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #10433: Create Detached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #10434: Verifying Alice's Detached Signature (SHA384) . - PASSED smime.sh: Signing Attached Message (SHA384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #10435: Create Attached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384 smime.sh: #10436: Decode Alice's Attached Signature (SHA384) . - PASSED diff alice.txt alice.data.SHA384 smime.sh: #10437: Compare Attached Signed Data and Original (SHA384) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA384} ------------------ cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384 smime.sh: #10438: Create Detached Signature Alice (ECDSA w/ SHA384) . - PASSED cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #10439: Verifying Alice's Detached Signature (ECDSA w/ SHA384) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA384) ------------------ cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384 smime.sh: #10440: Create Attached Signature Alice (ECDSA w/ SHA384) . - PASSED cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.SHA384 smime.sh: #10441: Decode Alice's Attached Signature (ECDSA w/ SHA384) . - PASSED diff alice.txt alice-ec.data.SHA384 smime.sh: #10442: Compare Attached Signed Data and Original (ECDSA w/ SHA384) . - PASSED smime.sh: Signing Detached Message {SHA512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #10443: Create Detached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #10444: Verifying Alice's Detached Signature (SHA512) . - PASSED smime.sh: Signing Attached Message (SHA512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #10445: Create Attached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512 smime.sh: #10446: Decode Alice's Attached Signature (SHA512) . - PASSED diff alice.txt alice.data.SHA512 smime.sh: #10447: Compare Attached Signed Data and Original (SHA512) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA512} ------------------ cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512 smime.sh: #10448: Create Detached Signature Alice (ECDSA w/ SHA512) . - PASSED cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #10449: Verifying Alice's Detached Signature (ECDSA w/ SHA512) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA512) ------------------ cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512 smime.sh: #10450: Create Attached Signature Alice (ECDSA w/ SHA512) . - PASSED cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.SHA512 smime.sh: #10451: Decode Alice's Attached Signature (ECDSA w/ SHA512) . - PASSED diff alice.txt alice-ec.data.SHA512 smime.sh: #10452: Compare Attached Signed Data and Original (ECDSA w/ SHA512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #10453: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #10454: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #10455: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@bogus.com,dave@bogus.com smime.sh: #10456: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@bogus.net smime.sh: #10457: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #10458: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #10459: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #10460: Decrypt with a Multiple Email cert . - PASSED smime.sh: #10461: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #10462: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #10463: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \ -d ../alicedir > co.der smime.sh: #10464: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #10465: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@bogus.com" > alice.enc smime.sh: #10466: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #10467: Decode Encrypted-Data . - PASSED smime.sh: #10468: Compare Decoded and Original Data . - PASSED smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #10469: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice.env -o alice_p7.data smime.sh: #10470: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #10471: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #10472: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #10473: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Fri Jan 8 16:43:46 EST 2016 Running tests for ssl TIMESTAMP ssl BEGIN: Fri Jan 8 16:43:46 EST 2016 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 16:43:46 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:43:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:43:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10474: Waiting for Server - FAILED kill -0 30967 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 30967 found at Fri Jan 8 16:43:52 EST 2016 selfserv_9159 with PID 30967 started at Fri Jan 8 16:43:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10475: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 30967 at Fri Jan 8 16:43:53 EST 2016 kill -USR1 30967 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 30967 killed at Fri Jan 8 16:43:53 EST 2016 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 16:43:53 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:43:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:43:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10476: Waiting for Server - FAILED kill -0 31035 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31035 found at Fri Jan 8 16:43:59 EST 2016 selfserv_9159 with PID 31035 started at Fri Jan 8 16:43:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10477: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 31035 at Fri Jan 8 16:44:00 EST 2016 kill -USR1 31035 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 31035 killed at Fri Jan 8 16:44:00 EST 2016 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 16:44:00 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:44:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:44:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10478: Waiting for Server - FAILED kill -0 31104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31104 found at Fri Jan 8 16:44:06 EST 2016 selfserv_9159 with PID 31104 started at Fri Jan 8 16:44:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10479: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 31104 at Fri Jan 8 16:44:07 EST 2016 kill -USR1 31104 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 31104 killed at Fri Jan 8 16:44:07 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:44:07 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:44:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:44:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10480: Waiting for Server - FAILED kill -0 31184 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31184 found at Fri Jan 8 16:44:13 EST 2016 selfserv_9159 with PID 31184 started at Fri Jan 8 16:44:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10481: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 31184 at Fri Jan 8 16:44:14 EST 2016 kill -USR1 31184 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 31184 killed at Fri Jan 8 16:44:14 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:44:14 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:44:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:44:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10482: Waiting for Server - FAILED kill -0 31252 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31252 found at Fri Jan 8 16:44:20 EST 2016 selfserv_9159 with PID 31252 started at Fri Jan 8 16:44:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10483: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 31252 at Fri Jan 8 16:44:20 EST 2016 kill -USR1 31252 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 31252 killed at Fri Jan 8 16:44:21 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:44:21 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:44:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:44:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10484: Waiting for Server - FAILED kill -0 31323 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31323 found at Fri Jan 8 16:44:27 EST 2016 selfserv_9159 with PID 31323 started at Fri Jan 8 16:44:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10485: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 31323 at Fri Jan 8 16:44:27 EST 2016 kill -USR1 31323 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 31323 killed at Fri Jan 8 16:44:28 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:44:28 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:44:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:44:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10486: Waiting for Server - FAILED kill -0 31403 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31403 found at Fri Jan 8 16:44:34 EST 2016 selfserv_9159 with PID 31403 started at Fri Jan 8 16:44:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10487: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 31403 at Fri Jan 8 16:44:34 EST 2016 kill -USR1 31403 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 31403 killed at Fri Jan 8 16:44:35 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:44:35 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:44:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:44:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10488: Waiting for Server - FAILED kill -0 31471 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31471 found at Fri Jan 8 16:44:41 EST 2016 selfserv_9159 with PID 31471 started at Fri Jan 8 16:44:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10489: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 31471 at Fri Jan 8 16:44:41 EST 2016 kill -USR1 31471 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 31471 killed at Fri Jan 8 16:44:42 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:44:42 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:44:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:44:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10490: Waiting for Server - FAILED kill -0 31540 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31540 found at Fri Jan 8 16:44:48 EST 2016 selfserv_9159 with PID 31540 started at Fri Jan 8 16:44:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10491: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 31540 at Fri Jan 8 16:44:48 EST 2016 kill -USR1 31540 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 31540 killed at Fri Jan 8 16:44:48 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 16:44:49 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:44:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:44:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10492: Waiting for Server - FAILED kill -0 31620 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31620 found at Fri Jan 8 16:44:55 EST 2016 selfserv_9159 with PID 31620 started at Fri Jan 8 16:44:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10493: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 31620 at Fri Jan 8 16:44:55 EST 2016 kill -USR1 31620 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 31620 killed at Fri Jan 8 16:44:55 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 16:44:56 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:44:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:45:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10494: Waiting for Server - FAILED kill -0 31690 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31690 found at Fri Jan 8 16:45:01 EST 2016 selfserv_9159 with PID 31690 started at Fri Jan 8 16:45:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10495: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 31690 at Fri Jan 8 16:45:02 EST 2016 kill -USR1 31690 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 31690 killed at Fri Jan 8 16:45:02 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 16:45:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:45:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:45:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10496: Waiting for Server - FAILED kill -0 31759 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31759 found at Fri Jan 8 16:45:08 EST 2016 selfserv_9159 with PID 31759 started at Fri Jan 8 16:45:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10497: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 31759 at Fri Jan 8 16:45:09 EST 2016 kill -USR1 31759 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 31759 killed at Fri Jan 8 16:45:09 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:45:09 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:45:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:45:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10498: Waiting for Server - FAILED kill -0 31839 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31839 found at Fri Jan 8 16:45:15 EST 2016 selfserv_9159 with PID 31839 started at Fri Jan 8 16:45:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10499: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 31839 at Fri Jan 8 16:45:16 EST 2016 kill -USR1 31839 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 31839 killed at Fri Jan 8 16:45:16 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:45:16 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:45:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:45:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10500: Waiting for Server - FAILED kill -0 31907 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31907 found at Fri Jan 8 16:45:22 EST 2016 selfserv_9159 with PID 31907 started at Fri Jan 8 16:45:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10501: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 31907 at Fri Jan 8 16:45:23 EST 2016 kill -USR1 31907 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 31907 killed at Fri Jan 8 16:45:23 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:45:23 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:45:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:45:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10502: Waiting for Server - FAILED kill -0 31976 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31976 found at Fri Jan 8 16:45:29 EST 2016 selfserv_9159 with PID 31976 started at Fri Jan 8 16:45:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10503: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 31976 at Fri Jan 8 16:45:30 EST 2016 kill -USR1 31976 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 31976 killed at Fri Jan 8 16:45:30 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:45:30 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:45:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:45:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10504: Waiting for Server - FAILED kill -0 32056 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32056 found at Fri Jan 8 16:45:36 EST 2016 selfserv_9159 with PID 32056 started at Fri Jan 8 16:45:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10505: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 32056 at Fri Jan 8 16:45:36 EST 2016 kill -USR1 32056 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 32056 killed at Fri Jan 8 16:45:37 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:45:37 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:45:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:45:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10506: Waiting for Server - FAILED kill -0 32124 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32124 found at Fri Jan 8 16:45:43 EST 2016 selfserv_9159 with PID 32124 started at Fri Jan 8 16:45:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10507: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 32124 at Fri Jan 8 16:45:43 EST 2016 kill -USR1 32124 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 32124 killed at Fri Jan 8 16:45:44 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:45:44 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:45:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:45:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10508: Waiting for Server - FAILED kill -0 32193 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32193 found at Fri Jan 8 16:45:50 EST 2016 selfserv_9159 with PID 32193 started at Fri Jan 8 16:45:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10509: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 32193 at Fri Jan 8 16:45:50 EST 2016 kill -USR1 32193 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 32193 killed at Fri Jan 8 16:45:51 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 16:45:51 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:45:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:45:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10510: Waiting for Server - FAILED kill -0 32273 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32273 found at Fri Jan 8 16:45:57 EST 2016 selfserv_9159 with PID 32273 started at Fri Jan 8 16:45:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10511: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 32273 at Fri Jan 8 16:45:57 EST 2016 kill -USR1 32273 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 32273 killed at Fri Jan 8 16:45:58 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 16:45:58 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:45:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:46:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10512: Waiting for Server - FAILED kill -0 32341 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32341 found at Fri Jan 8 16:46:04 EST 2016 selfserv_9159 with PID 32341 started at Fri Jan 8 16:46:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10513: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 32341 at Fri Jan 8 16:46:04 EST 2016 kill -USR1 32341 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 32341 killed at Fri Jan 8 16:46:04 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 16:46:05 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:46:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:46:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10514: Waiting for Server - FAILED kill -0 32410 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32410 found at Fri Jan 8 16:46:10 EST 2016 selfserv_9159 with PID 32410 started at Fri Jan 8 16:46:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10515: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 32410 at Fri Jan 8 16:46:11 EST 2016 kill -USR1 32410 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 32410 killed at Fri Jan 8 16:46:11 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:46:12 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:46:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:46:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10516: Waiting for Server - FAILED kill -0 32490 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32490 found at Fri Jan 8 16:46:17 EST 2016 selfserv_9159 with PID 32490 started at Fri Jan 8 16:46:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10517: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 32490 at Fri Jan 8 16:46:18 EST 2016 kill -USR1 32490 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 32490 killed at Fri Jan 8 16:46:18 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:46:18 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:46:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:46:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10518: Waiting for Server - FAILED kill -0 32558 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32558 found at Fri Jan 8 16:46:24 EST 2016 selfserv_9159 with PID 32558 started at Fri Jan 8 16:46:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10519: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 32558 at Fri Jan 8 16:46:25 EST 2016 kill -USR1 32558 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 32558 killed at Fri Jan 8 16:46:25 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:46:25 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:46:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:46:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10520: Waiting for Server - FAILED kill -0 32627 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32627 found at Fri Jan 8 16:46:31 EST 2016 selfserv_9159 with PID 32627 started at Fri Jan 8 16:46:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10521: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 32627 at Fri Jan 8 16:46:32 EST 2016 kill -USR1 32627 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 32627 killed at Fri Jan 8 16:46:32 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:46:32 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:46:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:46:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10522: Waiting for Server - FAILED kill -0 32707 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32707 found at Fri Jan 8 16:46:38 EST 2016 selfserv_9159 with PID 32707 started at Fri Jan 8 16:46:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10523: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 32707 at Fri Jan 8 16:46:39 EST 2016 kill -USR1 32707 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 32707 killed at Fri Jan 8 16:46:39 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:46:39 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:46:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:46:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10524: Waiting for Server - FAILED kill -0 307 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 307 found at Fri Jan 8 16:46:45 EST 2016 selfserv_9159 with PID 307 started at Fri Jan 8 16:46:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10525: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 307 at Fri Jan 8 16:46:46 EST 2016 kill -USR1 307 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 307 killed at Fri Jan 8 16:46:46 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:46:46 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:46:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:46:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10526: Waiting for Server - FAILED kill -0 376 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 376 found at Fri Jan 8 16:46:52 EST 2016 selfserv_9159 with PID 376 started at Fri Jan 8 16:46:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10527: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 376 at Fri Jan 8 16:46:52 EST 2016 kill -USR1 376 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 376 killed at Fri Jan 8 16:46:53 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 16:46:53 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:46:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:46:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10528: Waiting for Server - FAILED kill -0 461 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 461 found at Fri Jan 8 16:46:59 EST 2016 selfserv_9159 with PID 461 started at Fri Jan 8 16:46:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10529: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 461 at Fri Jan 8 16:46:59 EST 2016 kill -USR1 461 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 461 killed at Fri Jan 8 16:47:00 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 16:47:00 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:47:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:47:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10530: Waiting for Server - FAILED kill -0 548 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 548 found at Fri Jan 8 16:47:06 EST 2016 selfserv_9159 with PID 548 started at Fri Jan 8 16:47:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10531: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 548 at Fri Jan 8 16:47:06 EST 2016 kill -USR1 548 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 548 killed at Fri Jan 8 16:47:07 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 16:47:07 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:47:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:47:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10532: Waiting for Server - FAILED kill -0 622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 622 found at Fri Jan 8 16:47:13 EST 2016 selfserv_9159 with PID 622 started at Fri Jan 8 16:47:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10533: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 622 at Fri Jan 8 16:47:13 EST 2016 kill -USR1 622 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 622 killed at Fri Jan 8 16:47:14 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:47:14 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:47:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:47:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10534: Waiting for Server - FAILED kill -0 702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 702 found at Fri Jan 8 16:47:20 EST 2016 selfserv_9159 with PID 702 started at Fri Jan 8 16:47:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10535: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 702 at Fri Jan 8 16:47:20 EST 2016 kill -USR1 702 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 702 killed at Fri Jan 8 16:47:21 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:47:21 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:47:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:47:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10536: Waiting for Server - FAILED kill -0 771 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 771 found at Fri Jan 8 16:47:27 EST 2016 selfserv_9159 with PID 771 started at Fri Jan 8 16:47:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10537: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 771 at Fri Jan 8 16:47:27 EST 2016 kill -USR1 771 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 771 killed at Fri Jan 8 16:47:27 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:47:28 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:47:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:47:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10538: Waiting for Server - FAILED kill -0 839 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 839 found at Fri Jan 8 16:47:33 EST 2016 selfserv_9159 with PID 839 started at Fri Jan 8 16:47:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10539: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 839 at Fri Jan 8 16:47:34 EST 2016 kill -USR1 839 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 839 killed at Fri Jan 8 16:47:34 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:47:34 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:47:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:47:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10540: Waiting for Server - FAILED kill -0 919 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 919 found at Fri Jan 8 16:47:40 EST 2016 selfserv_9159 with PID 919 started at Fri Jan 8 16:47:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10541: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 919 at Fri Jan 8 16:47:41 EST 2016 kill -USR1 919 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 919 killed at Fri Jan 8 16:47:41 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:47:41 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:47:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:47:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10542: Waiting for Server - FAILED kill -0 988 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 988 found at Fri Jan 8 16:47:47 EST 2016 selfserv_9159 with PID 988 started at Fri Jan 8 16:47:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10543: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 988 at Fri Jan 8 16:47:48 EST 2016 kill -USR1 988 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 988 killed at Fri Jan 8 16:47:48 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:47:48 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:47:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:47:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10544: Waiting for Server - FAILED kill -0 1056 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1056 found at Fri Jan 8 16:47:54 EST 2016 selfserv_9159 with PID 1056 started at Fri Jan 8 16:47:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10545: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 1056 at Fri Jan 8 16:47:55 EST 2016 kill -USR1 1056 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1056 killed at Fri Jan 8 16:47:55 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 16:47:55 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:47:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:48:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10546: Waiting for Server - FAILED kill -0 1136 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1136 found at Fri Jan 8 16:48:01 EST 2016 selfserv_9159 with PID 1136 started at Fri Jan 8 16:48:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10547: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 1136 at Fri Jan 8 16:48:02 EST 2016 kill -USR1 1136 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1136 killed at Fri Jan 8 16:48:02 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 16:48:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:48:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:48:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10548: Waiting for Server - FAILED kill -0 1205 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1205 found at Fri Jan 8 16:48:08 EST 2016 selfserv_9159 with PID 1205 started at Fri Jan 8 16:48:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10549: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 1205 at Fri Jan 8 16:48:09 EST 2016 kill -USR1 1205 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1205 killed at Fri Jan 8 16:48:09 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 16:48:09 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:48:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:48:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10550: Waiting for Server - FAILED kill -0 1273 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1273 found at Fri Jan 8 16:48:15 EST 2016 selfserv_9159 with PID 1273 started at Fri Jan 8 16:48:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10551: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 1273 at Fri Jan 8 16:48:15 EST 2016 kill -USR1 1273 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1273 killed at Fri Jan 8 16:48:16 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:48:16 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:48:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:48:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10552: Waiting for Server - FAILED kill -0 1353 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1353 found at Fri Jan 8 16:48:22 EST 2016 selfserv_9159 with PID 1353 started at Fri Jan 8 16:48:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10553: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 1353 at Fri Jan 8 16:48:22 EST 2016 kill -USR1 1353 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1353 killed at Fri Jan 8 16:48:23 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:48:23 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:48:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:48:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10554: Waiting for Server - FAILED kill -0 1422 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1422 found at Fri Jan 8 16:48:29 EST 2016 selfserv_9159 with PID 1422 started at Fri Jan 8 16:48:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10555: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 1422 at Fri Jan 8 16:48:29 EST 2016 kill -USR1 1422 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1422 killed at Fri Jan 8 16:48:30 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:48:30 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:48:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:48:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10556: Waiting for Server - FAILED kill -0 1490 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1490 found at Fri Jan 8 16:48:36 EST 2016 selfserv_9159 with PID 1490 started at Fri Jan 8 16:48:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10557: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 1490 at Fri Jan 8 16:48:36 EST 2016 kill -USR1 1490 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1490 killed at Fri Jan 8 16:48:37 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:48:37 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:48:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:48:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10558: Waiting for Server - FAILED kill -0 1571 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1571 found at Fri Jan 8 16:48:43 EST 2016 selfserv_9159 with PID 1571 started at Fri Jan 8 16:48:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10559: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 1571 at Fri Jan 8 16:48:43 EST 2016 kill -USR1 1571 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1571 killed at Fri Jan 8 16:48:44 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:48:44 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:48:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:48:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10560: Waiting for Server - FAILED kill -0 1640 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1640 found at Fri Jan 8 16:48:49 EST 2016 selfserv_9159 with PID 1640 started at Fri Jan 8 16:48:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10561: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 1640 at Fri Jan 8 16:48:50 EST 2016 kill -USR1 1640 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1640 killed at Fri Jan 8 16:48:50 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:48:50 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:48:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:48:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10562: Waiting for Server - FAILED kill -0 1708 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1708 found at Fri Jan 8 16:48:56 EST 2016 selfserv_9159 with PID 1708 started at Fri Jan 8 16:48:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10563: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 1708 at Fri Jan 8 16:48:57 EST 2016 kill -USR1 1708 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1708 killed at Fri Jan 8 16:48:57 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 16:48:57 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:48:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:49:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10564: Waiting for Server - FAILED kill -0 1788 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1788 found at Fri Jan 8 16:49:03 EST 2016 selfserv_9159 with PID 1788 started at Fri Jan 8 16:49:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10565: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 1788 at Fri Jan 8 16:49:04 EST 2016 kill -USR1 1788 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1788 killed at Fri Jan 8 16:49:04 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 16:49:04 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:49:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:49:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10566: Waiting for Server - FAILED kill -0 1857 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1857 found at Fri Jan 8 16:49:10 EST 2016 selfserv_9159 with PID 1857 started at Fri Jan 8 16:49:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10567: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 1857 at Fri Jan 8 16:49:11 EST 2016 kill -USR1 1857 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1857 killed at Fri Jan 8 16:49:11 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 16:49:11 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:49:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:49:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10568: Waiting for Server - FAILED kill -0 1925 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1925 found at Fri Jan 8 16:49:17 EST 2016 selfserv_9159 with PID 1925 started at Fri Jan 8 16:49:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10569: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 1925 at Fri Jan 8 16:49:18 EST 2016 kill -USR1 1925 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1925 killed at Fri Jan 8 16:49:18 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:49:18 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:49:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:49:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10570: Waiting for Server - FAILED kill -0 2005 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2005 found at Fri Jan 8 16:49:24 EST 2016 selfserv_9159 with PID 2005 started at Fri Jan 8 16:49:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10571: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 2005 at Fri Jan 8 16:49:25 EST 2016 kill -USR1 2005 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2005 killed at Fri Jan 8 16:49:25 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:49:25 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:49:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:49:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10572: Waiting for Server - FAILED kill -0 2074 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2074 found at Fri Jan 8 16:49:31 EST 2016 selfserv_9159 with PID 2074 started at Fri Jan 8 16:49:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10573: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 2074 at Fri Jan 8 16:49:32 EST 2016 kill -USR1 2074 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2074 killed at Fri Jan 8 16:49:32 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:49:32 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:49:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:49:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10574: Waiting for Server - FAILED kill -0 2142 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2142 found at Fri Jan 8 16:49:38 EST 2016 selfserv_9159 with PID 2142 started at Fri Jan 8 16:49:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10575: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 2142 at Fri Jan 8 16:49:38 EST 2016 kill -USR1 2142 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2142 killed at Fri Jan 8 16:49:39 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:49:39 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:49:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:49:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10576: Waiting for Server - FAILED kill -0 2222 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2222 found at Fri Jan 8 16:49:45 EST 2016 selfserv_9159 with PID 2222 started at Fri Jan 8 16:49:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10577: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 2222 at Fri Jan 8 16:49:45 EST 2016 kill -USR1 2222 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2222 killed at Fri Jan 8 16:49:46 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:49:46 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:49:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:49:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10578: Waiting for Server - FAILED kill -0 2291 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2291 found at Fri Jan 8 16:49:52 EST 2016 selfserv_9159 with PID 2291 started at Fri Jan 8 16:49:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10579: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 2291 at Fri Jan 8 16:49:52 EST 2016 kill -USR1 2291 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2291 killed at Fri Jan 8 16:49:53 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:49:53 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:49:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:49:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10580: Waiting for Server - FAILED kill -0 2359 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2359 found at Fri Jan 8 16:49:59 EST 2016 selfserv_9159 with PID 2359 started at Fri Jan 8 16:49:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10581: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 2359 at Fri Jan 8 16:49:59 EST 2016 kill -USR1 2359 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2359 killed at Fri Jan 8 16:50:00 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 16:50:00 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:50:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:50:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10582: Waiting for Server - FAILED kill -0 2439 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2439 found at Fri Jan 8 16:50:06 EST 2016 selfserv_9159 with PID 2439 started at Fri Jan 8 16:50:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10583: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 2439 at Fri Jan 8 16:50:06 EST 2016 kill -USR1 2439 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2439 killed at Fri Jan 8 16:50:07 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 16:50:07 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:50:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:50:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10584: Waiting for Server - FAILED kill -0 2508 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2508 found at Fri Jan 8 16:50:12 EST 2016 selfserv_9159 with PID 2508 started at Fri Jan 8 16:50:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10585: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 2508 at Fri Jan 8 16:50:13 EST 2016 kill -USR1 2508 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2508 killed at Fri Jan 8 16:50:13 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 16:50:13 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:50:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:50:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10586: Waiting for Server - FAILED kill -0 2576 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2576 found at Fri Jan 8 16:50:19 EST 2016 selfserv_9159 with PID 2576 started at Fri Jan 8 16:50:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10587: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 2576 at Fri Jan 8 16:50:20 EST 2016 kill -USR1 2576 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2576 killed at Fri Jan 8 16:50:20 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:50:20 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:50:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:50:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10588: Waiting for Server - FAILED kill -0 2656 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2656 found at Fri Jan 8 16:50:26 EST 2016 selfserv_9159 with PID 2656 started at Fri Jan 8 16:50:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10589: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 2656 at Fri Jan 8 16:50:27 EST 2016 kill -USR1 2656 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2656 killed at Fri Jan 8 16:50:27 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:50:27 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:50:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:50:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10590: Waiting for Server - FAILED kill -0 2725 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2725 found at Fri Jan 8 16:50:33 EST 2016 selfserv_9159 with PID 2725 started at Fri Jan 8 16:50:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10591: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 2725 at Fri Jan 8 16:50:34 EST 2016 kill -USR1 2725 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2725 killed at Fri Jan 8 16:50:34 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:50:34 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:50:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:50:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10592: Waiting for Server - FAILED kill -0 2794 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2794 found at Fri Jan 8 16:50:40 EST 2016 selfserv_9159 with PID 2794 started at Fri Jan 8 16:50:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10593: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 2794 at Fri Jan 8 16:50:41 EST 2016 kill -USR1 2794 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2794 killed at Fri Jan 8 16:50:41 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:50:41 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:50:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:50:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10594: Waiting for Server - FAILED kill -0 2874 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2874 found at Fri Jan 8 16:50:47 EST 2016 selfserv_9159 with PID 2874 started at Fri Jan 8 16:50:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10595: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 2874 at Fri Jan 8 16:50:48 EST 2016 kill -USR1 2874 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2874 killed at Fri Jan 8 16:50:48 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:50:48 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:50:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:50:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10596: Waiting for Server - FAILED kill -0 2943 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2943 found at Fri Jan 8 16:50:54 EST 2016 selfserv_9159 with PID 2943 started at Fri Jan 8 16:50:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10597: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 2943 at Fri Jan 8 16:50:54 EST 2016 kill -USR1 2943 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2943 killed at Fri Jan 8 16:50:55 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:50:55 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:50:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:51:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10598: Waiting for Server - FAILED kill -0 3011 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3011 found at Fri Jan 8 16:51:01 EST 2016 selfserv_9159 with PID 3011 started at Fri Jan 8 16:51:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10599: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 3011 at Fri Jan 8 16:51:01 EST 2016 kill -USR1 3011 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3011 killed at Fri Jan 8 16:51:02 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 16:51:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:51:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:51:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10600: Waiting for Server - FAILED kill -0 3091 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3091 found at Fri Jan 8 16:51:08 EST 2016 selfserv_9159 with PID 3091 started at Fri Jan 8 16:51:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10601: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 3091 at Fri Jan 8 16:51:08 EST 2016 kill -USR1 3091 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3091 killed at Fri Jan 8 16:51:09 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 16:51:09 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:51:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:51:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10602: Waiting for Server - FAILED kill -0 3160 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3160 found at Fri Jan 8 16:51:15 EST 2016 selfserv_9159 with PID 3160 started at Fri Jan 8 16:51:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10603: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 3160 at Fri Jan 8 16:51:15 EST 2016 kill -USR1 3160 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3160 killed at Fri Jan 8 16:51:16 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 16:51:16 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:51:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:51:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10604: Waiting for Server - FAILED kill -0 3228 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3228 found at Fri Jan 8 16:51:22 EST 2016 selfserv_9159 with PID 3228 started at Fri Jan 8 16:51:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10605: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 3228 at Fri Jan 8 16:51:22 EST 2016 kill -USR1 3228 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3228 killed at Fri Jan 8 16:51:23 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:51:23 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:51:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:51:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10606: Waiting for Server - FAILED kill -0 3308 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3308 found at Fri Jan 8 16:51:29 EST 2016 selfserv_9159 with PID 3308 started at Fri Jan 8 16:51:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10607: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 3308 at Fri Jan 8 16:51:29 EST 2016 kill -USR1 3308 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3308 killed at Fri Jan 8 16:51:29 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:51:30 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:51:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:51:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10608: Waiting for Server - FAILED kill -0 3377 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3377 found at Fri Jan 8 16:51:35 EST 2016 selfserv_9159 with PID 3377 started at Fri Jan 8 16:51:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10609: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 3377 at Fri Jan 8 16:51:36 EST 2016 kill -USR1 3377 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3377 killed at Fri Jan 8 16:51:36 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:51:36 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:51:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:51:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10610: Waiting for Server - FAILED kill -0 3445 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3445 found at Fri Jan 8 16:51:42 EST 2016 selfserv_9159 with PID 3445 started at Fri Jan 8 16:51:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10611: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 3445 at Fri Jan 8 16:51:43 EST 2016 kill -USR1 3445 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3445 killed at Fri Jan 8 16:51:43 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:51:43 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:51:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:51:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10612: Waiting for Server - FAILED kill -0 3525 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3525 found at Fri Jan 8 16:51:49 EST 2016 selfserv_9159 with PID 3525 started at Fri Jan 8 16:51:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10613: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 3525 at Fri Jan 8 16:51:50 EST 2016 kill -USR1 3525 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3525 killed at Fri Jan 8 16:51:50 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:51:50 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:51:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:51:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10614: Waiting for Server - FAILED kill -0 3594 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3594 found at Fri Jan 8 16:51:56 EST 2016 selfserv_9159 with PID 3594 started at Fri Jan 8 16:51:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10615: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 3594 at Fri Jan 8 16:51:57 EST 2016 kill -USR1 3594 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3594 killed at Fri Jan 8 16:51:57 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:51:57 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:51:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:52:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10616: Waiting for Server - FAILED kill -0 3662 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3662 found at Fri Jan 8 16:52:03 EST 2016 selfserv_9159 with PID 3662 started at Fri Jan 8 16:52:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10617: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 3662 at Fri Jan 8 16:52:04 EST 2016 kill -USR1 3662 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3662 killed at Fri Jan 8 16:52:04 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 16:52:04 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:52:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:52:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10618: Waiting for Server - FAILED kill -0 3742 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3742 found at Fri Jan 8 16:52:10 EST 2016 selfserv_9159 with PID 3742 started at Fri Jan 8 16:52:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10619: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 3742 at Fri Jan 8 16:52:11 EST 2016 kill -USR1 3742 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3742 killed at Fri Jan 8 16:52:11 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 16:52:11 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:52:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:52:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10620: Waiting for Server - FAILED kill -0 3811 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3811 found at Fri Jan 8 16:52:17 EST 2016 selfserv_9159 with PID 3811 started at Fri Jan 8 16:52:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10621: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 3811 at Fri Jan 8 16:52:17 EST 2016 kill -USR1 3811 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3811 killed at Fri Jan 8 16:52:18 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 16:52:18 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:52:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:52:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10622: Waiting for Server - FAILED kill -0 3880 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3880 found at Fri Jan 8 16:52:24 EST 2016 selfserv_9159 with PID 3880 started at Fri Jan 8 16:52:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10623: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 3880 at Fri Jan 8 16:52:24 EST 2016 kill -USR1 3880 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3880 killed at Fri Jan 8 16:52:25 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:52:25 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:52:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:52:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10624: Waiting for Server - FAILED kill -0 3960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3960 found at Fri Jan 8 16:52:31 EST 2016 selfserv_9159 with PID 3960 started at Fri Jan 8 16:52:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10625: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 3960 at Fri Jan 8 16:52:31 EST 2016 kill -USR1 3960 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3960 killed at Fri Jan 8 16:52:32 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:52:32 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:52:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:52:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10626: Waiting for Server - FAILED kill -0 4030 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4030 found at Fri Jan 8 16:52:38 EST 2016 selfserv_9159 with PID 4030 started at Fri Jan 8 16:52:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10627: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4030 at Fri Jan 8 16:52:38 EST 2016 kill -USR1 4030 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4030 killed at Fri Jan 8 16:52:39 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:52:39 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:52:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:52:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10628: Waiting for Server - FAILED kill -0 4098 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4098 found at Fri Jan 8 16:52:45 EST 2016 selfserv_9159 with PID 4098 started at Fri Jan 8 16:52:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10629: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4098 at Fri Jan 8 16:52:45 EST 2016 kill -USR1 4098 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4098 killed at Fri Jan 8 16:52:46 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:52:46 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:52:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:52:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10630: Waiting for Server - FAILED kill -0 4178 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4178 found at Fri Jan 8 16:52:52 EST 2016 selfserv_9159 with PID 4178 started at Fri Jan 8 16:52:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10631: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 4178 at Fri Jan 8 16:52:52 EST 2016 kill -USR1 4178 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4178 killed at Fri Jan 8 16:52:52 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:52:53 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:52:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:52:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10632: Waiting for Server - FAILED kill -0 4247 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4247 found at Fri Jan 8 16:52:58 EST 2016 selfserv_9159 with PID 4247 started at Fri Jan 8 16:52:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10633: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4247 at Fri Jan 8 16:52:59 EST 2016 kill -USR1 4247 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4247 killed at Fri Jan 8 16:52:59 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:52:59 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:52:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:53:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10634: Waiting for Server - FAILED kill -0 4315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4315 found at Fri Jan 8 16:53:05 EST 2016 selfserv_9159 with PID 4315 started at Fri Jan 8 16:53:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10635: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 4315 at Fri Jan 8 16:53:06 EST 2016 kill -USR1 4315 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4315 killed at Fri Jan 8 16:53:06 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 16:53:06 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:53:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:53:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10636: Waiting for Server - FAILED kill -0 4396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4396 found at Fri Jan 8 16:53:12 EST 2016 selfserv_9159 with PID 4396 started at Fri Jan 8 16:53:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10637: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 4396 at Fri Jan 8 16:53:13 EST 2016 kill -USR1 4396 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4396 killed at Fri Jan 8 16:53:13 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 16:53:13 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:53:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:53:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10638: Waiting for Server - FAILED kill -0 4465 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4465 found at Fri Jan 8 16:53:19 EST 2016 selfserv_9159 with PID 4465 started at Fri Jan 8 16:53:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10639: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 4465 at Fri Jan 8 16:53:20 EST 2016 kill -USR1 4465 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4465 killed at Fri Jan 8 16:53:20 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 16:53:20 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:53:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:53:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10640: Waiting for Server - FAILED kill -0 4533 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4533 found at Fri Jan 8 16:53:26 EST 2016 selfserv_9159 with PID 4533 started at Fri Jan 8 16:53:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10641: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 4533 at Fri Jan 8 16:53:27 EST 2016 kill -USR1 4533 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4533 killed at Fri Jan 8 16:53:27 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:53:27 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:53:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:53:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10642: Waiting for Server - FAILED kill -0 4614 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4614 found at Fri Jan 8 16:53:33 EST 2016 selfserv_9159 with PID 4614 started at Fri Jan 8 16:53:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10643: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 4614 at Fri Jan 8 16:53:34 EST 2016 kill -USR1 4614 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4614 killed at Fri Jan 8 16:53:34 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:53:34 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:53:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:53:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10644: Waiting for Server - FAILED kill -0 4683 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4683 found at Fri Jan 8 16:53:40 EST 2016 selfserv_9159 with PID 4683 started at Fri Jan 8 16:53:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10645: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 4683 at Fri Jan 8 16:53:40 EST 2016 kill -USR1 4683 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4683 killed at Fri Jan 8 16:53:41 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:53:41 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:53:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:53:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10646: Waiting for Server - FAILED kill -0 4751 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4751 found at Fri Jan 8 16:53:47 EST 2016 selfserv_9159 with PID 4751 started at Fri Jan 8 16:53:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10647: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 4751 at Fri Jan 8 16:53:47 EST 2016 kill -USR1 4751 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4751 killed at Fri Jan 8 16:53:48 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:53:48 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:53:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:53:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10648: Waiting for Server - FAILED kill -0 4831 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4831 found at Fri Jan 8 16:53:54 EST 2016 selfserv_9159 with PID 4831 started at Fri Jan 8 16:53:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10649: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 4831 at Fri Jan 8 16:53:54 EST 2016 kill -USR1 4831 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4831 killed at Fri Jan 8 16:53:55 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:53:55 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:53:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:54:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10650: Waiting for Server - FAILED kill -0 4900 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4900 found at Fri Jan 8 16:54:01 EST 2016 selfserv_9159 with PID 4900 started at Fri Jan 8 16:54:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10651: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 4900 at Fri Jan 8 16:54:01 EST 2016 kill -USR1 4900 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4900 killed at Fri Jan 8 16:54:02 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:54:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:54:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:54:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10652: Waiting for Server - FAILED kill -0 4968 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4968 found at Fri Jan 8 16:54:08 EST 2016 selfserv_9159 with PID 4968 started at Fri Jan 8 16:54:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10653: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 4968 at Fri Jan 8 16:54:08 EST 2016 kill -USR1 4968 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4968 killed at Fri Jan 8 16:54:08 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:54:09 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:54:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:54:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10654: Waiting for Server - FAILED kill -0 5057 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5057 found at Fri Jan 8 16:54:15 EST 2016 selfserv_9159 with PID 5057 started at Fri Jan 8 16:54:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10655: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 5057 at Fri Jan 8 16:54:15 EST 2016 kill -USR1 5057 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5057 killed at Fri Jan 8 16:54:15 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:54:16 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:54:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:54:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10656: Waiting for Server - FAILED kill -0 5126 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5126 found at Fri Jan 8 16:54:21 EST 2016 selfserv_9159 with PID 5126 started at Fri Jan 8 16:54:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10657: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 5126 at Fri Jan 8 16:54:22 EST 2016 kill -USR1 5126 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5126 killed at Fri Jan 8 16:54:22 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:54:22 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:54:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:54:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10658: Waiting for Server - FAILED kill -0 5194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5194 found at Fri Jan 8 16:54:28 EST 2016 selfserv_9159 with PID 5194 started at Fri Jan 8 16:54:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10659: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 5194 at Fri Jan 8 16:54:29 EST 2016 kill -USR1 5194 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5194 killed at Fri Jan 8 16:54:29 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:54:29 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:54:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:54:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10660: Waiting for Server - FAILED kill -0 5274 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5274 found at Fri Jan 8 16:54:35 EST 2016 selfserv_9159 with PID 5274 started at Fri Jan 8 16:54:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10661: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 5274 at Fri Jan 8 16:54:36 EST 2016 kill -USR1 5274 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5274 killed at Fri Jan 8 16:54:36 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:54:36 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:54:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:54:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10662: Waiting for Server - FAILED kill -0 5343 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5343 found at Fri Jan 8 16:54:42 EST 2016 selfserv_9159 with PID 5343 started at Fri Jan 8 16:54:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10663: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 5343 at Fri Jan 8 16:54:43 EST 2016 kill -USR1 5343 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5343 killed at Fri Jan 8 16:54:43 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:54:43 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:54:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:54:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10664: Waiting for Server - FAILED kill -0 5411 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5411 found at Fri Jan 8 16:54:49 EST 2016 selfserv_9159 with PID 5411 started at Fri Jan 8 16:54:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10665: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 5411 at Fri Jan 8 16:54:50 EST 2016 kill -USR1 5411 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5411 killed at Fri Jan 8 16:54:50 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:54:50 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:54:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:54:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10666: Waiting for Server - FAILED kill -0 5491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5491 found at Fri Jan 8 16:54:56 EST 2016 selfserv_9159 with PID 5491 started at Fri Jan 8 16:54:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10667: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 5491 at Fri Jan 8 16:54:57 EST 2016 kill -USR1 5491 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5491 killed at Fri Jan 8 16:54:57 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:54:57 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:54:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:55:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10668: Waiting for Server - FAILED kill -0 5560 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5560 found at Fri Jan 8 16:55:03 EST 2016 selfserv_9159 with PID 5560 started at Fri Jan 8 16:55:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10669: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 5560 at Fri Jan 8 16:55:03 EST 2016 kill -USR1 5560 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5560 killed at Fri Jan 8 16:55:04 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:55:04 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:55:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:55:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10670: Waiting for Server - FAILED kill -0 5628 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5628 found at Fri Jan 8 16:55:10 EST 2016 selfserv_9159 with PID 5628 started at Fri Jan 8 16:55:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10671: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 5628 at Fri Jan 8 16:55:10 EST 2016 kill -USR1 5628 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5628 killed at Fri Jan 8 16:55:11 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:55:11 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:55:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:55:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10672: Waiting for Server - FAILED kill -0 5708 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5708 found at Fri Jan 8 16:55:17 EST 2016 selfserv_9159 with PID 5708 started at Fri Jan 8 16:55:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10673: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 5708 at Fri Jan 8 16:55:17 EST 2016 kill -USR1 5708 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5708 killed at Fri Jan 8 16:55:18 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:55:18 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:55:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:55:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10674: Waiting for Server - FAILED kill -0 5777 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5777 found at Fri Jan 8 16:55:24 EST 2016 selfserv_9159 with PID 5777 started at Fri Jan 8 16:55:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10675: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 5777 at Fri Jan 8 16:55:24 EST 2016 kill -USR1 5777 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5777 killed at Fri Jan 8 16:55:25 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:55:25 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:55:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:55:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10676: Waiting for Server - FAILED kill -0 5845 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5845 found at Fri Jan 8 16:55:31 EST 2016 selfserv_9159 with PID 5845 started at Fri Jan 8 16:55:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10677: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 5845 at Fri Jan 8 16:55:31 EST 2016 kill -USR1 5845 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5845 killed at Fri Jan 8 16:55:32 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:55:32 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:55:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:55:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10678: Waiting for Server - FAILED kill -0 5925 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5925 found at Fri Jan 8 16:55:38 EST 2016 selfserv_9159 with PID 5925 started at Fri Jan 8 16:55:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10679: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 5925 at Fri Jan 8 16:55:38 EST 2016 kill -USR1 5925 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5925 killed at Fri Jan 8 16:55:38 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:55:39 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:55:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:55:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10680: Waiting for Server - FAILED kill -0 5994 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5994 found at Fri Jan 8 16:55:44 EST 2016 selfserv_9159 with PID 5994 started at Fri Jan 8 16:55:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10681: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 5994 at Fri Jan 8 16:55:45 EST 2016 kill -USR1 5994 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5994 killed at Fri Jan 8 16:55:45 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:55:45 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:55:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:55:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10682: Waiting for Server - FAILED kill -0 6062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6062 found at Fri Jan 8 16:55:51 EST 2016 selfserv_9159 with PID 6062 started at Fri Jan 8 16:55:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10683: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 6062 at Fri Jan 8 16:55:52 EST 2016 kill -USR1 6062 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6062 killed at Fri Jan 8 16:55:52 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:55:52 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:55:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:55:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10684: Waiting for Server - FAILED kill -0 6142 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6142 found at Fri Jan 8 16:55:58 EST 2016 selfserv_9159 with PID 6142 started at Fri Jan 8 16:55:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10685: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 6142 at Fri Jan 8 16:55:59 EST 2016 kill -USR1 6142 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6142 killed at Fri Jan 8 16:55:59 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:55:59 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:55:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:56:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10686: Waiting for Server - FAILED kill -0 6211 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6211 found at Fri Jan 8 16:56:05 EST 2016 selfserv_9159 with PID 6211 started at Fri Jan 8 16:56:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10687: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 6211 at Fri Jan 8 16:56:06 EST 2016 kill -USR1 6211 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6211 killed at Fri Jan 8 16:56:06 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:56:06 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:56:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:56:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10688: Waiting for Server - FAILED kill -0 6279 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6279 found at Fri Jan 8 16:56:12 EST 2016 selfserv_9159 with PID 6279 started at Fri Jan 8 16:56:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10689: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 6279 at Fri Jan 8 16:56:13 EST 2016 kill -USR1 6279 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6279 killed at Fri Jan 8 16:56:13 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:56:13 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:56:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:56:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10690: Waiting for Server - FAILED kill -0 6360 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6360 found at Fri Jan 8 16:56:19 EST 2016 selfserv_9159 with PID 6360 started at Fri Jan 8 16:56:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10691: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 6360 at Fri Jan 8 16:56:20 EST 2016 kill -USR1 6360 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6360 killed at Fri Jan 8 16:56:20 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:56:20 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:56:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:56:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10692: Waiting for Server - FAILED kill -0 6430 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6430 found at Fri Jan 8 16:56:26 EST 2016 selfserv_9159 with PID 6430 started at Fri Jan 8 16:56:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10693: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 6430 at Fri Jan 8 16:56:26 EST 2016 kill -USR1 6430 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6430 killed at Fri Jan 8 16:56:27 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:56:27 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:56:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:56:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10694: Waiting for Server - FAILED kill -0 6498 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6498 found at Fri Jan 8 16:56:33 EST 2016 selfserv_9159 with PID 6498 started at Fri Jan 8 16:56:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10695: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 6498 at Fri Jan 8 16:56:33 EST 2016 kill -USR1 6498 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6498 killed at Fri Jan 8 16:56:34 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:56:34 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:56:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:56:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10696: Waiting for Server - FAILED kill -0 6578 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6578 found at Fri Jan 8 16:56:40 EST 2016 selfserv_9159 with PID 6578 started at Fri Jan 8 16:56:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10697: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 6578 at Fri Jan 8 16:56:40 EST 2016 kill -USR1 6578 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6578 killed at Fri Jan 8 16:56:41 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:56:41 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:56:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:56:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10698: Waiting for Server - FAILED kill -0 6647 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6647 found at Fri Jan 8 16:56:47 EST 2016 selfserv_9159 with PID 6647 started at Fri Jan 8 16:56:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10699: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 6647 at Fri Jan 8 16:56:47 EST 2016 kill -USR1 6647 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6647 killed at Fri Jan 8 16:56:48 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:56:48 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:56:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:56:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10700: Waiting for Server - FAILED kill -0 6715 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6715 found at Fri Jan 8 16:56:54 EST 2016 selfserv_9159 with PID 6715 started at Fri Jan 8 16:56:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10701: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 6715 at Fri Jan 8 16:56:54 EST 2016 kill -USR1 6715 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6715 killed at Fri Jan 8 16:56:55 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:56:55 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:56:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:57:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10702: Waiting for Server - FAILED kill -0 6795 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6795 found at Fri Jan 8 16:57:01 EST 2016 selfserv_9159 with PID 6795 started at Fri Jan 8 16:57:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10703: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 6795 at Fri Jan 8 16:57:01 EST 2016 kill -USR1 6795 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6795 killed at Fri Jan 8 16:57:01 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:57:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:57:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:57:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10704: Waiting for Server - FAILED kill -0 6864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6864 found at Fri Jan 8 16:57:07 EST 2016 selfserv_9159 with PID 6864 started at Fri Jan 8 16:57:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10705: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 6864 at Fri Jan 8 16:57:08 EST 2016 kill -USR1 6864 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6864 killed at Fri Jan 8 16:57:08 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:57:08 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:57:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:57:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10706: Waiting for Server - FAILED kill -0 6932 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6932 found at Fri Jan 8 16:57:14 EST 2016 selfserv_9159 with PID 6932 started at Fri Jan 8 16:57:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10707: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 6932 at Fri Jan 8 16:57:15 EST 2016 kill -USR1 6932 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6932 killed at Fri Jan 8 16:57:15 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:57:15 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:57:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:57:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10708: Waiting for Server - FAILED kill -0 7012 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7012 found at Fri Jan 8 16:57:21 EST 2016 selfserv_9159 with PID 7012 started at Fri Jan 8 16:57:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10709: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 7012 at Fri Jan 8 16:57:22 EST 2016 kill -USR1 7012 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7012 killed at Fri Jan 8 16:57:22 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:57:22 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:57:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:57:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10710: Waiting for Server - FAILED kill -0 7081 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7081 found at Fri Jan 8 16:57:28 EST 2016 selfserv_9159 with PID 7081 started at Fri Jan 8 16:57:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10711: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 7081 at Fri Jan 8 16:57:29 EST 2016 kill -USR1 7081 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7081 killed at Fri Jan 8 16:57:29 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:57:29 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:57:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:57:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10712: Waiting for Server - FAILED kill -0 7149 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7149 found at Fri Jan 8 16:57:35 EST 2016 selfserv_9159 with PID 7149 started at Fri Jan 8 16:57:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10713: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 7149 at Fri Jan 8 16:57:36 EST 2016 kill -USR1 7149 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7149 killed at Fri Jan 8 16:57:36 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:57:36 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:57:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:57:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10714: Waiting for Server - FAILED kill -0 7229 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7229 found at Fri Jan 8 16:57:42 EST 2016 selfserv_9159 with PID 7229 started at Fri Jan 8 16:57:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10715: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 7229 at Fri Jan 8 16:57:43 EST 2016 kill -USR1 7229 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7229 killed at Fri Jan 8 16:57:43 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:57:43 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:57:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:57:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10716: Waiting for Server - FAILED kill -0 7298 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7298 found at Fri Jan 8 16:57:49 EST 2016 selfserv_9159 with PID 7298 started at Fri Jan 8 16:57:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10717: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 7298 at Fri Jan 8 16:57:49 EST 2016 kill -USR1 7298 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7298 killed at Fri Jan 8 16:57:50 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:57:50 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:57:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:57:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10718: Waiting for Server - FAILED kill -0 7366 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7366 found at Fri Jan 8 16:57:56 EST 2016 selfserv_9159 with PID 7366 started at Fri Jan 8 16:57:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10719: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 7366 at Fri Jan 8 16:57:56 EST 2016 kill -USR1 7366 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7366 killed at Fri Jan 8 16:57:57 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:57:57 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:57:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:58:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10720: Waiting for Server - FAILED kill -0 7446 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7446 found at Fri Jan 8 16:58:03 EST 2016 selfserv_9159 with PID 7446 started at Fri Jan 8 16:58:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10721: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 7446 at Fri Jan 8 16:58:03 EST 2016 kill -USR1 7446 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7446 killed at Fri Jan 8 16:58:04 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:58:04 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:58:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:58:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10722: Waiting for Server - FAILED kill -0 7515 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7515 found at Fri Jan 8 16:58:10 EST 2016 selfserv_9159 with PID 7515 started at Fri Jan 8 16:58:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10723: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 7515 at Fri Jan 8 16:58:10 EST 2016 kill -USR1 7515 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7515 killed at Fri Jan 8 16:58:11 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:58:11 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:58:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:58:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10724: Waiting for Server - FAILED kill -0 7583 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7583 found at Fri Jan 8 16:58:17 EST 2016 selfserv_9159 with PID 7583 started at Fri Jan 8 16:58:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10725: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 7583 at Fri Jan 8 16:58:17 EST 2016 kill -USR1 7583 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7583 killed at Fri Jan 8 16:58:18 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:58:18 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:58:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:58:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10726: Waiting for Server - FAILED kill -0 7663 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7663 found at Fri Jan 8 16:58:24 EST 2016 selfserv_9159 with PID 7663 started at Fri Jan 8 16:58:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10727: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 7663 at Fri Jan 8 16:58:24 EST 2016 kill -USR1 7663 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7663 killed at Fri Jan 8 16:58:24 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:58:25 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:58:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:58:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10728: Waiting for Server - FAILED kill -0 7732 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7732 found at Fri Jan 8 16:58:30 EST 2016 selfserv_9159 with PID 7732 started at Fri Jan 8 16:58:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10729: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 7732 at Fri Jan 8 16:58:31 EST 2016 kill -USR1 7732 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7732 killed at Fri Jan 8 16:58:31 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:58:31 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:58:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:58:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10730: Waiting for Server - FAILED kill -0 7800 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7800 found at Fri Jan 8 16:58:37 EST 2016 selfserv_9159 with PID 7800 started at Fri Jan 8 16:58:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10731: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 7800 at Fri Jan 8 16:58:38 EST 2016 kill -USR1 7800 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7800 killed at Fri Jan 8 16:58:38 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:58:38 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:58:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:58:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10732: Waiting for Server - FAILED kill -0 7881 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7881 found at Fri Jan 8 16:58:44 EST 2016 selfserv_9159 with PID 7881 started at Fri Jan 8 16:58:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10733: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 7881 at Fri Jan 8 16:58:45 EST 2016 kill -USR1 7881 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7881 killed at Fri Jan 8 16:58:45 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:58:45 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:58:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:58:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10734: Waiting for Server - FAILED kill -0 7949 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7949 found at Fri Jan 8 16:58:51 EST 2016 selfserv_9159 with PID 7949 started at Fri Jan 8 16:58:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10735: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 7949 at Fri Jan 8 16:58:52 EST 2016 kill -USR1 7949 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7949 killed at Fri Jan 8 16:58:52 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:58:52 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:58:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:58:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10736: Waiting for Server - FAILED kill -0 8017 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8017 found at Fri Jan 8 16:58:58 EST 2016 selfserv_9159 with PID 8017 started at Fri Jan 8 16:58:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10737: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 8017 at Fri Jan 8 16:58:59 EST 2016 kill -USR1 8017 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8017 killed at Fri Jan 8 16:58:59 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:58:59 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:58:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:59:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10738: Waiting for Server - FAILED kill -0 8098 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8098 found at Fri Jan 8 16:59:05 EST 2016 selfserv_9159 with PID 8098 started at Fri Jan 8 16:59:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10739: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 8098 at Fri Jan 8 16:59:06 EST 2016 kill -USR1 8098 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8098 killed at Fri Jan 8 16:59:06 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:59:06 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:59:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:59:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10740: Waiting for Server - FAILED kill -0 8166 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8166 found at Fri Jan 8 16:59:12 EST 2016 selfserv_9159 with PID 8166 started at Fri Jan 8 16:59:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10741: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 8166 at Fri Jan 8 16:59:12 EST 2016 kill -USR1 8166 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8166 killed at Fri Jan 8 16:59:13 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:59:13 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:59:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:59:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10742: Waiting for Server - FAILED kill -0 8234 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8234 found at Fri Jan 8 16:59:19 EST 2016 selfserv_9159 with PID 8234 started at Fri Jan 8 16:59:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10743: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 8234 at Fri Jan 8 16:59:19 EST 2016 kill -USR1 8234 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8234 killed at Fri Jan 8 16:59:20 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:59:20 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:59:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:59:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10744: Waiting for Server - FAILED kill -0 8315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8315 found at Fri Jan 8 16:59:26 EST 2016 selfserv_9159 with PID 8315 started at Fri Jan 8 16:59:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10745: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 8315 at Fri Jan 8 16:59:26 EST 2016 kill -USR1 8315 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8315 killed at Fri Jan 8 16:59:27 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:59:27 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:59:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:59:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10746: Waiting for Server - FAILED kill -0 8383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8383 found at Fri Jan 8 16:59:33 EST 2016 selfserv_9159 with PID 8383 started at Fri Jan 8 16:59:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10747: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 8383 at Fri Jan 8 16:59:33 EST 2016 kill -USR1 8383 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8383 killed at Fri Jan 8 16:59:34 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 16:59:34 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:59:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:59:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10748: Waiting for Server - FAILED kill -0 8452 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8452 found at Fri Jan 8 16:59:40 EST 2016 selfserv_9159 with PID 8452 started at Fri Jan 8 16:59:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10749: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 8452 at Fri Jan 8 16:59:40 EST 2016 kill -USR1 8452 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8452 killed at Fri Jan 8 16:59:41 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:59:41 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:59:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:59:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10750: Waiting for Server - FAILED kill -0 8533 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8533 found at Fri Jan 8 16:59:47 EST 2016 selfserv_9159 with PID 8533 started at Fri Jan 8 16:59:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10751: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 8533 at Fri Jan 8 16:59:47 EST 2016 kill -USR1 8533 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8533 killed at Fri Jan 8 16:59:48 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:59:48 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:59:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 16:59:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10752: Waiting for Server - FAILED kill -0 8601 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8601 found at Fri Jan 8 16:59:54 EST 2016 selfserv_9159 with PID 8601 started at Fri Jan 8 16:59:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10753: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 8601 at Fri Jan 8 16:59:54 EST 2016 kill -USR1 8601 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8601 killed at Fri Jan 8 16:59:54 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 16:59:55 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 16:59:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:00:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10754: Waiting for Server - FAILED kill -0 8669 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8669 found at Fri Jan 8 17:00:00 EST 2016 selfserv_9159 with PID 8669 started at Fri Jan 8 17:00:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10755: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 8669 at Fri Jan 8 17:00:01 EST 2016 kill -USR1 8669 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8669 killed at Fri Jan 8 17:00:01 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:00:01 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:00:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:00:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10756: Waiting for Server - FAILED kill -0 8750 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8750 found at Fri Jan 8 17:00:07 EST 2016 selfserv_9159 with PID 8750 started at Fri Jan 8 17:00:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10757: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 8750 at Fri Jan 8 17:00:08 EST 2016 kill -USR1 8750 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8750 killed at Fri Jan 8 17:00:08 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:00:08 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:00:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:00:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10758: Waiting for Server - FAILED kill -0 8818 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8818 found at Fri Jan 8 17:00:14 EST 2016 selfserv_9159 with PID 8818 started at Fri Jan 8 17:00:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10759: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 8818 at Fri Jan 8 17:00:15 EST 2016 kill -USR1 8818 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8818 killed at Fri Jan 8 17:00:15 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:00:15 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:00:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:00:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10760: Waiting for Server - FAILED kill -0 8886 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8886 found at Fri Jan 8 17:00:21 EST 2016 selfserv_9159 with PID 8886 started at Fri Jan 8 17:00:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10761: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 8886 at Fri Jan 8 17:00:22 EST 2016 kill -USR1 8886 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8886 killed at Fri Jan 8 17:00:22 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:00:22 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:00:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:00:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10762: Waiting for Server - FAILED kill -0 8967 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 8967 found at Fri Jan 8 17:00:28 EST 2016 selfserv_9159 with PID 8967 started at Fri Jan 8 17:00:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10763: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 8967 at Fri Jan 8 17:00:29 EST 2016 kill -USR1 8967 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 8967 killed at Fri Jan 8 17:00:29 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:00:29 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:00:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:00:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10764: Waiting for Server - FAILED kill -0 9035 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9035 found at Fri Jan 8 17:00:35 EST 2016 selfserv_9159 with PID 9035 started at Fri Jan 8 17:00:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10765: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 9035 at Fri Jan 8 17:00:36 EST 2016 kill -USR1 9035 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9035 killed at Fri Jan 8 17:00:36 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:00:36 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:00:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:00:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10766: Waiting for Server - FAILED kill -0 9103 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9103 found at Fri Jan 8 17:00:42 EST 2016 selfserv_9159 with PID 9103 started at Fri Jan 8 17:00:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10767: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 9103 at Fri Jan 8 17:00:42 EST 2016 kill -USR1 9103 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9103 killed at Fri Jan 8 17:00:43 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:00:43 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:00:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:00:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10768: Waiting for Server - FAILED kill -0 9184 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9184 found at Fri Jan 8 17:00:49 EST 2016 selfserv_9159 with PID 9184 started at Fri Jan 8 17:00:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10769: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 9184 at Fri Jan 8 17:00:49 EST 2016 kill -USR1 9184 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9184 killed at Fri Jan 8 17:00:50 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:00:50 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:00:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:00:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10770: Waiting for Server - FAILED kill -0 9252 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9252 found at Fri Jan 8 17:00:56 EST 2016 selfserv_9159 with PID 9252 started at Fri Jan 8 17:00:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10771: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 9252 at Fri Jan 8 17:00:56 EST 2016 kill -USR1 9252 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9252 killed at Fri Jan 8 17:00:57 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:00:57 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:00:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:01:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10772: Waiting for Server - FAILED kill -0 9320 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9320 found at Fri Jan 8 17:01:03 EST 2016 selfserv_9159 with PID 9320 started at Fri Jan 8 17:01:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10773: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 9320 at Fri Jan 8 17:01:03 EST 2016 kill -USR1 9320 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9320 killed at Fri Jan 8 17:01:04 EST 2016 ssl.sh: Cache CRL SSL Client Tests - with ECC =============================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/authin.tl.tmp 0 selfserv_9159 starting at Fri Jan 8 17:01:04 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:01:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:01:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10774: Waiting for Server - FAILED kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:10 EST 2016 selfserv_9159 with PID 9413 started at Fri Jan 8 17:01:10 EST 2016 Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:10 EST 2016 ssl.sh: #10775: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:11 EST 2016 ssl.sh: #10776: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:11 EST 2016 ssl.sh: #10777: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:12 EST 2016 ssl.sh: #10778: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:12 EST 2016 ssl.sh: #10779: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:13 EST 2016 ssl.sh: #10780: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:13 EST 2016 ssl.sh: #10781: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:14 EST 2016 ssl.sh: #10782: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:15 EST 2016 ssl.sh: #10783: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:15 EST 2016 ssl.sh: #10784: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:16 EST 2016 ssl.sh: #10785: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:16 EST 2016 ssl.sh: #10786: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:17 EST 2016 ssl.sh: #10787: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:17 EST 2016 ================= CRL Reloaded ============= ssl.sh: #10788: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:18 EST 2016 ssl.sh: #10789: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:18 EST 2016 ssl.sh: #10790: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:19 EST 2016 ssl.sh: #10791: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:20 EST 2016 ssl.sh: #10792: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:20 EST 2016 ssl.sh: #10793: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:21 EST 2016 ssl.sh: #10794: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:21 EST 2016 ssl.sh: #10795: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:22 EST 2016 ssl.sh: #10796: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:22 EST 2016 ssl.sh: #10797: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:23 EST 2016 ssl.sh: #10798: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:24 EST 2016 ssl.sh: #10799: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:24 EST 2016 ssl.sh: #10800: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:25 EST 2016 ssl.sh: #10801: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:25 EST 2016 ================= CRL Reloaded ============= ssl.sh: #10802: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:26 EST 2016 ssl.sh: #10803: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:26 EST 2016 ssl.sh: #10804: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:27 EST 2016 ssl.sh: #10805: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:27 EST 2016 ssl.sh: #10806: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:28 EST 2016 ssl.sh: #10807: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:28 EST 2016 ssl.sh: #10808: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:29 EST 2016 ssl.sh: #10809: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:30 EST 2016 ssl.sh: #10810: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:30 EST 2016 ssl.sh: #10811: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:31 EST 2016 ssl.sh: #10812: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:31 EST 2016 ssl.sh: #10813: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:32 EST 2016 ssl.sh: #10814: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9413 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9413 found at Fri Jan 8 17:01:32 EST 2016 ssl.sh: #10815: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 9413 at Fri Jan 8 17:01:33 EST 2016 kill -USR1 9413 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9413 killed at Fri Jan 8 17:01:33 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:01:33 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:01:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:01:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10816: Waiting for Server - FAILED kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:39 EST 2016 selfserv_9159 with PID 10849 started at Fri Jan 8 17:01:39 EST 2016 Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:39 EST 2016 ssl.sh: #10817: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:40 EST 2016 ssl.sh: #10818: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:41 EST 2016 ssl.sh: #10819: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:41 EST 2016 ssl.sh: #10820: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:42 EST 2016 ssl.sh: #10821: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:42 EST 2016 ssl.sh: #10822: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:43 EST 2016 ssl.sh: #10823: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:43 EST 2016 ssl.sh: #10824: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:44 EST 2016 ssl.sh: #10825: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:44 EST 2016 ssl.sh: #10826: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:45 EST 2016 ssl.sh: #10827: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:46 EST 2016 ssl.sh: #10828: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:46 EST 2016 ssl.sh: #10829: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:47 EST 2016 ================= CRL Reloaded ============= ssl.sh: #10830: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:47 EST 2016 ssl.sh: #10831: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:48 EST 2016 ssl.sh: #10832: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:48 EST 2016 ssl.sh: #10833: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:49 EST 2016 ssl.sh: #10834: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:49 EST 2016 ssl.sh: #10835: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:50 EST 2016 ssl.sh: #10836: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:51 EST 2016 ssl.sh: #10837: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:51 EST 2016 ssl.sh: #10838: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:52 EST 2016 ssl.sh: #10839: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:52 EST 2016 ssl.sh: #10840: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:53 EST 2016 ssl.sh: #10841: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:53 EST 2016 ssl.sh: #10842: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:54 EST 2016 ssl.sh: #10843: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:54 EST 2016 ================= CRL Reloaded ============= ssl.sh: #10844: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:55 EST 2016 ssl.sh: #10845: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:56 EST 2016 ssl.sh: #10846: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:56 EST 2016 ssl.sh: #10847: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:57 EST 2016 ssl.sh: #10848: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:57 EST 2016 ssl.sh: #10849: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:58 EST 2016 ssl.sh: #10850: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:58 EST 2016 ssl.sh: #10851: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:59 EST 2016 ssl.sh: #10852: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:01:59 EST 2016 ssl.sh: #10853: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:02:00 EST 2016 ssl.sh: #10854: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:02:01 EST 2016 ssl.sh: #10855: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:02:01 EST 2016 ssl.sh: #10856: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10849 found at Fri Jan 8 17:02:02 EST 2016 ssl.sh: #10857: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 10849 at Fri Jan 8 17:02:02 EST 2016 kill -USR1 10849 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10849 killed at Fri Jan 8 17:02:02 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:02:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:02:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:02:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10858: Waiting for Server - FAILED kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:08 EST 2016 selfserv_9159 with PID 12286 started at Fri Jan 8 17:02:08 EST 2016 Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:09 EST 2016 ssl.sh: #10859: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:09 EST 2016 ssl.sh: #10860: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:10 EST 2016 ssl.sh: #10861: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:10 EST 2016 ssl.sh: #10862: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:11 EST 2016 ssl.sh: #10863: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:11 EST 2016 ssl.sh: #10864: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:12 EST 2016 ssl.sh: #10865: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:13 EST 2016 ssl.sh: #10866: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:13 EST 2016 ssl.sh: #10867: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:14 EST 2016 ssl.sh: #10868: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:14 EST 2016 ssl.sh: #10869: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:15 EST 2016 ssl.sh: #10870: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:15 EST 2016 ssl.sh: #10871: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:16 EST 2016 ================= CRL Reloaded ============= ssl.sh: #10872: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:17 EST 2016 ssl.sh: #10873: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:17 EST 2016 ssl.sh: #10874: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:18 EST 2016 ssl.sh: #10875: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:18 EST 2016 ssl.sh: #10876: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:19 EST 2016 ssl.sh: #10877: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:19 EST 2016 ssl.sh: #10878: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:20 EST 2016 ssl.sh: #10879: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:20 EST 2016 ssl.sh: #10880: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:21 EST 2016 ssl.sh: #10881: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:22 EST 2016 ssl.sh: #10882: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:22 EST 2016 ssl.sh: #10883: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:23 EST 2016 ssl.sh: #10884: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:23 EST 2016 ssl.sh: #10885: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:24 EST 2016 ================= CRL Reloaded ============= ssl.sh: #10886: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:24 EST 2016 ssl.sh: #10887: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:25 EST 2016 ssl.sh: #10888: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:25 EST 2016 ssl.sh: #10889: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:26 EST 2016 ssl.sh: #10890: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:26 EST 2016 ssl.sh: #10891: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:27 EST 2016 ssl.sh: #10892: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:28 EST 2016 ssl.sh: #10893: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:28 EST 2016 ssl.sh: #10894: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:29 EST 2016 ssl.sh: #10895: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:29 EST 2016 ssl.sh: #10896: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:30 EST 2016 ssl.sh: #10897: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:30 EST 2016 ssl.sh: #10898: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 12286 found at Fri Jan 8 17:02:31 EST 2016 ssl.sh: #10899: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 12286 at Fri Jan 8 17:02:31 EST 2016 kill -USR1 12286 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 12286 killed at Fri Jan 8 17:02:32 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:02:32 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:02:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:02:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10900: Waiting for Server - FAILED kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:37 EST 2016 selfserv_9159 with PID 13723 started at Fri Jan 8 17:02:38 EST 2016 Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:38 EST 2016 ssl.sh: #10901: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:39 EST 2016 ssl.sh: #10902: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:39 EST 2016 ssl.sh: #10903: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:40 EST 2016 ssl.sh: #10904: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:40 EST 2016 ssl.sh: #10905: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:41 EST 2016 ssl.sh: #10906: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:41 EST 2016 ssl.sh: #10907: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:42 EST 2016 ssl.sh: #10908: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:42 EST 2016 ssl.sh: #10909: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:43 EST 2016 ssl.sh: #10910: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:44 EST 2016 ssl.sh: #10911: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:44 EST 2016 ssl.sh: #10912: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:45 EST 2016 ssl.sh: #10913: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:45 EST 2016 ================= CRL Reloaded ============= ssl.sh: #10914: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:46 EST 2016 ssl.sh: #10915: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:46 EST 2016 ssl.sh: #10916: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:47 EST 2016 ssl.sh: #10917: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:47 EST 2016 ssl.sh: #10918: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:48 EST 2016 ssl.sh: #10919: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:49 EST 2016 ssl.sh: #10920: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:49 EST 2016 ssl.sh: #10921: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:50 EST 2016 ssl.sh: #10922: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:50 EST 2016 ssl.sh: #10923: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:51 EST 2016 ssl.sh: #10924: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:51 EST 2016 ssl.sh: #10925: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:52 EST 2016 ssl.sh: #10926: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:53 EST 2016 ssl.sh: #10927: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:53 EST 2016 ================= CRL Reloaded ============= ssl.sh: #10928: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:54 EST 2016 ssl.sh: #10929: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:54 EST 2016 ssl.sh: #10930: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:55 EST 2016 ssl.sh: #10931: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:55 EST 2016 ssl.sh: #10932: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:56 EST 2016 ssl.sh: #10933: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:56 EST 2016 ssl.sh: #10934: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:57 EST 2016 ssl.sh: #10935: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:57 EST 2016 ssl.sh: #10936: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:58 EST 2016 ssl.sh: #10937: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:59 EST 2016 ssl.sh: #10938: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:02:59 EST 2016 ssl.sh: #10939: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:03:00 EST 2016 ssl.sh: #10940: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13723 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13723 found at Fri Jan 8 17:03:00 EST 2016 ssl.sh: #10941: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 13723 at Fri Jan 8 17:03:00 EST 2016 kill -USR1 13723 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13723 killed at Fri Jan 8 17:03:01 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:03:01 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:03:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:03:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10942: Waiting for Server - FAILED kill -0 15158 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15158 found at Fri Jan 8 17:03:07 EST 2016 selfserv_9159 with PID 15158 started at Fri Jan 8 17:03:07 EST 2016 trying to kill selfserv_9159 with PID 15158 at Fri Jan 8 17:03:07 EST 2016 kill -USR1 15158 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15158 killed at Fri Jan 8 17:03:07 EST 2016 selfserv_9159 starting at Fri Jan 8 17:03:07 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:03:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:03:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10943: Waiting for Server - FAILED kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:13 EST 2016 selfserv_9159 with PID 15213 started at Fri Jan 8 17:03:13 EST 2016 Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:14 EST 2016 ssl.sh: #10944: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:14 EST 2016 ssl.sh: #10945: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:15 EST 2016 ssl.sh: #10946: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:15 EST 2016 ssl.sh: #10947: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:16 EST 2016 ssl.sh: #10948: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:17 EST 2016 ssl.sh: #10949: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:17 EST 2016 ssl.sh: #10950: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:18 EST 2016 ssl.sh: #10951: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:18 EST 2016 ssl.sh: #10952: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:19 EST 2016 ssl.sh: #10953: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:19 EST 2016 ssl.sh: #10954: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:20 EST 2016 ssl.sh: #10955: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:21 EST 2016 ssl.sh: #10956: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:21 EST 2016 ================= CRL Reloaded ============= ssl.sh: #10957: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:22 EST 2016 ssl.sh: #10958: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:22 EST 2016 ssl.sh: #10959: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:23 EST 2016 ssl.sh: #10960: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:23 EST 2016 ssl.sh: #10961: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:24 EST 2016 ssl.sh: #10962: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:24 EST 2016 ssl.sh: #10963: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:25 EST 2016 ssl.sh: #10964: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:25 EST 2016 ssl.sh: #10965: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:26 EST 2016 ssl.sh: #10966: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:27 EST 2016 ssl.sh: #10967: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:27 EST 2016 ssl.sh: #10968: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:28 EST 2016 ssl.sh: #10969: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:28 EST 2016 ssl.sh: #10970: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:29 EST 2016 ================= CRL Reloaded ============= ssl.sh: #10971: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:29 EST 2016 ssl.sh: #10972: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:30 EST 2016 ssl.sh: #10973: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:30 EST 2016 ssl.sh: #10974: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:31 EST 2016 ssl.sh: #10975: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:32 EST 2016 ssl.sh: #10976: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:32 EST 2016 ssl.sh: #10977: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:33 EST 2016 ssl.sh: #10978: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:33 EST 2016 ssl.sh: #10979: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:34 EST 2016 ssl.sh: #10980: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:34 EST 2016 ssl.sh: #10981: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:35 EST 2016 ssl.sh: #10982: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:36 EST 2016 ssl.sh: #10983: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 15213 found at Fri Jan 8 17:03:36 EST 2016 ssl.sh: #10984: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 15213 at Fri Jan 8 17:03:36 EST 2016 kill -USR1 15213 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 15213 killed at Fri Jan 8 17:03:37 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:03:37 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:03:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:03:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #10985: Waiting for Server - FAILED kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:03:43 EST 2016 selfserv_9159 with PID 16649 started at Fri Jan 8 17:03:43 EST 2016 Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:03:43 EST 2016 ssl.sh: #10986: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:03:44 EST 2016 ssl.sh: #10987: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:03:44 EST 2016 ssl.sh: #10988: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:03:45 EST 2016 ssl.sh: #10989: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:03:45 EST 2016 ssl.sh: #10990: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:03:46 EST 2016 ssl.sh: #10991: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:03:46 EST 2016 ssl.sh: #10992: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:03:47 EST 2016 ssl.sh: #10993: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:03:48 EST 2016 ssl.sh: #10994: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:03:48 EST 2016 ssl.sh: #10995: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:03:49 EST 2016 ssl.sh: #10996: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:03:49 EST 2016 ssl.sh: #10997: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:03:50 EST 2016 ssl.sh: #10998: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:03:50 EST 2016 ================= CRL Reloaded ============= ssl.sh: #10999: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:03:51 EST 2016 ssl.sh: #11000: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:03:51 EST 2016 ssl.sh: #11001: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:03:52 EST 2016 ssl.sh: #11002: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:03:53 EST 2016 ssl.sh: #11003: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:03:53 EST 2016 ssl.sh: #11004: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:03:54 EST 2016 ssl.sh: #11005: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:03:54 EST 2016 ssl.sh: #11006: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:03:55 EST 2016 ssl.sh: #11007: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:03:55 EST 2016 ssl.sh: #11008: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:03:56 EST 2016 ssl.sh: #11009: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:03:57 EST 2016 ssl.sh: #11010: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:03:57 EST 2016 ssl.sh: #11011: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:03:58 EST 2016 ssl.sh: #11012: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:03:58 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11013: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:03:59 EST 2016 ssl.sh: #11014: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:03:59 EST 2016 ssl.sh: #11015: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:04:00 EST 2016 ssl.sh: #11016: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:04:00 EST 2016 ssl.sh: #11017: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:04:01 EST 2016 ssl.sh: #11018: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:04:02 EST 2016 ssl.sh: #11019: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:04:02 EST 2016 ssl.sh: #11020: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:04:03 EST 2016 ssl.sh: #11021: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:04:03 EST 2016 ssl.sh: #11022: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:04:04 EST 2016 ssl.sh: #11023: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:04:04 EST 2016 ssl.sh: #11024: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:04:05 EST 2016 ssl.sh: #11025: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16649 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16649 found at Fri Jan 8 17:04:06 EST 2016 ssl.sh: #11026: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 16649 at Fri Jan 8 17:04:06 EST 2016 kill -USR1 16649 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16649 killed at Fri Jan 8 17:04:06 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:04:06 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:04:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:04:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11027: Waiting for Server - FAILED kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:12 EST 2016 selfserv_9159 with PID 18085 started at Fri Jan 8 17:04:12 EST 2016 Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:13 EST 2016 ssl.sh: #11028: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:13 EST 2016 ssl.sh: #11029: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:14 EST 2016 ssl.sh: #11030: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:14 EST 2016 ssl.sh: #11031: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:15 EST 2016 ssl.sh: #11032: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:15 EST 2016 ssl.sh: #11033: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:16 EST 2016 ssl.sh: #11034: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:16 EST 2016 ssl.sh: #11035: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:17 EST 2016 ssl.sh: #11036: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:18 EST 2016 ssl.sh: #11037: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:18 EST 2016 ssl.sh: #11038: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:19 EST 2016 ssl.sh: #11039: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:19 EST 2016 ssl.sh: #11040: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:20 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11041: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:20 EST 2016 ssl.sh: #11042: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:21 EST 2016 ssl.sh: #11043: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:21 EST 2016 ssl.sh: #11044: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:22 EST 2016 ssl.sh: #11045: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:23 EST 2016 ssl.sh: #11046: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:23 EST 2016 ssl.sh: #11047: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:24 EST 2016 ssl.sh: #11048: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:24 EST 2016 ssl.sh: #11049: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:25 EST 2016 ssl.sh: #11050: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:25 EST 2016 ssl.sh: #11051: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:26 EST 2016 ssl.sh: #11052: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:26 EST 2016 ssl.sh: #11053: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:27 EST 2016 ssl.sh: #11054: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:28 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11055: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:28 EST 2016 ssl.sh: #11056: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:29 EST 2016 ssl.sh: #11057: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:29 EST 2016 ssl.sh: #11058: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:30 EST 2016 ssl.sh: #11059: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:30 EST 2016 ssl.sh: #11060: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:31 EST 2016 ssl.sh: #11061: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:31 EST 2016 ssl.sh: #11062: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:32 EST 2016 ssl.sh: #11063: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:33 EST 2016 ssl.sh: #11064: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:33 EST 2016 ssl.sh: #11065: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:34 EST 2016 ssl.sh: #11066: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:34 EST 2016 ssl.sh: #11067: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18085 found at Fri Jan 8 17:04:35 EST 2016 ssl.sh: #11068: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 18085 at Fri Jan 8 17:04:35 EST 2016 kill -USR1 18085 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18085 killed at Fri Jan 8 17:04:35 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:04:35 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:04:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:04:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11069: Waiting for Server - FAILED kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:41 EST 2016 selfserv_9159 with PID 19522 started at Fri Jan 8 17:04:41 EST 2016 Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:42 EST 2016 ssl.sh: #11070: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:42 EST 2016 ssl.sh: #11071: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:43 EST 2016 ssl.sh: #11072: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:44 EST 2016 ssl.sh: #11073: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:44 EST 2016 ssl.sh: #11074: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:45 EST 2016 ssl.sh: #11075: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:45 EST 2016 ssl.sh: #11076: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:46 EST 2016 ssl.sh: #11077: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:46 EST 2016 ssl.sh: #11078: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:47 EST 2016 ssl.sh: #11079: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:47 EST 2016 ssl.sh: #11080: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:48 EST 2016 ssl.sh: #11081: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:49 EST 2016 ssl.sh: #11082: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:49 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11083: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:50 EST 2016 ssl.sh: #11084: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:50 EST 2016 ssl.sh: #11085: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:51 EST 2016 ssl.sh: #11086: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:51 EST 2016 ssl.sh: #11087: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:52 EST 2016 ssl.sh: #11088: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:52 EST 2016 ssl.sh: #11089: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:53 EST 2016 ssl.sh: #11090: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:54 EST 2016 ssl.sh: #11091: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:54 EST 2016 ssl.sh: #11092: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:55 EST 2016 ssl.sh: #11093: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:55 EST 2016 ssl.sh: #11094: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:56 EST 2016 ssl.sh: #11095: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:56 EST 2016 ssl.sh: #11096: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:57 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11097: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:57 EST 2016 ssl.sh: #11098: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:58 EST 2016 ssl.sh: #11099: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:59 EST 2016 ssl.sh: #11100: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:04:59 EST 2016 ssl.sh: #11101: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:05:00 EST 2016 ssl.sh: #11102: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:05:00 EST 2016 ssl.sh: #11103: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:05:01 EST 2016 ssl.sh: #11104: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:05:01 EST 2016 ssl.sh: #11105: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:05:02 EST 2016 ssl.sh: #11106: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:05:03 EST 2016 ssl.sh: #11107: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:05:03 EST 2016 ssl.sh: #11108: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:05:04 EST 2016 ssl.sh: #11109: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19522 found at Fri Jan 8 17:05:04 EST 2016 ssl.sh: #11110: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 19522 at Fri Jan 8 17:05:04 EST 2016 kill -USR1 19522 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19522 killed at Fri Jan 8 17:05:05 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:05:05 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:05:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:05:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11111: Waiting for Server - FAILED kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:11 EST 2016 selfserv_9159 with PID 20960 started at Fri Jan 8 17:05:11 EST 2016 Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:11 EST 2016 ssl.sh: #11112: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:12 EST 2016 ssl.sh: #11113: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:12 EST 2016 ssl.sh: #11114: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:13 EST 2016 ssl.sh: #11115: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:13 EST 2016 ssl.sh: #11116: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:14 EST 2016 ssl.sh: #11117: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:15 EST 2016 ssl.sh: #11118: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:15 EST 2016 ssl.sh: #11119: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:16 EST 2016 ssl.sh: #11120: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:16 EST 2016 ssl.sh: #11121: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:17 EST 2016 ssl.sh: #11122: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:17 EST 2016 ssl.sh: #11123: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:18 EST 2016 ssl.sh: #11124: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:19 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11125: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:19 EST 2016 ssl.sh: #11126: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:20 EST 2016 ssl.sh: #11127: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:20 EST 2016 ssl.sh: #11128: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:21 EST 2016 ssl.sh: #11129: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:21 EST 2016 ssl.sh: #11130: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:22 EST 2016 ssl.sh: #11131: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:22 EST 2016 ssl.sh: #11132: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:23 EST 2016 ssl.sh: #11133: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:23 EST 2016 ssl.sh: #11134: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:24 EST 2016 ssl.sh: #11135: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:25 EST 2016 ssl.sh: #11136: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:25 EST 2016 ssl.sh: #11137: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:26 EST 2016 ssl.sh: #11138: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:26 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11139: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:27 EST 2016 ssl.sh: #11140: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:27 EST 2016 ssl.sh: #11141: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:28 EST 2016 ssl.sh: #11142: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:29 EST 2016 ssl.sh: #11143: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:29 EST 2016 ssl.sh: #11144: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:30 EST 2016 ssl.sh: #11145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:30 EST 2016 ssl.sh: #11146: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:31 EST 2016 ssl.sh: #11147: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:31 EST 2016 ssl.sh: #11148: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:32 EST 2016 ssl.sh: #11149: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:33 EST 2016 ssl.sh: #11150: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:33 EST 2016 ssl.sh: #11151: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20960 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20960 found at Fri Jan 8 17:05:34 EST 2016 ssl.sh: #11152: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 20960 at Fri Jan 8 17:05:34 EST 2016 kill -USR1 20960 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20960 killed at Fri Jan 8 17:05:34 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:05:34 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:05:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:05:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11153: Waiting for Server - FAILED kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:40 EST 2016 selfserv_9159 with PID 22396 started at Fri Jan 8 17:05:40 EST 2016 Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:41 EST 2016 ssl.sh: #11154: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:41 EST 2016 ssl.sh: #11155: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:42 EST 2016 ssl.sh: #11156: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:42 EST 2016 ssl.sh: #11157: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:43 EST 2016 ssl.sh: #11158: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:43 EST 2016 ssl.sh: #11159: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:44 EST 2016 ssl.sh: #11160: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:45 EST 2016 ssl.sh: #11161: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:45 EST 2016 ssl.sh: #11162: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:46 EST 2016 ssl.sh: #11163: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:46 EST 2016 ssl.sh: #11164: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:47 EST 2016 ssl.sh: #11165: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:47 EST 2016 ssl.sh: #11166: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:48 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11167: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:48 EST 2016 ssl.sh: #11168: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:49 EST 2016 ssl.sh: #11169: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:50 EST 2016 ssl.sh: #11170: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:50 EST 2016 ssl.sh: #11171: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:51 EST 2016 ssl.sh: #11172: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:51 EST 2016 ssl.sh: #11173: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:52 EST 2016 ssl.sh: #11174: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:52 EST 2016 ssl.sh: #11175: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:53 EST 2016 ssl.sh: #11176: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:54 EST 2016 ssl.sh: #11177: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:54 EST 2016 ssl.sh: #11178: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:55 EST 2016 ssl.sh: #11179: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:55 EST 2016 ssl.sh: #11180: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:56 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11181: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:56 EST 2016 ssl.sh: #11182: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:57 EST 2016 ssl.sh: #11183: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:57 EST 2016 ssl.sh: #11184: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:58 EST 2016 ssl.sh: #11185: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:59 EST 2016 ssl.sh: #11186: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:05:59 EST 2016 ssl.sh: #11187: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:06:00 EST 2016 ssl.sh: #11188: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:06:00 EST 2016 ssl.sh: #11189: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:06:01 EST 2016 ssl.sh: #11190: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:06:01 EST 2016 ssl.sh: #11191: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:06:02 EST 2016 ssl.sh: #11192: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:06:03 EST 2016 ssl.sh: #11193: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22396 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22396 found at Fri Jan 8 17:06:03 EST 2016 ssl.sh: #11194: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 22396 at Fri Jan 8 17:06:03 EST 2016 kill -USR1 22396 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22396 killed at Fri Jan 8 17:06:04 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:06:04 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:06:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:06:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11195: Waiting for Server - FAILED kill -0 23831 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23831 found at Fri Jan 8 17:06:10 EST 2016 selfserv_9159 with PID 23831 started at Fri Jan 8 17:06:10 EST 2016 trying to kill selfserv_9159 with PID 23831 at Fri Jan 8 17:06:10 EST 2016 kill -USR1 23831 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23831 killed at Fri Jan 8 17:06:10 EST 2016 selfserv_9159 starting at Fri Jan 8 17:06:10 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:06:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:06:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11196: Waiting for Server - FAILED kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:16 EST 2016 selfserv_9159 with PID 23885 started at Fri Jan 8 17:06:16 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:17 EST 2016 ssl.sh: #11197: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:17 EST 2016 ssl.sh: #11198: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:18 EST 2016 ssl.sh: #11199: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:18 EST 2016 ssl.sh: #11200: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:19 EST 2016 ssl.sh: #11201: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:19 EST 2016 ssl.sh: #11202: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:20 EST 2016 ssl.sh: #11203: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:20 EST 2016 ssl.sh: #11204: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:21 EST 2016 ssl.sh: #11205: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:22 EST 2016 ssl.sh: #11206: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:22 EST 2016 ssl.sh: #11207: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:23 EST 2016 ssl.sh: #11208: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:23 EST 2016 ssl.sh: #11209: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:24 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11210: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:24 EST 2016 ssl.sh: #11211: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:25 EST 2016 ssl.sh: #11212: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:25 EST 2016 ssl.sh: #11213: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:26 EST 2016 ssl.sh: #11214: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:27 EST 2016 ssl.sh: #11215: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:27 EST 2016 ssl.sh: #11216: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:28 EST 2016 ssl.sh: #11217: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:28 EST 2016 ssl.sh: #11218: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:29 EST 2016 ssl.sh: #11219: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:29 EST 2016 ssl.sh: #11220: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:30 EST 2016 ssl.sh: #11221: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:31 EST 2016 ssl.sh: #11222: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:31 EST 2016 ssl.sh: #11223: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:32 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11224: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:32 EST 2016 ssl.sh: #11225: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:33 EST 2016 ssl.sh: #11226: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:33 EST 2016 ssl.sh: #11227: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:34 EST 2016 ssl.sh: #11228: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:34 EST 2016 ssl.sh: #11229: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:35 EST 2016 ssl.sh: #11230: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:35 EST 2016 ssl.sh: #11231: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:36 EST 2016 ssl.sh: #11232: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:37 EST 2016 ssl.sh: #11233: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:37 EST 2016 ssl.sh: #11234: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:38 EST 2016 ssl.sh: #11235: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:38 EST 2016 ssl.sh: #11236: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23885 found at Fri Jan 8 17:06:39 EST 2016 ssl.sh: #11237: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 23885 at Fri Jan 8 17:06:39 EST 2016 kill -USR1 23885 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23885 killed at Fri Jan 8 17:06:39 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:06:40 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:06:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:06:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11238: Waiting for Server - FAILED kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:06:45 EST 2016 selfserv_9159 with PID 25328 started at Fri Jan 8 17:06:45 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:06:46 EST 2016 ssl.sh: #11239: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:06:46 EST 2016 ssl.sh: #11240: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:06:47 EST 2016 ssl.sh: #11241: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:06:48 EST 2016 ssl.sh: #11242: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:06:48 EST 2016 ssl.sh: #11243: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:06:49 EST 2016 ssl.sh: #11244: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:06:49 EST 2016 ssl.sh: #11245: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:06:50 EST 2016 ssl.sh: #11246: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:06:50 EST 2016 ssl.sh: #11247: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:06:51 EST 2016 ssl.sh: #11248: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:06:52 EST 2016 ssl.sh: #11249: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:06:52 EST 2016 ssl.sh: #11250: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:06:53 EST 2016 ssl.sh: #11251: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:06:53 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11252: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:06:54 EST 2016 ssl.sh: #11253: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:06:54 EST 2016 ssl.sh: #11254: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:06:55 EST 2016 ssl.sh: #11255: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:06:55 EST 2016 ssl.sh: #11256: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:06:56 EST 2016 ssl.sh: #11257: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:06:57 EST 2016 ssl.sh: #11258: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:06:57 EST 2016 ssl.sh: #11259: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:06:58 EST 2016 ssl.sh: #11260: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:06:58 EST 2016 ssl.sh: #11261: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:06:59 EST 2016 ssl.sh: #11262: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:06:59 EST 2016 ssl.sh: #11263: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:07:00 EST 2016 ssl.sh: #11264: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:07:01 EST 2016 ssl.sh: #11265: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:07:01 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11266: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:07:02 EST 2016 ssl.sh: #11267: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:07:02 EST 2016 ssl.sh: #11268: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:07:03 EST 2016 ssl.sh: #11269: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:07:03 EST 2016 ssl.sh: #11270: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:07:04 EST 2016 ssl.sh: #11271: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:07:04 EST 2016 ssl.sh: #11272: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:07:05 EST 2016 ssl.sh: #11273: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:07:06 EST 2016 ssl.sh: #11274: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:07:06 EST 2016 ssl.sh: #11275: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:07:07 EST 2016 ssl.sh: #11276: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:07:07 EST 2016 ssl.sh: #11277: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:07:08 EST 2016 ssl.sh: #11278: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25328 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25328 found at Fri Jan 8 17:07:08 EST 2016 ssl.sh: #11279: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 25328 at Fri Jan 8 17:07:08 EST 2016 kill -USR1 25328 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25328 killed at Fri Jan 8 17:07:09 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:07:09 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:07:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:07:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11280: Waiting for Server - FAILED kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:15 EST 2016 selfserv_9159 with PID 26763 started at Fri Jan 8 17:07:15 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:15 EST 2016 ssl.sh: #11281: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:16 EST 2016 ssl.sh: #11282: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:16 EST 2016 ssl.sh: #11283: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:17 EST 2016 ssl.sh: #11284: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:18 EST 2016 ssl.sh: #11285: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:18 EST 2016 ssl.sh: #11286: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:19 EST 2016 ssl.sh: #11287: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:19 EST 2016 ssl.sh: #11288: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:20 EST 2016 ssl.sh: #11289: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:20 EST 2016 ssl.sh: #11290: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:21 EST 2016 ssl.sh: #11291: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:22 EST 2016 ssl.sh: #11292: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:22 EST 2016 ssl.sh: #11293: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:23 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11294: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:23 EST 2016 ssl.sh: #11295: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:24 EST 2016 ssl.sh: #11296: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:24 EST 2016 ssl.sh: #11297: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:25 EST 2016 ssl.sh: #11298: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:25 EST 2016 ssl.sh: #11299: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:26 EST 2016 ssl.sh: #11300: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:27 EST 2016 ssl.sh: #11301: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:27 EST 2016 ssl.sh: #11302: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:28 EST 2016 ssl.sh: #11303: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:28 EST 2016 ssl.sh: #11304: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:29 EST 2016 ssl.sh: #11305: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:29 EST 2016 ssl.sh: #11306: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:30 EST 2016 ssl.sh: #11307: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:31 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11308: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:31 EST 2016 ssl.sh: #11309: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:32 EST 2016 ssl.sh: #11310: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:32 EST 2016 ssl.sh: #11311: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:33 EST 2016 ssl.sh: #11312: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:33 EST 2016 ssl.sh: #11313: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:34 EST 2016 ssl.sh: #11314: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:34 EST 2016 ssl.sh: #11315: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:35 EST 2016 ssl.sh: #11316: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:35 EST 2016 ssl.sh: #11317: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:36 EST 2016 ssl.sh: #11318: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:37 EST 2016 ssl.sh: #11319: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:37 EST 2016 ssl.sh: #11320: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26763 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26763 found at Fri Jan 8 17:07:38 EST 2016 ssl.sh: #11321: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 26763 at Fri Jan 8 17:07:38 EST 2016 kill -USR1 26763 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26763 killed at Fri Jan 8 17:07:38 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:07:38 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:07:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:07:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11322: Waiting for Server - FAILED kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:07:44 EST 2016 selfserv_9159 with PID 28203 started at Fri Jan 8 17:07:44 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:07:45 EST 2016 ssl.sh: #11323: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:07:45 EST 2016 ssl.sh: #11324: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:07:46 EST 2016 ssl.sh: #11325: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:07:46 EST 2016 ssl.sh: #11326: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:07:47 EST 2016 ssl.sh: #11327: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:07:48 EST 2016 ssl.sh: #11328: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:07:48 EST 2016 ssl.sh: #11329: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:07:49 EST 2016 ssl.sh: #11330: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:07:49 EST 2016 ssl.sh: #11331: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:07:50 EST 2016 ssl.sh: #11332: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:07:50 EST 2016 ssl.sh: #11333: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:07:51 EST 2016 ssl.sh: #11334: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:07:52 EST 2016 ssl.sh: #11335: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:07:52 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11336: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:07:53 EST 2016 ssl.sh: #11337: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:07:53 EST 2016 ssl.sh: #11338: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:07:54 EST 2016 ssl.sh: #11339: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:07:54 EST 2016 ssl.sh: #11340: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:07:55 EST 2016 ssl.sh: #11341: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:07:55 EST 2016 ssl.sh: #11342: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:07:56 EST 2016 ssl.sh: #11343: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:07:57 EST 2016 ssl.sh: #11344: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:07:57 EST 2016 ssl.sh: #11345: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:07:58 EST 2016 ssl.sh: #11346: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:07:58 EST 2016 ssl.sh: #11347: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:07:59 EST 2016 ssl.sh: #11348: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:07:59 EST 2016 ssl.sh: #11349: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:08:00 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11350: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:08:00 EST 2016 ssl.sh: #11351: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:08:01 EST 2016 ssl.sh: #11352: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:08:02 EST 2016 ssl.sh: #11353: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:08:02 EST 2016 ssl.sh: #11354: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:08:03 EST 2016 ssl.sh: #11355: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:08:03 EST 2016 ssl.sh: #11356: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:08:04 EST 2016 ssl.sh: #11357: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:08:04 EST 2016 ssl.sh: #11358: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:08:05 EST 2016 ssl.sh: #11359: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:08:06 EST 2016 ssl.sh: #11360: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:08:06 EST 2016 ssl.sh: #11361: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:08:07 EST 2016 ssl.sh: #11362: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28203 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28203 found at Fri Jan 8 17:08:07 EST 2016 ssl.sh: #11363: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 28203 at Fri Jan 8 17:08:07 EST 2016 kill -USR1 28203 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28203 killed at Fri Jan 8 17:08:08 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:08:08 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:08:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:08:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11364: Waiting for Server - FAILED kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:14 EST 2016 selfserv_9159 with PID 29638 started at Fri Jan 8 17:08:14 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:14 EST 2016 ssl.sh: #11365: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:15 EST 2016 ssl.sh: #11366: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:15 EST 2016 ssl.sh: #11367: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:16 EST 2016 ssl.sh: #11368: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:16 EST 2016 ssl.sh: #11369: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:17 EST 2016 ssl.sh: #11370: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:18 EST 2016 ssl.sh: #11371: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:18 EST 2016 ssl.sh: #11372: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:19 EST 2016 ssl.sh: #11373: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:19 EST 2016 ssl.sh: #11374: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:20 EST 2016 ssl.sh: #11375: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:20 EST 2016 ssl.sh: #11376: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:21 EST 2016 ssl.sh: #11377: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:22 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11378: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:22 EST 2016 ssl.sh: #11379: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:23 EST 2016 ssl.sh: #11380: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:23 EST 2016 ssl.sh: #11381: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:24 EST 2016 ssl.sh: #11382: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:24 EST 2016 ssl.sh: #11383: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:25 EST 2016 ssl.sh: #11384: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:25 EST 2016 ssl.sh: #11385: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:26 EST 2016 ssl.sh: #11386: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:27 EST 2016 ssl.sh: #11387: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:27 EST 2016 ssl.sh: #11388: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:28 EST 2016 ssl.sh: #11389: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:28 EST 2016 ssl.sh: #11390: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:29 EST 2016 ssl.sh: #11391: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:29 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11392: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:30 EST 2016 ssl.sh: #11393: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:30 EST 2016 ssl.sh: #11394: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:31 EST 2016 ssl.sh: #11395: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:32 EST 2016 ssl.sh: #11396: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:32 EST 2016 ssl.sh: #11397: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:33 EST 2016 ssl.sh: #11398: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:33 EST 2016 ssl.sh: #11399: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:34 EST 2016 ssl.sh: #11400: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:34 EST 2016 ssl.sh: #11401: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:35 EST 2016 ssl.sh: #11402: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:36 EST 2016 ssl.sh: #11403: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:36 EST 2016 ssl.sh: #11404: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29638 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29638 found at Fri Jan 8 17:08:37 EST 2016 ssl.sh: #11405: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 29638 at Fri Jan 8 17:08:37 EST 2016 kill -USR1 29638 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 29638 killed at Fri Jan 8 17:08:37 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:08:37 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:08:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:08:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11406: Waiting for Server - FAILED kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:08:43 EST 2016 selfserv_9159 with PID 31075 started at Fri Jan 8 17:08:43 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:08:44 EST 2016 ssl.sh: #11407: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:08:44 EST 2016 ssl.sh: #11408: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:08:45 EST 2016 ssl.sh: #11409: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:08:45 EST 2016 ssl.sh: #11410: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:08:46 EST 2016 ssl.sh: #11411: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:08:46 EST 2016 ssl.sh: #11412: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:08:47 EST 2016 ssl.sh: #11413: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:08:48 EST 2016 ssl.sh: #11414: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:08:48 EST 2016 ssl.sh: #11415: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:08:49 EST 2016 ssl.sh: #11416: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:08:49 EST 2016 ssl.sh: #11417: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:08:50 EST 2016 ssl.sh: #11418: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:08:51 EST 2016 ssl.sh: #11419: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:08:51 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11420: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:08:52 EST 2016 ssl.sh: #11421: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:08:52 EST 2016 ssl.sh: #11422: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:08:53 EST 2016 ssl.sh: #11423: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:08:53 EST 2016 ssl.sh: #11424: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:08:54 EST 2016 ssl.sh: #11425: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:08:54 EST 2016 ssl.sh: #11426: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:08:55 EST 2016 ssl.sh: #11427: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:08:55 EST 2016 ssl.sh: #11428: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:08:56 EST 2016 ssl.sh: #11429: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:08:57 EST 2016 ssl.sh: #11430: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:08:57 EST 2016 ssl.sh: #11431: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:08:58 EST 2016 ssl.sh: #11432: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:08:58 EST 2016 ssl.sh: #11433: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:08:59 EST 2016 ================= CRL Reloaded ============= ssl.sh: #11434: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:08:59 EST 2016 ssl.sh: #11435: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:09:00 EST 2016 ssl.sh: #11436: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:09:01 EST 2016 ssl.sh: #11437: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:09:01 EST 2016 ssl.sh: #11438: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:09:02 EST 2016 ssl.sh: #11439: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:09:02 EST 2016 ssl.sh: #11440: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:09:03 EST 2016 ssl.sh: #11441: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:09:03 EST 2016 ssl.sh: #11442: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:09:04 EST 2016 ssl.sh: #11443: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:09:04 EST 2016 ssl.sh: #11444: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:09:05 EST 2016 ssl.sh: #11445: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:09:06 EST 2016 ssl.sh: #11446: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31075 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31075 found at Fri Jan 8 17:09:06 EST 2016 ssl.sh: #11447: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 31075 at Fri Jan 8 17:09:06 EST 2016 kill -USR1 31075 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 31075 killed at Fri Jan 8 17:09:07 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:09:07 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:09:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:09:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11448: Waiting for Server - FAILED kill -0 32510 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32510 found at Fri Jan 8 17:09:13 EST 2016 selfserv_9159 with PID 32510 started at Fri Jan 8 17:09:13 EST 2016 trying to kill selfserv_9159 with PID 32510 at Fri Jan 8 17:09:13 EST 2016 kill -USR1 32510 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 32510 killed at Fri Jan 8 17:09:13 EST 2016 ssl.sh: SSL Cert Status (OCSP Stapling) - server bypass/client bypass - with ECC =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9159 starting at Fri Jan 8 17:09:13 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T good \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:09:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:09:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11449: Waiting for Server - FAILED kill -0 32570 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32570 found at Fri Jan 8 17:09:19 EST 2016 selfserv_9159 with PID 32570 started at Fri Jan 8 17:09:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #11450: OCSP stapling, signed response, good status produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 32570 at Fri Jan 8 17:09:20 EST 2016 kill -USR1 32570 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 32570 killed at Fri Jan 8 17:09:20 EST 2016 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9159 starting at Fri Jan 8 17:09:20 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T revoked \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:09:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:09:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11451: Waiting for Server - FAILED kill -0 32632 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32632 found at Fri Jan 8 17:09:26 EST 2016 selfserv_9159 with PID 32632 started at Fri Jan 8 17:09:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #11452: OCSP stapling, signed response, revoked status produced a returncode of 1, expected is 3 - FAILED trying to kill selfserv_9159 with PID 32632 at Fri Jan 8 17:09:27 EST 2016 kill -USR1 32632 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 32632 killed at Fri Jan 8 17:09:27 EST 2016 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9159 starting at Fri Jan 8 17:09:27 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T unknown \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:09:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:09:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11453: Waiting for Server - FAILED kill -0 32693 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32693 found at Fri Jan 8 17:09:33 EST 2016 selfserv_9159 with PID 32693 started at Fri Jan 8 17:09:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #11454: OCSP stapling, signed response, unknown status produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9159 with PID 32693 at Fri Jan 8 17:09:33 EST 2016 kill -USR1 32693 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 32693 killed at Fri Jan 8 17:09:34 EST 2016 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9159 starting at Fri Jan 8 17:09:34 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T failure \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:09:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:09:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11455: Waiting for Server - FAILED kill -0 32754 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 32754 found at Fri Jan 8 17:09:40 EST 2016 selfserv_9159 with PID 32754 started at Fri Jan 8 17:09:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #11456: OCSP stapling, unsigned failure response produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9159 with PID 32754 at Fri Jan 8 17:09:40 EST 2016 kill -USR1 32754 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 32754 killed at Fri Jan 8 17:09:41 EST 2016 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9159 starting at Fri Jan 8 17:09:41 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T badsig \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:09:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:09:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11457: Waiting for Server - FAILED kill -0 348 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 348 found at Fri Jan 8 17:09:47 EST 2016 selfserv_9159 with PID 348 started at Fri Jan 8 17:09:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #11458: OCSP stapling, good status, bad signature produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9159 with PID 348 at Fri Jan 8 17:09:47 EST 2016 kill -USR1 348 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 348 killed at Fri Jan 8 17:09:48 EST 2016 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9159 starting at Fri Jan 8 17:09:48 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T corrupted \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:09:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:09:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11459: Waiting for Server - FAILED kill -0 412 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 412 found at Fri Jan 8 17:09:54 EST 2016 selfserv_9159 with PID 412 started at Fri Jan 8 17:09:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #11460: OCSP stapling, invalid cert status data produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9159 with PID 412 at Fri Jan 8 17:09:54 EST 2016 kill -USR1 412 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 412 killed at Fri Jan 8 17:09:54 EST 2016 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9159 starting at Fri Jan 8 17:09:55 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:09:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:10:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11461: Waiting for Server - FAILED kill -0 481 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 481 found at Fri Jan 8 17:10:00 EST 2016 selfserv_9159 with PID 481 started at Fri Jan 8 17:10:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #11462: Valid cert, Server doesn't staple produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9159 with PID 481 at Fri Jan 8 17:10:01 EST 2016 kill -USR1 481 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 481 killed at Fri Jan 8 17:10:01 EST 2016 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9159 starting at Fri Jan 8 17:10:01 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T random \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:10:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:10:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11463: Waiting for Server - FAILED kill -0 556 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 556 found at Fri Jan 8 17:10:07 EST 2016 selfserv_9159 with PID 556 started at Fri Jan 8 17:10:07 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss \ -c 1000 -V ssl3: -N -T localhost.localdomain strsclnt started at Fri Jan 8 17:10:07 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:10:08 EST 2016 ssl.sh: #11464: Stress OCSP stapling, server uses random status produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 556 at Fri Jan 8 17:10:08 EST 2016 kill -USR1 556 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 556 killed at Fri Jan 8 17:10:08 EST 2016 ssl.sh: SSL Stress Test - server bypass/client bypass - with ECC =============================== ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9159 starting at Fri Jan 8 17:10:09 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:10:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:10:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11465: Waiting for Server - FAILED kill -0 713 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 713 found at Fri Jan 8 17:10:15 EST 2016 selfserv_9159 with PID 713 started at Fri Jan 8 17:10:15 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -c 1000 -C c -V :ssl3 \ localhost.localdomain strsclnt started at Fri Jan 8 17:10:15 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:10:15 EST 2016 ssl.sh: #11466: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 713 at Fri Jan 8 17:10:15 EST 2016 kill -USR1 713 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 713 killed at Fri Jan 8 17:10:16 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9159 starting at Fri Jan 8 17:10:16 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:10:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:10:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11467: Waiting for Server - FAILED kill -0 792 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 792 found at Fri Jan 8 17:10:22 EST 2016 selfserv_9159 with PID 792 started at Fri Jan 8 17:10:22 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Fri Jan 8 17:10:22 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:10:22 EST 2016 ssl.sh: #11468: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 792 at Fri Jan 8 17:10:22 EST 2016 kill -USR1 792 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 792 killed at Fri Jan 8 17:10:23 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9159 starting at Fri Jan 8 17:10:23 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:10:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:10:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11469: Waiting for Server - FAILED kill -0 872 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 872 found at Fri Jan 8 17:10:29 EST 2016 selfserv_9159 with PID 872 started at Fri Jan 8 17:10:29 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Fri Jan 8 17:10:29 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:10:29 EST 2016 ssl.sh: #11470: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 872 at Fri Jan 8 17:10:29 EST 2016 kill -USR1 872 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 872 killed at Fri Jan 8 17:10:30 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9159 starting at Fri Jan 8 17:10:30 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:10:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:10:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11471: Waiting for Server - FAILED kill -0 951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 951 found at Fri Jan 8 17:10:36 EST 2016 selfserv_9159 with PID 951 started at Fri Jan 8 17:10:36 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 17:10:36 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:10:36 EST 2016 ssl.sh: #11472: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 951 at Fri Jan 8 17:10:37 EST 2016 kill -USR1 951 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 951 killed at Fri Jan 8 17:10:37 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9159 starting at Fri Jan 8 17:10:37 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:10:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:10:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11473: Waiting for Server - FAILED kill -0 1030 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1030 found at Fri Jan 8 17:10:43 EST 2016 selfserv_9159 with PID 1030 started at Fri Jan 8 17:10:43 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Fri Jan 8 17:10:43 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:10:44 EST 2016 ssl.sh: #11474: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 1030 at Fri Jan 8 17:10:44 EST 2016 kill -USR1 1030 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1030 killed at Fri Jan 8 17:10:44 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9159 starting at Fri Jan 8 17:10:44 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:10:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:10:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11475: Waiting for Server - FAILED kill -0 1110 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1110 found at Fri Jan 8 17:10:50 EST 2016 selfserv_9159 with PID 1110 started at Fri Jan 8 17:10:50 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 17:10:50 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:10:51 EST 2016 ssl.sh: #11476: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 1110 at Fri Jan 8 17:10:51 EST 2016 kill -USR1 1110 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1110 killed at Fri Jan 8 17:10:51 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9159 starting at Fri Jan 8 17:10:51 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:10:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:10:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11477: Waiting for Server - FAILED kill -0 1189 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1189 found at Fri Jan 8 17:10:57 EST 2016 selfserv_9159 with PID 1189 started at Fri Jan 8 17:10:57 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 17:10:57 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:10:58 EST 2016 ssl.sh: #11478: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 1189 at Fri Jan 8 17:10:58 EST 2016 kill -USR1 1189 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1189 killed at Fri Jan 8 17:10:58 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9159 starting at Fri Jan 8 17:10:58 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:10:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:11:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11479: Waiting for Server - FAILED kill -0 1275 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1275 found at Fri Jan 8 17:11:04 EST 2016 selfserv_9159 with PID 1275 started at Fri Jan 8 17:11:04 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 17:11:04 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:11:05 EST 2016 ssl.sh: #11480: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 1275 at Fri Jan 8 17:11:05 EST 2016 kill -USR1 1275 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1275 killed at Fri Jan 8 17:11:05 EST 2016 ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 17:11:06 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:11:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:11:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11481: Waiting for Server - FAILED kill -0 1382 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1382 found at Fri Jan 8 17:11:11 EST 2016 selfserv_9159 with PID 1382 started at Fri Jan 8 17:11:11 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -c 100 -C c -V :ssl3 -N -n TestUser \ localhost.localdomain strsclnt started at Fri Jan 8 17:11:12 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:11:12 EST 2016 ssl.sh: #11482: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 1382 at Fri Jan 8 17:11:12 EST 2016 kill -USR1 1382 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1382 killed at Fri Jan 8 17:11:13 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 17:11:13 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:11:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:11:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11483: Waiting for Server - FAILED kill -0 1461 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1461 found at Fri Jan 8 17:11:19 EST 2016 selfserv_9159 with PID 1461 started at Fri Jan 8 17:11:19 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Fri Jan 8 17:11:19 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:11:19 EST 2016 ssl.sh: #11484: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 1461 at Fri Jan 8 17:11:19 EST 2016 kill -USR1 1461 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1461 killed at Fri Jan 8 17:11:20 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9159 starting at Fri Jan 8 17:11:20 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:11:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:11:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11485: Waiting for Server - FAILED kill -0 1542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1542 found at Fri Jan 8 17:11:26 EST 2016 selfserv_9159 with PID 1542 started at Fri Jan 8 17:11:26 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Fri Jan 8 17:11:26 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:11:26 EST 2016 ssl.sh: #11486: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 1542 at Fri Jan 8 17:11:26 EST 2016 kill -USR1 1542 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1542 killed at Fri Jan 8 17:11:27 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9159 starting at Fri Jan 8 17:11:27 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:11:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:11:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11487: Waiting for Server - FAILED kill -0 1621 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1621 found at Fri Jan 8 17:11:33 EST 2016 selfserv_9159 with PID 1621 started at Fri Jan 8 17:11:33 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Fri Jan 8 17:11:33 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:11:33 EST 2016 ssl.sh: #11488: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 1621 at Fri Jan 8 17:11:33 EST 2016 kill -USR1 1621 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1621 killed at Fri Jan 8 17:11:34 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9159 starting at Fri Jan 8 17:11:34 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:11:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:11:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11489: Waiting for Server - FAILED kill -0 1700 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1700 found at Fri Jan 8 17:11:40 EST 2016 selfserv_9159 with PID 1700 started at Fri Jan 8 17:11:40 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 17:11:40 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:11:40 EST 2016 ssl.sh: #11490: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 1700 at Fri Jan 8 17:11:41 EST 2016 kill -USR1 1700 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1700 killed at Fri Jan 8 17:11:41 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9159 starting at Fri Jan 8 17:11:41 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:11:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:11:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11491: Waiting for Server - FAILED kill -0 1780 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1780 found at Fri Jan 8 17:11:47 EST 2016 selfserv_9159 with PID 1780 started at Fri Jan 8 17:11:47 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 17:11:47 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:11:48 EST 2016 ssl.sh: #11492: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 1780 at Fri Jan 8 17:11:48 EST 2016 kill -USR1 1780 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1780 killed at Fri Jan 8 17:11:48 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9159 starting at Fri Jan 8 17:11:48 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:11:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:11:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11493: Waiting for Server - FAILED kill -0 1859 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1859 found at Fri Jan 8 17:11:54 EST 2016 selfserv_9159 with PID 1859 started at Fri Jan 8 17:11:54 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 17:11:54 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:11:55 EST 2016 ssl.sh: #11494: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 1859 at Fri Jan 8 17:11:55 EST 2016 kill -USR1 1859 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1859 killed at Fri Jan 8 17:11:55 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9159 starting at Fri Jan 8 17:11:55 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:11:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:12:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11495: Waiting for Server - FAILED kill -0 1944 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1944 found at Fri Jan 8 17:12:01 EST 2016 selfserv_9159 with PID 1944 started at Fri Jan 8 17:12:01 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 17:12:01 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:12:02 EST 2016 ssl.sh: #11496: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 1944 at Fri Jan 8 17:12:02 EST 2016 kill -USR1 1944 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1944 killed at Fri Jan 8 17:12:02 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9159 starting at Fri Jan 8 17:12:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:12:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:12:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11497: Waiting for Server - FAILED kill -0 2030 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2030 found at Fri Jan 8 17:12:08 EST 2016 selfserv_9159 with PID 2030 started at Fri Jan 8 17:12:08 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Fri Jan 8 17:12:08 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:12:09 EST 2016 ssl.sh: #11498: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 2030 at Fri Jan 8 17:12:09 EST 2016 kill -USR1 2030 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2030 killed at Fri Jan 8 17:12:09 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 17:12:10 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:12:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:12:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11499: Waiting for Server - FAILED kill -0 2130 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2130 found at Fri Jan 8 17:12:15 EST 2016 selfserv_9159 with PID 2130 started at Fri Jan 8 17:12:16 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Fri Jan 8 17:12:16 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:12:16 EST 2016 ssl.sh: #11500: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 2130 at Fri Jan 8 17:12:16 EST 2016 kill -USR1 2130 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2130 killed at Fri Jan 8 17:12:17 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 17:12:17 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:12:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:12:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11501: Waiting for Server - FAILED kill -0 2209 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2209 found at Fri Jan 8 17:12:23 EST 2016 selfserv_9159 with PID 2209 started at Fri Jan 8 17:12:23 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Fri Jan 8 17:12:23 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:12:23 EST 2016 ssl.sh: #11502: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 2209 at Fri Jan 8 17:12:23 EST 2016 kill -USR1 2209 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2209 killed at Fri Jan 8 17:12:24 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9159 starting at Fri Jan 8 17:12:24 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:12:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:12:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11503: Waiting for Server - FAILED kill -0 2289 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2289 found at Fri Jan 8 17:12:30 EST 2016 selfserv_9159 with PID 2289 started at Fri Jan 8 17:12:30 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Fri Jan 8 17:12:30 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:12:30 EST 2016 ssl.sh: #11504: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 2289 at Fri Jan 8 17:12:30 EST 2016 kill -USR1 2289 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2289 killed at Fri Jan 8 17:12:31 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 17:12:31 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:12:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:12:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11505: Waiting for Server - FAILED kill -0 2368 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2368 found at Fri Jan 8 17:12:37 EST 2016 selfserv_9159 with PID 2368 started at Fri Jan 8 17:12:37 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Fri Jan 8 17:12:37 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:12:37 EST 2016 ssl.sh: #11506: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 2368 at Fri Jan 8 17:12:37 EST 2016 kill -USR1 2368 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2368 killed at Fri Jan 8 17:12:38 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 17:12:38 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:12:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:12:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11507: Waiting for Server - FAILED kill -0 2447 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2447 found at Fri Jan 8 17:12:44 EST 2016 selfserv_9159 with PID 2447 started at Fri Jan 8 17:12:44 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Fri Jan 8 17:12:44 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:12:44 EST 2016 ssl.sh: #11508: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 2447 at Fri Jan 8 17:12:44 EST 2016 kill -USR1 2447 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2447 killed at Fri Jan 8 17:12:45 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9159 starting at Fri Jan 8 17:12:45 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:12:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:12:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11509: Waiting for Server - FAILED kill -0 2527 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2527 found at Fri Jan 8 17:12:51 EST 2016 selfserv_9159 with PID 2527 started at Fri Jan 8 17:12:51 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Fri Jan 8 17:12:51 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:12:51 EST 2016 ssl.sh: #11510: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 2527 at Fri Jan 8 17:12:52 EST 2016 kill -USR1 2527 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2527 killed at Fri Jan 8 17:12:52 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9159 starting at Fri Jan 8 17:12:52 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:12:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:12:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11511: Waiting for Server - FAILED kill -0 2606 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2606 found at Fri Jan 8 17:12:58 EST 2016 selfserv_9159 with PID 2606 started at Fri Jan 8 17:12:58 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Fri Jan 8 17:12:58 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:12:59 EST 2016 ssl.sh: #11512: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 2606 at Fri Jan 8 17:12:59 EST 2016 kill -USR1 2606 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2606 killed at Fri Jan 8 17:12:59 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9159 starting at Fri Jan 8 17:12:59 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:12:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:13:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11513: Waiting for Server - FAILED kill -0 2685 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2685 found at Fri Jan 8 17:13:05 EST 2016 selfserv_9159 with PID 2685 started at Fri Jan 8 17:13:05 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Fri Jan 8 17:13:05 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:13:06 EST 2016 ssl.sh: #11514: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 2685 at Fri Jan 8 17:13:06 EST 2016 kill -USR1 2685 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2685 killed at Fri Jan 8 17:13:06 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9159 starting at Fri Jan 8 17:13:06 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:13:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:13:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11515: Waiting for Server - FAILED kill -0 2766 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2766 found at Fri Jan 8 17:13:12 EST 2016 selfserv_9159 with PID 2766 started at Fri Jan 8 17:13:12 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Fri Jan 8 17:13:12 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:13:13 EST 2016 ssl.sh: #11516: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 2766 at Fri Jan 8 17:13:13 EST 2016 kill -USR1 2766 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2766 killed at Fri Jan 8 17:13:13 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9159 starting at Fri Jan 8 17:13:13 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:13:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:13:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11517: Waiting for Server - FAILED kill -0 2845 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2845 found at Fri Jan 8 17:13:19 EST 2016 selfserv_9159 with PID 2845 started at Fri Jan 8 17:13:19 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Fri Jan 8 17:13:19 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:13:20 EST 2016 ssl.sh: #11518: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 2845 at Fri Jan 8 17:13:20 EST 2016 kill -USR1 2845 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2845 killed at Fri Jan 8 17:13:20 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 17:13:20 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:13:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:13:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11519: Waiting for Server - FAILED kill -0 2945 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 2945 found at Fri Jan 8 17:13:26 EST 2016 selfserv_9159 with PID 2945 started at Fri Jan 8 17:13:26 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C009 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 17:13:26 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:13:27 EST 2016 ssl.sh: #11520: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 2945 at Fri Jan 8 17:13:27 EST 2016 kill -USR1 2945 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 2945 killed at Fri Jan 8 17:13:27 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:13:28 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:13:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:13:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11521: Waiting for Server - FAILED kill -0 3025 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3025 found at Fri Jan 8 17:13:33 EST 2016 selfserv_9159 with PID 3025 started at Fri Jan 8 17:13:34 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 17:13:34 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:13:34 EST 2016 ssl.sh: #11522: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 3025 at Fri Jan 8 17:13:34 EST 2016 kill -USR1 3025 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3025 killed at Fri Jan 8 17:13:35 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 17:13:35 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:13:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:13:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11523: Waiting for Server - FAILED kill -0 3104 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3104 found at Fri Jan 8 17:13:41 EST 2016 selfserv_9159 with PID 3104 started at Fri Jan 8 17:13:41 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C004 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 17:13:41 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:13:41 EST 2016 ssl.sh: #11524: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 3104 at Fri Jan 8 17:13:41 EST 2016 kill -USR1 3104 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3104 killed at Fri Jan 8 17:13:42 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 17:13:42 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:13:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:13:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11525: Waiting for Server - FAILED kill -0 3183 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3183 found at Fri Jan 8 17:13:48 EST 2016 selfserv_9159 with PID 3183 started at Fri Jan 8 17:13:48 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C00E -N -n TestUser-ecmixed \ localhost.localdomain strsclnt started at Fri Jan 8 17:13:48 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:13:48 EST 2016 ssl.sh: #11526: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 3183 at Fri Jan 8 17:13:48 EST 2016 kill -USR1 3183 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3183 killed at Fri Jan 8 17:13:49 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9159 starting at Fri Jan 8 17:13:49 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:13:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:13:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11527: Waiting for Server - FAILED kill -0 3263 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3263 found at Fri Jan 8 17:13:55 EST 2016 selfserv_9159 with PID 3263 started at Fri Jan 8 17:13:55 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 17:13:55 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:13:55 EST 2016 ssl.sh: #11528: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 3263 at Fri Jan 8 17:13:55 EST 2016 kill -USR1 3263 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3263 killed at Fri Jan 8 17:13:56 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9159 starting at Fri Jan 8 17:13:56 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:13:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:14:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11529: Waiting for Server - FAILED kill -0 3342 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3342 found at Fri Jan 8 17:14:02 EST 2016 selfserv_9159 with PID 3342 started at Fri Jan 8 17:14:02 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \ localhost.localdomain strsclnt started at Fri Jan 8 17:14:02 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:14:03 EST 2016 ssl.sh: #11530: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 3342 at Fri Jan 8 17:14:03 EST 2016 kill -USR1 3342 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3342 killed at Fri Jan 8 17:14:03 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 17:14:03 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:14:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:14:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11531: Waiting for Server - FAILED kill -0 3443 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3443 found at Fri Jan 8 17:14:09 EST 2016 selfserv_9159 with PID 3443 started at Fri Jan 8 17:14:09 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Fri Jan 8 17:14:09 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:14:10 EST 2016 ssl.sh: #11532: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 3443 at Fri Jan 8 17:14:10 EST 2016 kill -USR1 3443 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3443 killed at Fri Jan 8 17:14:10 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9159 starting at Fri Jan 8 17:14:10 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:14:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:14:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11533: Waiting for Server - FAILED kill -0 3522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3522 found at Fri Jan 8 17:14:16 EST 2016 selfserv_9159 with PID 3522 started at Fri Jan 8 17:14:16 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Fri Jan 8 17:14:16 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:14:17 EST 2016 ssl.sh: #11534: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 3522 at Fri Jan 8 17:14:17 EST 2016 kill -USR1 3522 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3522 killed at Fri Jan 8 17:14:17 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 17:14:17 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:14:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:14:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11535: Waiting for Server - FAILED kill -0 3601 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3601 found at Fri Jan 8 17:14:23 EST 2016 selfserv_9159 with PID 3601 started at Fri Jan 8 17:14:23 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Fri Jan 8 17:14:23 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:14:24 EST 2016 ssl.sh: #11536: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 3601 at Fri Jan 8 17:14:24 EST 2016 kill -USR1 3601 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3601 killed at Fri Jan 8 17:14:24 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 17:14:24 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:14:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:14:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11537: Waiting for Server - FAILED kill -0 3681 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3681 found at Fri Jan 8 17:14:30 EST 2016 selfserv_9159 with PID 3681 started at Fri Jan 8 17:14:30 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Fri Jan 8 17:14:30 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:14:31 EST 2016 ssl.sh: #11538: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 3681 at Fri Jan 8 17:14:31 EST 2016 kill -USR1 3681 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3681 killed at Fri Jan 8 17:14:31 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 17:14:32 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:14:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:14:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11539: Waiting for Server - FAILED kill -0 3774 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3774 found at Fri Jan 8 17:14:37 EST 2016 selfserv_9159 with PID 3774 started at Fri Jan 8 17:14:38 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Fri Jan 8 17:14:38 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:14:38 EST 2016 ssl.sh: #11540: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 3774 at Fri Jan 8 17:14:38 EST 2016 kill -USR1 3774 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3774 killed at Fri Jan 8 17:14:39 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9159 starting at Fri Jan 8 17:14:39 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:14:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:14:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11541: Waiting for Server - FAILED kill -0 3868 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3868 found at Fri Jan 8 17:14:45 EST 2016 selfserv_9159 with PID 3868 started at Fri Jan 8 17:14:45 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Fri Jan 8 17:14:45 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:14:45 EST 2016 ssl.sh: #11542: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 3868 at Fri Jan 8 17:14:45 EST 2016 kill -USR1 3868 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3868 killed at Fri Jan 8 17:14:46 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 17:14:46 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:14:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:14:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11543: Waiting for Server - FAILED kill -0 3948 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3948 found at Fri Jan 8 17:14:52 EST 2016 selfserv_9159 with PID 3948 started at Fri Jan 8 17:14:52 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Fri Jan 8 17:14:52 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:14:52 EST 2016 ssl.sh: #11544: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 3948 at Fri Jan 8 17:14:52 EST 2016 kill -USR1 3948 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3948 killed at Fri Jan 8 17:14:53 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 17:14:53 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:14:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:14:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11545: Waiting for Server - FAILED kill -0 4028 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4028 found at Fri Jan 8 17:14:59 EST 2016 selfserv_9159 with PID 4028 started at Fri Jan 8 17:14:59 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Fri Jan 8 17:14:59 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:14:59 EST 2016 ssl.sh: #11546: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 4028 at Fri Jan 8 17:14:59 EST 2016 kill -USR1 4028 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4028 killed at Fri Jan 8 17:15:00 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 17:15:00 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:15:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:15:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11547: Waiting for Server - FAILED kill -0 4128 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4128 found at Fri Jan 8 17:15:06 EST 2016 selfserv_9159 with PID 4128 started at Fri Jan 8 17:15:06 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0032 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 17:15:06 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:15:07 EST 2016 ssl.sh: #11548: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 4128 at Fri Jan 8 17:15:07 EST 2016 kill -USR1 4128 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4128 killed at Fri Jan 8 17:15:07 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:15:07 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:15:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:15:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11549: Waiting for Server - FAILED kill -0 4208 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4208 found at Fri Jan 8 17:15:13 EST 2016 selfserv_9159 with PID 4208 started at Fri Jan 8 17:15:13 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0067 -n TestUser-dsamixed \ localhost.localdomain strsclnt started at Fri Jan 8 17:15:13 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:15:14 EST 2016 ssl.sh: #11550: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 4208 at Fri Jan 8 17:15:14 EST 2016 kill -USR1 4208 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4208 killed at Fri Jan 8 17:15:14 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 17:15:14 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:15:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:15:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11551: Waiting for Server - FAILED kill -0 4301 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4301 found at Fri Jan 8 17:15:20 EST 2016 selfserv_9159 with PID 4301 started at Fri Jan 8 17:15:20 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :00A2 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 17:15:20 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:15:21 EST 2016 ssl.sh: #11552: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 4301 at Fri Jan 8 17:15:21 EST 2016 kill -USR1 4301 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4301 killed at Fri Jan 8 17:15:21 EST 2016 ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server bypass/client bypass - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Stress Test Extended Test - server bypass/client bypass - with ECC =============================== ssl.sh: skipping -c_1000_-C_A Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9159 starting at Fri Jan 8 17:15:22 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:15:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:15:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11553: Waiting for Server - FAILED kill -0 4455 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4455 found at Fri Jan 8 17:15:28 EST 2016 selfserv_9159 with PID 4455 started at Fri Jan 8 17:15:28 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -c 1000 -C c -V :ssl3 \ localhost.localdomain strsclnt started at Fri Jan 8 17:15:28 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:15:28 EST 2016 ssl.sh: #11554: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 4455 at Fri Jan 8 17:15:28 EST 2016 kill -USR1 4455 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4455 killed at Fri Jan 8 17:15:29 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9159 starting at Fri Jan 8 17:15:29 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:15:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:15:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11555: Waiting for Server - FAILED kill -0 4535 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4535 found at Fri Jan 8 17:15:35 EST 2016 selfserv_9159 with PID 4535 started at Fri Jan 8 17:15:35 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Fri Jan 8 17:15:35 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:15:35 EST 2016 ssl.sh: #11556: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 4535 at Fri Jan 8 17:15:35 EST 2016 kill -USR1 4535 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4535 killed at Fri Jan 8 17:15:36 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9159 starting at Fri Jan 8 17:15:36 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:15:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:15:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11557: Waiting for Server - FAILED kill -0 4615 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4615 found at Fri Jan 8 17:15:42 EST 2016 selfserv_9159 with PID 4615 started at Fri Jan 8 17:15:42 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Fri Jan 8 17:15:42 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:15:42 EST 2016 ssl.sh: #11558: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 4615 at Fri Jan 8 17:15:42 EST 2016 kill -USR1 4615 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4615 killed at Fri Jan 8 17:15:43 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9159 starting at Fri Jan 8 17:15:43 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:15:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:15:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11559: Waiting for Server - FAILED kill -0 4694 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4694 found at Fri Jan 8 17:15:49 EST 2016 selfserv_9159 with PID 4694 started at Fri Jan 8 17:15:49 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 17:15:49 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:15:49 EST 2016 ssl.sh: #11560: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 4694 at Fri Jan 8 17:15:49 EST 2016 kill -USR1 4694 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4694 killed at Fri Jan 8 17:15:50 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9159 starting at Fri Jan 8 17:15:50 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:15:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:15:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11561: Waiting for Server - FAILED kill -0 4774 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4774 found at Fri Jan 8 17:15:56 EST 2016 selfserv_9159 with PID 4774 started at Fri Jan 8 17:15:56 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Fri Jan 8 17:15:56 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:15:56 EST 2016 ssl.sh: #11562: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 4774 at Fri Jan 8 17:15:57 EST 2016 kill -USR1 4774 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4774 killed at Fri Jan 8 17:15:57 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9159 starting at Fri Jan 8 17:15:57 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:15:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:16:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11563: Waiting for Server - FAILED kill -0 4853 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4853 found at Fri Jan 8 17:16:03 EST 2016 selfserv_9159 with PID 4853 started at Fri Jan 8 17:16:03 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 17:16:03 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:16:04 EST 2016 ssl.sh: #11564: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 4853 at Fri Jan 8 17:16:04 EST 2016 kill -USR1 4853 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4853 killed at Fri Jan 8 17:16:04 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9159 starting at Fri Jan 8 17:16:04 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:16:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:16:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11565: Waiting for Server - FAILED kill -0 4932 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4932 found at Fri Jan 8 17:16:10 EST 2016 selfserv_9159 with PID 4932 started at Fri Jan 8 17:16:10 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 17:16:10 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:16:11 EST 2016 ssl.sh: #11566: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 4932 at Fri Jan 8 17:16:11 EST 2016 kill -USR1 4932 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4932 killed at Fri Jan 8 17:16:11 EST 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping -c_100_-C_A_-N_-n_TestUser Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 17:16:11 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:16:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:16:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11567: Waiting for Server - FAILED kill -0 5041 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5041 found at Fri Jan 8 17:16:17 EST 2016 selfserv_9159 with PID 5041 started at Fri Jan 8 17:16:17 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Fri Jan 8 17:16:17 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:16:18 EST 2016 ssl.sh: #11568: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 5041 at Fri Jan 8 17:16:18 EST 2016 kill -USR1 5041 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5041 killed at Fri Jan 8 17:16:18 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 17:16:18 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:16:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:16:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11569: Waiting for Server - FAILED kill -0 5120 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5120 found at Fri Jan 8 17:16:24 EST 2016 selfserv_9159 with PID 5120 started at Fri Jan 8 17:16:24 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Fri Jan 8 17:16:24 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:16:25 EST 2016 ssl.sh: #11570: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 5120 at Fri Jan 8 17:16:25 EST 2016 kill -USR1 5120 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5120 killed at Fri Jan 8 17:16:25 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9159 starting at Fri Jan 8 17:16:26 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:16:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:16:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11571: Waiting for Server - FAILED kill -0 5199 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5199 found at Fri Jan 8 17:16:31 EST 2016 selfserv_9159 with PID 5199 started at Fri Jan 8 17:16:31 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Fri Jan 8 17:16:31 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:16:32 EST 2016 ssl.sh: #11572: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 5199 at Fri Jan 8 17:16:32 EST 2016 kill -USR1 5199 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5199 killed at Fri Jan 8 17:16:33 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9159 starting at Fri Jan 8 17:16:33 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:16:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:16:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11573: Waiting for Server - FAILED kill -0 5279 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5279 found at Fri Jan 8 17:16:39 EST 2016 selfserv_9159 with PID 5279 started at Fri Jan 8 17:16:39 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Fri Jan 8 17:16:39 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:16:39 EST 2016 ssl.sh: #11574: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 5279 at Fri Jan 8 17:16:39 EST 2016 kill -USR1 5279 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5279 killed at Fri Jan 8 17:16:40 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9159 starting at Fri Jan 8 17:16:40 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:16:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:16:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11575: Waiting for Server - FAILED kill -0 5358 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5358 found at Fri Jan 8 17:16:46 EST 2016 selfserv_9159 with PID 5358 started at Fri Jan 8 17:16:46 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 17:16:46 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:16:46 EST 2016 ssl.sh: #11576: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 5358 at Fri Jan 8 17:16:46 EST 2016 kill -USR1 5358 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5358 killed at Fri Jan 8 17:16:47 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9159 starting at Fri Jan 8 17:16:47 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:16:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:16:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11577: Waiting for Server - FAILED kill -0 5437 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5437 found at Fri Jan 8 17:16:53 EST 2016 selfserv_9159 with PID 5437 started at Fri Jan 8 17:16:53 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 17:16:53 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:16:53 EST 2016 ssl.sh: #11578: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 5437 at Fri Jan 8 17:16:53 EST 2016 kill -USR1 5437 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5437 killed at Fri Jan 8 17:16:54 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9159 starting at Fri Jan 8 17:16:54 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:16:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:16:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11579: Waiting for Server - FAILED kill -0 5517 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5517 found at Fri Jan 8 17:17:00 EST 2016 selfserv_9159 with PID 5517 started at Fri Jan 8 17:17:00 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 17:17:00 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:17:00 EST 2016 ssl.sh: #11580: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 5517 at Fri Jan 8 17:17:00 EST 2016 kill -USR1 5517 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5517 killed at Fri Jan 8 17:17:01 EST 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 17:17:01 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:17:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:17:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11581: Waiting for Server - FAILED kill -0 5625 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5625 found at Fri Jan 8 17:17:07 EST 2016 selfserv_9159 with PID 5625 started at Fri Jan 8 17:17:07 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Fri Jan 8 17:17:07 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:17:08 EST 2016 ssl.sh: #11582: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 5625 at Fri Jan 8 17:17:08 EST 2016 kill -USR1 5625 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5625 killed at Fri Jan 8 17:17:08 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 17:17:08 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:17:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:17:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11583: Waiting for Server - FAILED kill -0 5705 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5705 found at Fri Jan 8 17:17:14 EST 2016 selfserv_9159 with PID 5705 started at Fri Jan 8 17:17:14 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Fri Jan 8 17:17:14 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:17:15 EST 2016 ssl.sh: #11584: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 5705 at Fri Jan 8 17:17:15 EST 2016 kill -USR1 5705 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5705 killed at Fri Jan 8 17:17:15 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9159 starting at Fri Jan 8 17:17:15 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:17:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:17:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11585: Waiting for Server - FAILED kill -0 5784 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5784 found at Fri Jan 8 17:17:21 EST 2016 selfserv_9159 with PID 5784 started at Fri Jan 8 17:17:21 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Fri Jan 8 17:17:21 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:17:22 EST 2016 ssl.sh: #11586: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 5784 at Fri Jan 8 17:17:22 EST 2016 kill -USR1 5784 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5784 killed at Fri Jan 8 17:17:22 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 17:17:22 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:17:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:17:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11587: Waiting for Server - FAILED kill -0 5863 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5863 found at Fri Jan 8 17:17:28 EST 2016 selfserv_9159 with PID 5863 started at Fri Jan 8 17:17:28 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Fri Jan 8 17:17:28 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:17:29 EST 2016 ssl.sh: #11588: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 5863 at Fri Jan 8 17:17:29 EST 2016 kill -USR1 5863 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5863 killed at Fri Jan 8 17:17:29 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 17:17:29 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:17:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:17:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11589: Waiting for Server - FAILED kill -0 5943 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 5943 found at Fri Jan 8 17:17:35 EST 2016 selfserv_9159 with PID 5943 started at Fri Jan 8 17:17:35 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Fri Jan 8 17:17:35 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:17:36 EST 2016 ssl.sh: #11590: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 5943 at Fri Jan 8 17:17:36 EST 2016 kill -USR1 5943 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 5943 killed at Fri Jan 8 17:17:36 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9159 starting at Fri Jan 8 17:17:37 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:17:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:17:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11591: Waiting for Server - FAILED kill -0 6022 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6022 found at Fri Jan 8 17:17:42 EST 2016 selfserv_9159 with PID 6022 started at Fri Jan 8 17:17:42 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Fri Jan 8 17:17:42 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:17:43 EST 2016 ssl.sh: #11592: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 6022 at Fri Jan 8 17:17:43 EST 2016 kill -USR1 6022 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6022 killed at Fri Jan 8 17:17:44 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9159 starting at Fri Jan 8 17:17:44 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:17:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:17:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11593: Waiting for Server - FAILED kill -0 6101 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6101 found at Fri Jan 8 17:17:50 EST 2016 selfserv_9159 with PID 6101 started at Fri Jan 8 17:17:50 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Fri Jan 8 17:17:50 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:17:50 EST 2016 ssl.sh: #11594: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 6101 at Fri Jan 8 17:17:50 EST 2016 kill -USR1 6101 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6101 killed at Fri Jan 8 17:17:51 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9159 starting at Fri Jan 8 17:17:51 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:17:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:17:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11595: Waiting for Server - FAILED kill -0 6181 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6181 found at Fri Jan 8 17:17:57 EST 2016 selfserv_9159 with PID 6181 started at Fri Jan 8 17:17:57 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Fri Jan 8 17:17:57 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:17:57 EST 2016 ssl.sh: #11596: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 6181 at Fri Jan 8 17:17:57 EST 2016 kill -USR1 6181 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6181 killed at Fri Jan 8 17:17:58 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9159 starting at Fri Jan 8 17:17:58 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:17:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:18:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11597: Waiting for Server - FAILED kill -0 6260 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6260 found at Fri Jan 8 17:18:04 EST 2016 selfserv_9159 with PID 6260 started at Fri Jan 8 17:18:04 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Fri Jan 8 17:18:04 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:18:04 EST 2016 ssl.sh: #11598: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 6260 at Fri Jan 8 17:18:04 EST 2016 kill -USR1 6260 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6260 killed at Fri Jan 8 17:18:05 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9159 starting at Fri Jan 8 17:18:05 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:18:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:18:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11599: Waiting for Server - FAILED kill -0 6339 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6339 found at Fri Jan 8 17:18:11 EST 2016 selfserv_9159 with PID 6339 started at Fri Jan 8 17:18:11 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Fri Jan 8 17:18:11 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:18:11 EST 2016 ssl.sh: #11600: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 6339 at Fri Jan 8 17:18:11 EST 2016 kill -USR1 6339 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6339 killed at Fri Jan 8 17:18:12 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 17:18:12 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:18:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:18:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11601: Waiting for Server - FAILED kill -0 6442 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6442 found at Fri Jan 8 17:18:18 EST 2016 selfserv_9159 with PID 6442 started at Fri Jan 8 17:18:18 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C009 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 17:18:18 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:18:18 EST 2016 ssl.sh: #11602: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 6442 at Fri Jan 8 17:18:19 EST 2016 kill -USR1 6442 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6442 killed at Fri Jan 8 17:18:19 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:18:19 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:18:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:18:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11603: Waiting for Server - FAILED kill -0 6521 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6521 found at Fri Jan 8 17:18:25 EST 2016 selfserv_9159 with PID 6521 started at Fri Jan 8 17:18:25 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 17:18:25 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:18:26 EST 2016 ssl.sh: #11604: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 6521 at Fri Jan 8 17:18:26 EST 2016 kill -USR1 6521 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6521 killed at Fri Jan 8 17:18:26 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 17:18:26 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:18:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:18:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11605: Waiting for Server - FAILED kill -0 6600 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6600 found at Fri Jan 8 17:18:32 EST 2016 selfserv_9159 with PID 6600 started at Fri Jan 8 17:18:32 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C004 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 17:18:32 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:18:33 EST 2016 ssl.sh: #11606: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 6600 at Fri Jan 8 17:18:33 EST 2016 kill -USR1 6600 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6600 killed at Fri Jan 8 17:18:33 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 17:18:33 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:18:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:18:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11607: Waiting for Server - FAILED kill -0 6680 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6680 found at Fri Jan 8 17:18:39 EST 2016 selfserv_9159 with PID 6680 started at Fri Jan 8 17:18:39 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \ localhost.localdomain strsclnt started at Fri Jan 8 17:18:39 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:18:40 EST 2016 ssl.sh: #11608: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 6680 at Fri Jan 8 17:18:40 EST 2016 kill -USR1 6680 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6680 killed at Fri Jan 8 17:18:40 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9159 starting at Fri Jan 8 17:18:40 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:18:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:18:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11609: Waiting for Server - FAILED kill -0 6759 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6759 found at Fri Jan 8 17:18:46 EST 2016 selfserv_9159 with PID 6759 started at Fri Jan 8 17:18:46 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 17:18:46 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:18:47 EST 2016 ssl.sh: #11610: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 6759 at Fri Jan 8 17:18:47 EST 2016 kill -USR1 6759 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6759 killed at Fri Jan 8 17:18:47 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9159 starting at Fri Jan 8 17:18:47 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:18:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:18:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11611: Waiting for Server - FAILED kill -0 6838 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6838 found at Fri Jan 8 17:18:53 EST 2016 selfserv_9159 with PID 6838 started at Fri Jan 8 17:18:53 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \ localhost.localdomain strsclnt started at Fri Jan 8 17:18:53 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:18:54 EST 2016 ssl.sh: #11612: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 6838 at Fri Jan 8 17:18:54 EST 2016 kill -USR1 6838 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6838 killed at Fri Jan 8 17:18:54 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 17:18:55 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:18:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:19:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11613: Waiting for Server - FAILED kill -0 6939 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6939 found at Fri Jan 8 17:19:01 EST 2016 selfserv_9159 with PID 6939 started at Fri Jan 8 17:19:01 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Fri Jan 8 17:19:01 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:19:01 EST 2016 ssl.sh: #11614: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 6939 at Fri Jan 8 17:19:01 EST 2016 kill -USR1 6939 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6939 killed at Fri Jan 8 17:19:02 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9159 starting at Fri Jan 8 17:19:02 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:19:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:19:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11615: Waiting for Server - FAILED kill -0 7018 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7018 found at Fri Jan 8 17:19:08 EST 2016 selfserv_9159 with PID 7018 started at Fri Jan 8 17:19:08 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Fri Jan 8 17:19:08 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:19:08 EST 2016 ssl.sh: #11616: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 7018 at Fri Jan 8 17:19:08 EST 2016 kill -USR1 7018 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7018 killed at Fri Jan 8 17:19:09 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 17:19:09 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:19:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:19:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11617: Waiting for Server - FAILED kill -0 7097 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7097 found at Fri Jan 8 17:19:15 EST 2016 selfserv_9159 with PID 7097 started at Fri Jan 8 17:19:15 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Fri Jan 8 17:19:15 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:19:15 EST 2016 ssl.sh: #11618: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 7097 at Fri Jan 8 17:19:15 EST 2016 kill -USR1 7097 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7097 killed at Fri Jan 8 17:19:16 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 17:19:16 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:19:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:19:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11619: Waiting for Server - FAILED kill -0 7177 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7177 found at Fri Jan 8 17:19:22 EST 2016 selfserv_9159 with PID 7177 started at Fri Jan 8 17:19:22 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Fri Jan 8 17:19:22 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:19:22 EST 2016 ssl.sh: #11620: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 7177 at Fri Jan 8 17:19:22 EST 2016 kill -USR1 7177 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7177 killed at Fri Jan 8 17:19:23 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 17:19:23 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:19:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:19:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11621: Waiting for Server - FAILED kill -0 7270 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7270 found at Fri Jan 8 17:19:29 EST 2016 selfserv_9159 with PID 7270 started at Fri Jan 8 17:19:29 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Fri Jan 8 17:19:29 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:19:30 EST 2016 ssl.sh: #11622: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 7270 at Fri Jan 8 17:19:30 EST 2016 kill -USR1 7270 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7270 killed at Fri Jan 8 17:19:30 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9159 starting at Fri Jan 8 17:19:30 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:19:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:19:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11623: Waiting for Server - FAILED kill -0 7363 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7363 found at Fri Jan 8 17:19:36 EST 2016 selfserv_9159 with PID 7363 started at Fri Jan 8 17:19:36 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Fri Jan 8 17:19:36 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:19:37 EST 2016 ssl.sh: #11624: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 7363 at Fri Jan 8 17:19:37 EST 2016 kill -USR1 7363 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7363 killed at Fri Jan 8 17:19:37 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 17:19:37 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:19:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:19:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11625: Waiting for Server - FAILED kill -0 7443 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7443 found at Fri Jan 8 17:19:43 EST 2016 selfserv_9159 with PID 7443 started at Fri Jan 8 17:19:43 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Fri Jan 8 17:19:43 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:19:44 EST 2016 ssl.sh: #11626: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 7443 at Fri Jan 8 17:19:44 EST 2016 kill -USR1 7443 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7443 killed at Fri Jan 8 17:19:44 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 17:19:44 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:19:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:19:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11627: Waiting for Server - FAILED kill -0 7522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7522 found at Fri Jan 8 17:19:50 EST 2016 selfserv_9159 with PID 7522 started at Fri Jan 8 17:19:50 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Fri Jan 8 17:19:50 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:19:51 EST 2016 ssl.sh: #11628: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 7522 at Fri Jan 8 17:19:51 EST 2016 kill -USR1 7522 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7522 killed at Fri Jan 8 17:19:51 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 17:19:51 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:19:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:19:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11629: Waiting for Server - FAILED kill -0 7622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7622 found at Fri Jan 8 17:19:57 EST 2016 selfserv_9159 with PID 7622 started at Fri Jan 8 17:19:57 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 17:19:57 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:19:58 EST 2016 ssl.sh: #11630: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 7622 at Fri Jan 8 17:19:58 EST 2016 kill -USR1 7622 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7622 killed at Fri Jan 8 17:19:58 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:19:59 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:19:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:20:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11631: Waiting for Server - FAILED kill -0 7702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7702 found at Fri Jan 8 17:20:04 EST 2016 selfserv_9159 with PID 7702 started at Fri Jan 8 17:20:05 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \ localhost.localdomain strsclnt started at Fri Jan 8 17:20:05 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:20:05 EST 2016 ssl.sh: #11632: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 7702 at Fri Jan 8 17:20:05 EST 2016 kill -USR1 7702 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7702 killed at Fri Jan 8 17:20:06 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 17:20:06 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:20:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:20:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #11633: Waiting for Server - FAILED kill -0 7795 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7795 found at Fri Jan 8 17:20:12 EST 2016 selfserv_9159 with PID 7795 started at Fri Jan 8 17:20:12 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 17:20:12 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 17:20:12 EST 2016 ssl.sh: #11634: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 7795 at Fri Jan 8 17:20:12 EST 2016 kill -USR1 7795 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7795 killed at Fri Jan 8 17:20:13 EST 2016 TIMESTAMP ssl END: Fri Jan 8 17:20:13 EST 2016 Running tests for merge TIMESTAMP merge BEGIN: Fri Jan 8 17:20:13 EST 2016 merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/tests.v3.27064 -t Test2 -f ../tests.pw merge.sh: #11635: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id dave --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #11636: Merging Dave - PASSED merge.sh: Merging in new user certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id server --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #11637: Merging server - PASSED merge.sh: Merging in new chain certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id ext_client --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #11638: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id conflict1 --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #11639: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id conflict2 --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #11640: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:19:01 2016 Not After : Fri Jan 08 16:19:01 2021 Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:af:f1:41:16:95:ad:42:a9:d4:ea:28:e0:b7:0d:e0: f8:41:25:11:3a:93:9c:9c:53:0d:ed:cd:1b:9b:15:f9: a3:7f:b6:16:c7:ed:2b:ef:d1:d6:a4:cb:78:05:39:43: 1e:00:23:c1:43:96:0c:6d:fb:39:64:fa:ba:e5:8b:e5: 68:b0:71:cf:20:47:82:9e:75:e8:bc:23:93:aa:4f:84: 1c:d7:64:9b:96:26:04:4f:03:57:25:65:06:03:d9:c2: ad:93:08:be:f3:5b:97:ff:2b:b8:33:9d:78:54:d2:17: 83:6b:7b:80:72:c3:10:ef:a4:32:d5:70:02:7c:35:88: 59:28:b2:f1:36:32:86:88:9e:2b:44:80:48:39:f6:0a: 05:4b:54:a5:fc:4e:cb:71:3b:1e:f9:32:d7:c4:1e:73: 0d:08:a8:36:eb:b7:78:61:ba:e7:b9:00:e4:eb:c3:74: c6:b3:3f:e5:25:7b:11:a9:dd:cc:c2:46:0f:92:09:e3: 33:cc:44:53:78:c5:b3:85:ad:e4:87:3e:50:0a:23:30: 9c:62:67:c7:ef:01:15:5b:63:10:7b:21:10:10:39:fa: 15:33:fa:94:39:56:08:27:38:0f:db:41:c7:d2:76:2d: e3:7e:60:49:72:99:a5:ea:f5:59:a2:30:1e:2f:83:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:33:a2:aa:d0:eb:2d:ff:48:6c:99:5c:9d:fa:ba:e0: ef:96:8a:f8:3a:b5:40:fd:2d:5c:2d:7a:7b:a8:11:4e: 5b:66:fa:96:e1:08:50:1f:8c:9c:d9:36:b2:d6:71:5e: 2e:43:46:99:e5:95:c2:d1:b5:23:da:be:59:8c:90:5a: 11:22:c5:9a:72:38:aa:6d:e1:06:4d:c4:0d:fd:b0:fe: 25:f7:5f:49:a5:1d:84:91:dc:af:25:ac:7a:68:1c:a8: a8:03:ec:1c:8e:f4:7f:d8:59:94:e4:c7:8e:24:bc:06: ba:7c:04:ac:e0:fd:34:37:33:43:33:54:21:90:11:6a: 37:12:fd:d8:83:7f:e3:e0:0f:ac:9d:b0:66:bb:dd:3f: 7a:33:bb:3a:3a:27:40:4f:dc:3d:a4:9d:1e:a8:39:26: 26:ac:fc:a4:c0:2b:b3:d1:47:02:ca:ab:22:a2:a6:42: 02:b1:2c:ae:05:f4:f1:8e:2a:ff:af:e7:b5:67:4f:40: 3b:02:6a:3e:3e:c0:96:be:4b:02:32:f6:56:bf:50:41: dc:b9:3b:db:75:6a:98:06:00:e5:90:55:ea:ad:31:2c: cf:04:7b:49:2a:e3:e5:d0:0e:9e:56:21:eb:3e:cf:e4: 6e:ab:9a:56:69:25:c0:cb:4d:51:83:e2:16:26:32:2f Fingerprint (SHA-256): F3:BD:03:C9:93:56:D0:0B:21:A2:03:85:98:04:98:17:5C:90:EA:40:B9:37:8E:E3:3F:19:63:94:B3:39:D8:38 Fingerprint (SHA1): B8:6B:1D:77:A2:99:7F:C3:B5:29:28:EC:7E:0E:B5:ED:24:6A:B1:C9 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #11641: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 16:19:14 2016 Not After : Fri Jan 08 16:19:14 2021 Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:b3:ee:5f:92:e8:6d:58:30:fe:ab:c6:ea:9a:6d:39: d8:a8:bd:54:f8:e2:a6:3e:d4:8b:9a:07:e6:71:48:fe: 69:5e:a6:60:85:f8:09:ec:05:f2:4f:46:67:cb:d0:d8: ce:79:89:6f:30:b1:cf:2a:11:ad:ba:e3:27:91:96:6a: 89:1d:b3:59:82:d8:e0:7d:ca:d4:52:a2:b7:f9:3b:e7: 93:b8:43:2b:54:0e:8d:e9:3e:5f:dc:9f:4a:80:eb:8e: 4b:57:af:25:10:f7:ed:b6:c6:0e:a4:7a:a5:bb:3f:f6: 3d:8b:35:18:42:f4:2b:03:82:2f:86:9a:0b:ec:93:20: 3f:f7:78:12:c3:27:6d:eb:7c:01:19:4d:de:15:75:98: a1:47:85:2b:33:89:7f:12:e6:d8:d7:0f:24:31:cb:aa: c8:ed:e0:9c:79:c8:b1:1d:75:e5:7d:7c:b3:ad:a0:ca: f8:03:b7:8b:c6:66:02:3c:8e:4a:ba:ef:c9:54:6b:5c: eb:cc:29:c1:f1:e1:96:92:e5:0f:1f:ff:d9:93:89:db: 7c:af:cd:9d:a5:37:56:fd:a4:d9:7a:2a:0a:f7:f3:18: e3:9d:c8:93:fa:07:1a:c5:e6:e2:8d:ad:91:d6:0c:f9: de:42:ea:c6:fb:b6:fb:50:bb:ca:b5:61:39:21:82:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:fc:a8:01:cc:eb:3c:17:42:ce:1b:7e:d6:dd:9f:f4: 6f:5e:00:54:a6:74:4f:60:09:55:b2:31:8d:43:56:85: b7:4a:92:41:50:39:52:5a:e8:58:bd:76:93:5f:5f:99: d8:ee:4c:66:2c:2c:cd:9b:cf:16:67:4a:16:c6:41:ff: 84:1e:a1:5c:c9:24:e6:19:a8:6e:62:64:28:b8:48:9d: 1c:21:9b:bf:45:42:7f:61:04:79:d7:29:42:74:da:b4: d4:bf:19:ed:65:7d:4f:1b:62:b4:82:3a:04:08:2e:ce: 3c:c9:ec:cc:18:8f:95:87:ee:db:59:73:d4:cb:64:df: 74:65:ee:37:62:c5:91:9a:69:1b:60:0e:99:35:de:56: b0:96:ce:c0:9b:87:7d:00:37:65:96:bd:9b:ed:9b:bf: af:16:6c:9e:28:a1:77:d5:93:e4:12:0c:f1:4b:a1:6e: 13:eb:84:65:9e:f6:c9:ad:33:ee:4f:04:fb:e0:1a:7b: 76:e4:6c:22:d8:4c:fc:77:c6:d7:53:2b:9f:72:bf:22: 22:a5:eb:82:6e:b8:28:3b:86:aa:f1:d5:e1:15:91:d3: db:36:df:08:00:f7:41:a7:4c:c4:43:1b:2c:a1:75:a9: d3:35:b4:c6:1a:c3:13:a1:6d:87:f9:e4:19:0f:f8:d4 Fingerprint (SHA-256): 36:58:FE:31:6D:89:01:BC:80:46:7F:B4:79:93:16:6B:56:60:31:44:5B:A1:8C:DF:3B:CC:8F:79:40:C2:7F:D4 Fingerprint (SHA1): A0:5D:A1:20:AF:BB:02:D9:D0:8E:66:34:AA:5D:53:CF:2A:85:6C:97 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #11642: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id sdr --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #11643: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI TestCA-dsa CT,C,C Alice u,u,u Alice-dsamixed u,u,u Alice-ec u,u,u bob@bogus.com ,, Dave u,u,u eve@bogus.com ,, bob-ec@bogus.com ,, Dave-ec u,u,u TestCA CT,C,C TestCA-ec CT,C,C Alice-dsa u,u,u Alice-ecmixed u,u,u Dave-dsamixed u,u,u Dave-dsa u,u,u Dave-ecmixed u,u,u localhost.localdomain u,u,u localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u localhost-sni.localdomain-dsa u,u,u localhost-sni.localdomain-ecmixed u,u,u localhost.localdomain-dsa u,u,u localhost.localdomain-ecmixed u,u,u localhost-sni.localdomain u,u,u localhost-sni.localdomain-dsamixed u,u,u localhost-sni.localdomain-ec u,u,u ExtendedSSLUser-dsa u,u,u serverCA-dsa C,C,C ExtendedSSLUser-ecmixed u,u,u chain-1-clientCA-dsa ,, clientCA T,C,C chain-2-clientCA-ec ,, chain-2-clientCA ,, clientCA-ec T,C,C ExtendedSSLUser u,u,u serverCA C,C,C ExtendedSSLUser-dsamixed u,u,u ExtendedSSLUser-ec u,u,u serverCA-ec C,C,C chain-2-clientCA-dsa ,, clientCA-dsa T,C,C chain-1-clientCA ,, chain-1-clientCA-ec ,, Alice #1 ,, Alice #2 ,, Alice #99 ,, Alice #3 ,, Alice #100 ,, Alice #4 ,, CRL names CRL Type TestCA CRL TestCA-ec CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/tests.v3.27064 -t Test2 -f ../tests.pw merge.sh: #11644: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/upgradedb/tests.v1.27064 -t Test1 -f ../tests.pw merge.sh: #11645: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #11646: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. merge.sh: #11647: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #11648: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Fri Jan 08 16:21:22 2016 Entry 1 (0x1): Serial Number: 40 (0x28) Revocation Date: Fri Jan 08 16:07:40 2016 Entry Extensions: Name: CRL reason code Entry 2 (0x2): Serial Number: 42 (0x2a) Revocation Date: Fri Jan 08 16:21:15 2016 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #11649: Verifying TestCA CRL - PASSED TIMESTAMP merge END: Fri Jan 8 17:20:31 EST 2016 merge.sh: Testing with shared library =============================== Running tests for cert TIMESTAMP cert BEGIN: Fri Jan 8 17:20:31 EST 2016 cert.sh: Certutil and Crlutil Tests with ECC =============================== cert.sh: #11650: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -f ../tests.pw cert.sh: #11651: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11652: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11653: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -o root.cert cert.sh: #11654: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA -f ../tests.pw cert.sh: #11655: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11656: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11657: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #11658: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11659: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #11660: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11661: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #11662: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA -f ../tests.pw cert.sh: #11663: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11664: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11665: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #11666: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11667: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #11668: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11669: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #11670: Exporting Root Cert - PASSED cert.sh: Creating an DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11671: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #11672: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11673: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #11674: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11675: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #11676: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11677: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #11678: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11679: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #11680: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11681: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #11682: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11683: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #11684: Exporting DSA Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11685: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #11686: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11687: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #11688: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11689: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #11690: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11691: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #11692: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11693: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #11694: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11695: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #11696: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11697: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #11698: Exporting EC Root Cert - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw cert.sh: #11699: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11700: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11701: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #11702: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11703: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA/clientCA.ca.cert cert.sh: #11704: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11705: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #11706: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11707: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA/clientCA-dsa.ca.cert cert.sh: #11708: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11709: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #11710: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11711: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11712: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #11713: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11714: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA/clientCA-ec.ca.cert cert.sh: #11715: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11716: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #11717: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11718: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA/serverCA-ec.ca.cert cert.sh: #11719: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA/serverCA-dsa.ca.cert cert.sh: #11720: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11721: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11722: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA/serverCA.ca.cert cert.sh: #11723: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11724: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11725: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11726: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11727: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw cert.sh: #11728: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11729: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11730: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #11731: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11732: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA/serverCA.ca.cert cert.sh: #11733: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11734: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #11735: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11736: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA/serverCA-dsa.ca.cert cert.sh: #11737: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11738: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #11739: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11740: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11741: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #11742: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11743: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA/serverCA-ec.ca.cert cert.sh: #11744: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11745: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #11746: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11747: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11748: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA/clientCA-dsa.ca.cert cert.sh: #11749: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11750: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA/clientCA.ca.cert cert.sh: #11751: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11752: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11753: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11754: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11755: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/clientCA/clientCA-ec.ca.cert cert.sh: #11756: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw cert.sh: #11757: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11758: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -i ../CA/TestCA.ca.cert cert.sh: #11759: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #11760: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -i ../CA/TestCA-ec.ca.cert cert.sh: #11761: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11762: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #11763: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11764: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11765: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #11766: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11767: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11768: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #11769: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11770: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11771: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #11772: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11773: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11774: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #11775: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11776: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #11777: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11778: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -i ../CA/TestCA.ca.cert cert.sh: #11779: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #11780: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -i ../CA/TestCA-ec.ca.cert cert.sh: #11781: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11782: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #11783: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11784: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11785: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #11786: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11787: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11788: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #11789: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11790: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11791: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #11792: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11793: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11794: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #11795: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11796: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11797: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #11798: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11799: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11800: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #11801: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11802: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11803: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #11804: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11805: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11806: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #11807: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11808: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11809: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #11810: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11811: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #11812: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #11813: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #11814: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating ssl_gtest DB dir cert.sh: Creating database for ssl_gtests cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ssl_gtests --empty-password cert.sh: #11815: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Creating server certs for ssl_gtests cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -S -z ../tests_noise -g 2048 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ssl_gtests -n server -s CN=server -t C,C,C -x -m 1 -w -2 -v 120 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? cert.sh: #11816: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -S -z ../tests_noise -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ssl_gtests -n ecdsa -s CN=ecdsa -t C,C,C -x -m 1 -w -2 -v 120 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? cert.sh: #11817: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw cert.sh: #11818: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11819: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/alicedir -i ../CA/TestCA.ca.cert cert.sh: #11820: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #11821: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #11822: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11823: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #11824: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11825: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11826: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #11827: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11828: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11829: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #11830: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11831: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11832: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #11833: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11834: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11835: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #11836: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11837: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw cert.sh: #11838: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11839: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/bobdir -i ../CA/TestCA.ca.cert cert.sh: #11840: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #11841: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #11842: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11843: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #11844: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11845: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11846: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #11847: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11848: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11849: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #11850: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11851: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11852: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #11853: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11854: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11855: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #11856: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11857: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw cert.sh: #11858: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11859: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dave -i ../CA/TestCA.ca.cert cert.sh: #11860: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #11861: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #11862: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11863: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #11864: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11865: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11866: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #11867: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11868: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11869: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #11870: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11871: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11872: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #11873: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11874: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11875: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #11876: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11877: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw cert.sh: #11878: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11879: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eve -i ../CA/TestCA.ca.cert cert.sh: #11880: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #11881: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #11882: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11883: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #11884: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11885: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11886: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #11887: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11888: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11889: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #11890: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11891: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11892: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #11893: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11894: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11895: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #11896: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11897: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #11898: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #11899: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #11900: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #11901: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #11902: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #11903: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #11904: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #11905: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips -f ../tests.fipspw cert.sh: #11906: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11907: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #11908: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11909: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw cert.sh: #11910: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11911: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #11912: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11913: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #11914: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11915: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11916: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #11917: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11918: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11919: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #11920: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11921: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw cert.sh: #11922: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11923: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #11924: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #11925: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #11926: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11927: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #11928: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11929: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11930: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #11931: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11932: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11933: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #11934: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11935: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11936: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #11937: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11938: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11939: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #11940: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11941: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1b:42:be Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 22:27:11 2016 Not After : Fri Apr 08 22:27:11 2016 Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:32:8d:b5:87:a3:1c:ef:3e:25:8d:88:19:96:62:c2: 5a:69:2a:af:65:6b:6a:e0:cf:79:ff:c5:bc:af:8c:a4: 9c:e4:18:87:fb:fd:81:c0:b4:47:1c:cd:de:11:57:2f: d4:ca:b5:ae:af:6c:bc:99:7d:6d:b8:c2:22:8e:25:58: c2:5c:2a:2d:68:60:e6:1c:94:6f:bb:3f:b6:fc:6e:06: 19:1b:a0:e9:a7:d2:ab:14:29:20:56:3a:49:aa:92:02: 22:d6:81:65:24:58:67:f1:1d:32:59:61:64:af:fc:cb: 43:1d:2f:db:88:09:72:9a:06:ea:a1:9d:0f:47:0c:8f: 8f:06:0a:29:c5:4f:a7:25:9a:09:c2:79:c7:ef:11:2e: cf:c9:ff:f9:1e:94:8c:31:65:c1:19:04:a3:19:67:26: 61:91:c6:dd:a9:5a:6f:c8:2d:ef:2b:10:69:62:60:d2: 36:b2:39:cd:a0:a6:af:7e:ce:4c:85:79:32:6b:2a:35: 26:5b:98:e2:03:61:41:bf:ff:68:5b:79:9d:4a:41:69: bc:ac:21:4b:6d:87:66:27:52:75:5a:cc:65:cb:60:f5: f4:09:3a:b7:64:4f:a1:6a:b5:3c:4e:76:68:20:a4:83: 14:48:74:39:d1:31:80:24:ad:a1:27:e8:43:d4:dc:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:9a:a3:42:48:0b:80:25:9c:e2:96:e1:c0:56:ed:b9: b9:f4:77:22:28:7a:a3:55:c2:5a:7a:e6:c4:a6:f1:b5: 45:b1:95:45:aa:d3:19:03:f1:49:03:12:d0:fa:61:2f: 21:83:e7:47:b9:31:00:dc:11:f6:26:23:64:d8:db:25: 99:52:76:05:55:61:84:98:b3:0f:d3:14:ff:69:ae:f8: a9:da:25:1a:67:95:39:01:6c:76:87:14:66:0f:ec:1e: 5b:5b:c8:da:15:01:7b:39:88:71:69:30:0b:d5:a8:5d: 6e:56:86:e8:ea:43:4f:7b:0f:fd:ae:e0:94:d5:4e:dd: e8:76:83:34:80:56:10:ad:b4:c0:2f:74:50:7d:cd:1b: 5c:60:cb:37:76:45:54:b0:42:b7:0e:97:9e:ef:2e:91: 02:cf:ae:88:5d:d2:ad:03:49:f4:7c:2b:93:20:77:6d: b9:28:b0:33:f5:83:a4:0a:79:b5:60:ef:69:5f:5e:d8: bf:c0:2f:7a:b9:fe:27:f5:ab:60:10:4c:b6:13:90:5e: 28:7b:93:3b:89:6e:4f:3d:db:3a:3d:10:b3:10:92:3c: 59:a5:82:ce:86:67:70:ae:7a:4c:31:2f:d5:d5:19:8f: c8:a7:82:78:41:38:ce:e0:36:e8:24:ba:c0:83:42:04 Fingerprint (SHA-256): 5B:AF:B8:9C:61:22:64:D1:E3:0F:A2:C2:13:23:55:4A:23:D6:73:12:1E:D3:65:50:5E:7F:A3:1A:66:13:90:8B Fingerprint (SHA1): 15:A8:B6:93:7D:23:3A:4C:42:CC:9A:72:96:D5:11:13:6F:AA:3C:F8 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #11942: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1b:42:d8 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 22:27:33 2016 Not After : Fri Apr 08 22:27:33 2016 Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:b7:54:a3:0e:1b:1c:7c:ba:39:3a:c2:12:75:5e:1e: 81:bb:c1:ed:4d:a9:a5:68:4b:9e:98:16:2b:b6:a3:55: d3:76:a6:1d:44:50:a8:e7:e6:66:50:d0:1e:08:cc:4e: 8d:e2:0e:9a:5d:4a:af:fd:19:e8:63:08:a2:7e:a9:80: 29:fd:be:ec:e0:07:22:ad:3c:12:02:60:f5:a0:13:bd: a2:64:19:79:3a:e8:b0:33:48:14:f7:17:28:ff:e5:fb: 0b:eb:56:e1:d0:4c:58:e5:e4:87:9b:05:af:19:4c:23: c9:8c:1c:81:bf:57:12:4a:16:43:4a:ab:de:f2:0a:b3: 44:1d:04:62:70:bc:18:1b:89:ab:6b:dd:6b:4b:9e:09: 56:c5:ce:7a:5d:17:58:69:64:8b:87:23:87:e0:59:35: f2:b3:3f:3e:2e:9f:aa:a7:78:6f:2e:43:67:07:89:8b: 15:ce:73:e7:c4:9c:55:c6:1d:83:ac:3e:69:d0:20:92: 27:51:85:7a:03:d6:2f:69:5c:16:ce:3f:a4:38:1f:a0: 25:e5:7e:44:df:7b:0f:c7:f8:40:73:7f:f9:b7:92:44: 06:94:90:40:7e:9c:b7:dc:e7:24:e7:22:f3:76:d8:78: d7:42:55:9a:88:64:07:6e:58:4b:0a:76:87:7f:fd:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9b:72:ca:8b:4d:c4:17:c5:ea:9e:00:a9:e6:8f:0b:de: a9:8e:9a:cc:4d:26:ac:8f:f3:28:5c:61:5a:ee:17:b1: a4:fc:46:3f:29:8e:17:84:7b:9c:14:cd:ea:9d:29:be: fd:07:f7:0d:d3:34:bb:3e:bc:4e:35:ad:37:5a:21:f1: 82:e8:f0:a8:cf:0c:b8:1b:46:af:62:17:1f:0d:3e:22: 72:0f:55:e3:82:c8:66:b3:c4:6f:ae:bc:a7:d9:32:a9: 18:d4:74:0c:f7:45:df:f3:a9:fb:d5:57:e2:3a:cd:6a: 79:8c:ae:10:66:f8:2d:a5:3e:3a:53:b6:51:c7:5b:ea: 28:4d:6c:06:9d:85:d1:ed:8e:e5:46:5c:75:1f:b8:d5: 04:76:e1:dc:79:b3:40:d1:0a:42:16:71:9b:c2:5b:8b: 32:cd:55:ba:e8:d3:61:42:c3:15:da:58:75:f9:f5:e2: 20:93:c0:72:bf:b3:be:3e:e2:29:a0:25:be:f7:e3:a3: d8:44:a9:9c:8e:af:82:dd:18:1c:0b:5d:e7:32:c7:c4: a0:6d:a5:ac:f4:86:54:cd:be:ba:13:fe:d2:43:67:2d: d6:27:24:52:e1:1d:e5:b9:84:8d:6e:b3:05:6e:f9:2c: b1:4b:a5:54:76:91:1a:8a:4f:e3:6a:e3:2e:af:7b:ae Fingerprint (SHA-256): 0C:68:6F:26:36:D6:CA:E2:69:14:8B:ED:79:62:F4:5F:E1:3C:B5:9A:E7:83:51:54:04:14:6B:8B:2A:11:92:6E Fingerprint (SHA1): A7:D9:6E:E9:AC:D3:74:7C:79:06:81:D2:D2:CD:4D:C7:0D:82:47:B6 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #11943: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1b:43:01 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 22:27:51 2016 Not After : Fri Apr 08 22:27:51 2016 Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 98:bd:5f:44:94:f3:fb:19:eb:21:ca:e5:39:52:4a:0a: f7:d5:3b:4c:ba:6f:a5:3a:53:0c:95:3b:6f:04:3c:75: df:ff:51:57:dd:c4:f1:77:72:7b:de:c9:09:5b:05:09: 95:6e:59:f6:c5:cb:17:9c:3b:e9:98:6f:4e:99:ec:43: a6:f0:5d:fc:ff:3d:e2:87:0e:ae:5a:c6:13:0a:9f:59: b0:d7:6c:7c:4b:ba:11:ae:2c:04:ea:18:2a:69:f4:c6: 30:f4:b1:ae:67:9f:40:09:fa:11:1a:f9:9d:e7:b8:b7: 8c:b2:2e:ae:de:d6:bb:65:d5:65:0d:60:e2:38:32:6c: 4f:af:94:5f:ef:6f:f7:fc:ef:0e:63:c8:69:7a:ad:dd: 61:0a:c6:5e:53:7f:42:04:de:83:35:91:de:48:51:83: ed:57:13:61:fc:f8:72:ba:5f:63:e0:da:8b:14:0b:58: 62:2a:b8:e8:9f:52:01:17:f8:45:5b:37:eb:ba:25:62: e1:53:fe:a8:1e:3b:96:81:41:cb:8d:9a:1f:c4:86:dd: f5:30:fb:7e:7e:45:58:80:15:64:b3:85:9e:21:15:ac: 31:b9:d0:d3:5b:16:1b:cc:05:e4:c6:ff:c6:32:c0:c9: c9:f3:af:09:21:6b:44:e9:35:65:05:74:3e:d2:60:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:4a:86:17:ec:c5:06:9f:48:ab:76:aa:56:15:59:ff: 5e:fd:d8:73:95:7e:44:34:af:0b:13:5b:b1:dc:99:d4: 38:0a:6b:b1:7e:f4:94:5a:bc:70:20:09:92:3f:ed:51: 14:54:e9:e9:a2:1a:5b:28:fa:a3:26:79:51:d1:bb:d1: c1:2e:07:92:1b:f2:b7:82:9a:3f:d2:68:3f:fa:59:4c: ee:35:24:5e:94:55:21:7e:a3:da:fa:2f:98:26:01:8d: 90:6e:db:37:9f:86:7c:e1:4a:1b:9e:f9:3f:c0:88:a9: 89:38:29:c5:ea:b3:56:d6:ab:2d:c7:d3:c2:bb:7a:f3: de:d9:c6:6d:30:20:68:65:76:0e:95:11:46:71:6b:3b: 6d:35:21:4c:d8:3a:a5:a5:12:42:9e:42:74:d9:58:b7: 39:ca:98:6e:96:c9:39:90:fb:a2:c1:ef:18:47:36:eb: 49:a8:01:6b:19:cb:11:36:62:35:f7:84:7b:52:49:1d: 67:b3:42:08:03:8a:36:09:45:f0:fb:bb:80:5b:2a:80: 32:51:b4:22:59:8e:bc:fb:89:38:99:27:6e:ce:de:df: 85:ad:f3:99:82:45:dd:37:7e:c0:bd:56:4b:2c:d5:77: f8:67:6d:e2:6f:af:ad:8a:eb:1f:a4:44:77:f0:b0:e6 Fingerprint (SHA-256): 4C:9F:71:F1:07:44:55:2C:C4:AD:2D:86:CB:96:38:ED:ED:D6:2C:16:87:E0:38:65:CC:60:F4:28:A6:52:F4:88 Fingerprint (SHA1): 26:88:84:F5:8A:21:F4:29:ED:9C:33:8D:15:86:62:1A:17:9B:F9:3B Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #11944: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1b:43:22 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 22:27:55 2016 Not After : Fri Apr 08 22:27:55 2016 Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:e2:52:97:95:0b:88:89:7f:51:25:10:24:df:ae:38: 19:37:6c:6d:e7:b9:92:99:ea:af:bb:3e:3d:49:6b:5b: e3:4f:71:c8:b2:e4:9c:d4:30:eb:73:11:bc:54:9c:68: 5c:ad:7b:eb:54:8b:e9:a4:92:f7:71:3b:be:e1:6b:8d: 3a:88:7a:e0:85:ad:37:d3:42:a6:f7:09:1f:8c:4f:b2: 2e:1b:76:f1:9a:76:6c:03:ba:ad:55:f9:4a:8d:af:07: 57:7a:7a:59:f4:e8:36:40:45:a5:c9:e6:2f:d2:e1:30: c9:ad:3f:1e:0e:e4:3c:ee:93:46:39:ef:8d:b8:97:bb: 1c:6a:7a:3b:6a:98:c4:4f:21:fa:5d:c6:2c:6e:29:c9: 4a:af:80:cd:f2:57:ba:29:9d:4f:43:79:2c:f6:7c:84: a9:99:01:9c:73:27:92:ae:7c:03:f8:d9:f6:5e:30:11: 09:3e:b0:66:c6:de:35:9d:73:73:8f:0a:5d:69:b0:0f: 22:b2:44:3f:dc:84:33:9c:f1:bd:21:7e:b7:07:b0:84: 64:99:26:a3:47:88:fc:4d:c5:cc:b0:75:e1:b1:2a:a7: f2:ce:a2:38:06:79:01:7a:20:54:c1:e4:e0:ad:0c:23: cf:98:56:01:32:63:a1:02:1b:d8:c2:f5:74:95:c9:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:6d:90:f4:bf:16:3f:ac:44:d3:7f:23:e8:33:9e:9e: b2:ba:17:e6:90:12:3a:dc:ed:61:72:93:67:83:7b:05: cb:cf:8c:c6:9d:a7:3e:a9:f4:03:d8:7a:5d:90:b8:23: 1b:37:0a:e7:ab:10:38:c8:c0:a4:43:00:ee:b3:71:24: 69:37:d1:05:e5:48:c9:07:8e:97:a9:58:7b:ae:23:8a: 24:fe:10:40:82:ea:94:8c:05:54:dc:7a:f2:16:3e:85: 3b:e5:af:ec:4c:ad:4a:41:a3:dd:bb:46:50:06:d0:89: 68:c8:37:2b:20:61:fd:7a:35:a6:23:69:2c:dc:f9:e6: ba:ac:cf:47:cd:4d:5c:6e:b6:7a:58:e2:31:1b:61:cb: 14:72:5e:61:01:f0:74:e9:da:c4:70:e9:c4:c3:22:b2: 5f:3b:79:dd:82:e1:67:c1:d5:ba:8f:17:aa:8a:0a:d9: e8:8d:e2:d6:78:d6:50:f1:89:da:f3:0e:ab:e5:a8:42: dc:c8:0d:b5:f2:80:42:b5:66:6a:d6:29:15:c7:3f:ca: 91:ce:7f:6d:21:c0:bc:f1:ee:ba:f1:5c:1b:3d:24:70: e6:fc:10:9b:e8:1c:9d:8d:3c:9d:bd:93:cc:fd:d2:60: b4:16:48:ef:34:a4:d6:55:98:5a:8d:e5:40:e6:02:cc Fingerprint (SHA-256): 11:B1:77:13:59:BF:C2:77:E8:45:55:CA:4C:6E:93:00:C8:1A:EE:4D:59:1C:23:7F:64:17:72:8B:AD:3C:59:7A Fingerprint (SHA1): 51:EA:57:1E:92:2C:45:73:53:CA:0F:C4:20:FB:27:7F:9C:7C:70:09 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #11945: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1b:43:2a Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 22:28:04 2016 Not After : Fri Apr 08 22:28:04 2016 Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:41:08:40:ff:ca:bd:07:8d:3d:1b:db:29:56:77:6c: 72:af:d8:69:49:5a:9a:39:1c:dd:ee:cc:f2:ac:da:ba: 6e:8b:34:4b:2f:56:ab:40:58:f5:6e:fe:fa:48:97:b1: 8d:f7:8c:b1:e7:76:4c:f4:59:64:bd:47:eb:07:de:71: c3:8e:48:0d:66:6b:c4:5a:a8:cc:79:f8:58:cb:28:9a: ac:3d:d0:3e:4a:3e:94:4d:9b:2f:bd:ae:74:35:17:b5: 8d:57:b3:cb:cf:ef:fb:55:7d:4a:cf:8e:2f:97:fc:75: 7f:d6:0e:81:3b:3f:86:8b:8b:55:e7:6d:f6:84:a7:1f: da:43:d7:35:7b:f3:dc:6f:d3:95:8a:d5:74:c2:85:c3: 10:b3:8d:71:e7:48:cc:ad:e0:09:4e:33:30:8c:17:20: 2d:5a:69:1b:de:93:f3:14:30:69:74:4e:eb:a6:3a:6b: 57:79:cc:b4:05:51:83:77:9f:6d:6b:9f:c0:e0:a8:84: 02:1f:39:16:0c:c3:e8:15:47:12:b2:d7:7f:30:ac:20: 5b:7f:73:73:02:76:f1:91:3e:0c:2b:aa:69:c7:a5:fe: ff:dc:dd:9d:9e:3e:7b:85:4b:f8:a7:1d:59:6a:3c:59: 26:00:22:1d:79:0c:74:89:1c:3d:b3:85:dc:75:d2:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b9:3d:b7:23:00:91:83:e0:c3:6c:b1:cf:aa:13:41:15: 5e:ec:5d:26:40:d2:23:d3:19:6d:48:44:03:00:4e:8f: c7:10:66:c5:8c:1f:7b:f4:51:86:6d:a1:e1:61:69:87: d6:62:1d:6d:b1:78:da:c0:b0:9b:6d:74:fd:13:05:4b: 2c:9e:29:20:18:50:d8:d4:9c:e6:6f:35:38:0d:cb:d4: 2e:6e:d2:ab:f0:c4:14:c9:2b:52:e4:b0:9c:94:8b:99: d0:e5:1e:ec:de:71:93:38:15:b2:f1:a8:ac:a1:6b:5f: ff:b3:9c:f5:33:a1:64:97:84:ac:cd:4d:a3:9d:99:05: 5f:13:6f:97:19:bb:2d:9d:fa:14:7a:7b:b3:23:58:1f: f5:11:42:8e:cf:a5:2f:d9:44:fc:de:9c:0d:5d:0a:39: 99:34:5e:18:94:1e:62:c8:92:51:3d:ed:7b:59:b4:20: d7:9d:70:77:4b:7c:f9:11:d2:43:8a:83:64:d8:72:3a: f2:21:20:1a:4c:45:47:34:df:81:95:e7:fc:b2:28:d4: db:34:a6:83:ea:4a:c1:94:8a:20:9c:2e:8b:96:3d:04: f6:ec:4c:05:67:0d:d4:bc:eb:0c:04:6d:76:a4:e5:35: a6:0f:f7:2b:aa:95:79:e6:c6:a3:48:fa:8b:da:7a:e9 Fingerprint (SHA-256): 3E:90:1C:9C:68:07:96:92:E8:F6:67:84:97:FE:94:88:3F:28:AB:8B:68:0C:81:CD:17:8C:E6:CE:46:E6:BD:57 Fingerprint (SHA1): AD:50:F2:A5:8A:EC:C4:11:A9:CF:B6:B3:98:D0:75:EA:46:43:98:0E Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #11946: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1b:43:3c Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 22:28:23 2016 Not After : Fri Apr 08 22:28:23 2016 Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:ec:27:46:af:a4:37:62:fc:a0:22:10:00:f6:22:2e: 6d:d6:f9:26:a3:c4:4e:d9:8e:dc:2c:ee:60:22:19:04: dc:74:54:74:12:df:da:a9:9e:20:23:77:e1:f1:79:e9: 24:c9:e4:a8:d3:9a:18:3f:fe:5f:6d:5a:47:85:79:0e: 3b:8d:e5:77:c1:74:5a:d7:02:81:bb:f7:75:a9:df:ef: 85:f5:84:bd:3f:cf:27:4c:d5:06:f2:0b:29:7e:9b:8a: f7:e2:06:14:39:da:c9:7a:06:d9:5b:ba:8a:3f:78:72: 05:82:93:5a:a0:d7:91:53:7b:71:45:83:ad:65:ec:1d: 4d:52:6d:53:4a:08:5f:c1:9a:ff:9f:28:6b:07:53:5a: b8:c7:4a:60:92:12:f0:1c:f9:f2:c9:fc:84:5c:98:43: b9:ae:7e:02:84:42:19:83:cd:da:38:f3:8b:6c:6b:84: 80:30:d3:f3:8b:ad:74:a3:c7:da:05:5e:ad:82:3a:8c: 1f:67:65:6c:9b:60:84:b4:e5:c4:47:52:e7:9a:b2:8b: e6:c1:39:aa:db:56:92:b9:c2:f3:90:1f:6d:50:f4:a8: ec:e5:9d:2b:f5:a8:82:fd:48:69:53:1c:f9:96:01:af: f8:8e:c4:f9:d1:91:84:51:ff:cc:bd:51:1c:d9:f4:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a3:ea:5a:9e:3b:c4:5c:2f:f5:bc:d8:cc:02:aa:c6:a0: 00:36:00:4f:05:be:f1:e7:cb:c3:4c:82:01:b4:fd:f4: 12:05:32:5f:fa:e2:84:f6:bf:9f:4f:9a:4e:d6:6e:0b: 9a:30:f8:9c:2e:1a:23:5b:8b:1f:b9:6f:c4:bc:83:39: c7:1b:84:44:00:14:ed:2e:f4:aa:39:a7:3a:02:53:fd: c5:81:1c:54:7e:a3:a1:26:64:8b:75:3c:ea:fb:a8:e6: f7:83:fe:cb:da:1a:de:2d:6e:58:e8:23:9f:0c:59:21: ef:65:e1:a2:e5:94:81:9e:b0:e8:fd:02:d7:fc:a8:a1: 70:84:1c:72:7c:5e:95:2f:00:5f:06:e3:59:16:71:82: 24:06:c2:67:8f:33:1f:35:67:d0:c5:23:2f:31:32:0e: 06:7a:37:9c:69:81:48:52:e3:a0:aa:15:ec:59:cb:8b: 98:59:1a:6e:da:7e:64:7f:fb:aa:38:b7:6d:34:29:a4: 1b:34:f0:9a:b4:b5:36:b4:05:d8:5e:82:13:87:b7:20: f1:a7:10:d6:2a:ae:8c:63:25:0f:77:d2:14:ba:b9:c2: 0e:43:36:df:f1:1d:40:06:ef:b3:8c:d4:73:3c:ea:01: 88:6d:d6:ec:f6:e4:91:2d:5d:b7:ca:b0:06:ab:5e:8f Fingerprint (SHA-256): 22:55:CE:D4:19:26:1B:4A:CF:44:6A:1B:07:0B:F5:45:C2:3D:D3:9A:37:84:BE:3D:CB:D4:9E:FD:FC:8D:54:82 Fingerprint (SHA1): 07:85:ED:78:C9:EF:E1:BB:44:D1:AF:4B:E6:40:FF:4E:D7:EF:61:EC Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #11947: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1b:43:60 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 22:28:36 2016 Not After : Fri Apr 08 22:28:36 2016 Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:9c:43:eb:bd:4e:81:ee:83:0f:52:ad:4d:9b:5b:1b: 28:a9:34:94:e3:b3:b0:27:7e:22:8e:e3:63:1b:9f:16: ff:fc:e8:fb:99:c6:05:8e:60:51:e1:03:fc:f1:7e:f7: 73:bf:22:62:db:a8:47:c5:03:44:84:37:e9:0e:db:7c: 38:21:f4:d1:56:73:93:98:62:45:7f:f4:aa:cc:64:e2: fd:bd:de:9f:50:89:d6:53:2c:e1:82:36:96:bc:cd:48: 73:77:ab:9c:98:57:a2:14:ee:21:e5:79:25:39:eb:08: 93:b3:7b:bf:bb:c3:90:7b:e7:81:36:e4:8c:c6:8d:81: 7e:a5:92:6e:e4:a7:35:cf:0a:9f:f2:d8:14:e7:14:dc: 93:74:39:1a:1a:ab:0d:38:cc:e4:3a:df:30:46:94:e9: 39:72:aa:dd:4c:fd:96:f0:38:93:96:47:67:a6:90:c4: 0c:a6:d2:4d:e3:20:e3:ed:2e:1d:6e:53:5b:09:ea:6d: de:77:56:2d:48:b3:1e:e7:9b:4e:3e:27:3a:86:d2:77: 7a:2b:c8:52:ba:0f:b2:03:e5:1c:8b:d3:1b:07:20:28: 62:d8:d9:5e:f1:5b:7c:b3:12:0d:5a:60:03:22:56:80: 0d:c1:8f:09:1e:4a:40:2f:c8:d0:80:68:e0:36:21:2f Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:5d:a2:3a:b3:d1:f7:9e:0a:e4:1e:5a:01:8a:67:7f: 67:9c:5e:0e:27:bc:9a:06:b2:34:ea:6b:57:0d:8e:39: 4b:f8:1d:1f:67:31:fc:d5:38:1f:f3:da:c0:03:af:47: 99:e6:fb:2e:3e:68:4d:fe:36:31:4b:9d:81:da:d5:d6: a3:56:30:14:07:80:26:d6:e7:b3:8d:e2:f5:bf:3b:6a: 7f:58:12:91:49:9b:99:e3:54:96:d5:02:8e:48:0e:a2: 4d:84:0c:1e:f8:6d:55:3e:11:a3:95:b9:5f:fe:95:73: 45:ba:09:e7:5e:ca:55:96:a2:ff:be:a2:ab:a2:cf:5c: eb:84:6f:ab:55:0e:6e:3d:2f:86:42:87:73:74:bd:e4: 50:ce:aa:46:f7:f7:2c:db:f5:42:74:90:49:10:1c:98: 22:c8:01:4e:0e:95:a1:a4:82:e0:c2:00:e5:46:39:b5: 0b:2f:e3:0a:cd:0c:9b:fd:1b:5b:b3:f4:40:32:20:80: 07:c9:59:3c:a7:b6:68:36:c5:dc:b3:dc:10:6a:dd:bf: 16:ec:4b:12:03:14:ec:f4:c7:aa:78:6e:35:9d:25:29: f0:db:24:ed:a2:d6:be:9e:89:94:07:91:88:c9:c2:6d: 55:71:e6:69:8b:e2:3a:1d:cb:65:98:8a:87:d5:25:aa Fingerprint (SHA-256): E5:58:70:42:40:98:16:CC:00:F7:99:2B:41:4C:7C:BA:6B:E5:33:08:09:F8:8A:F2:AA:B4:39:66:21:73:F6:45 Fingerprint (SHA1): 50:EE:D7:0D:43:5C:DA:A8:01:21:0E:F3:E5:08:BE:F5:B9:3E:4A:23 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #11948: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1b:43:79 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 22:28:53 2016 Not After : Fri Apr 08 22:28:53 2016 Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:88:f1:94:2a:17:fc:51:ee:0c:83:19:13:b2:16:09: c7:e2:f1:d6:8a:df:3f:bb:f7:5d:0a:36:b5:21:26:74: 31:78:13:42:7f:a8:d2:ec:62:d9:c9:a8:8c:65:ea:3a: 50:d1:92:08:19:30:1c:d2:05:67:9b:05:8d:47:56:b8: 34:ea:c9:bf:a0:64:00:77:f3:df:c9:b6:64:27:ae:dc: 86:b5:a4:c3:1d:03:48:e3:4a:f0:4e:2b:04:cc:c7:e7: 27:10:1f:c0:ab:cc:87:e0:a5:4b:3e:ba:0d:bf:7a:b0: 05:1a:5e:27:c9:a9:95:ae:69:c1:b6:74:9d:84:af:98: 2e:05:64:72:3c:9c:37:9e:7c:83:7d:be:ee:1a:b3:b0: f4:bd:63:f7:1a:a8:cd:9f:6e:0b:f6:ac:31:27:f8:47: 68:1d:09:55:77:ad:7b:58:94:2d:03:3a:e4:26:14:96: a8:c5:2a:9f:6c:44:75:d5:b9:49:6d:b6:e5:22:19:d3: 5a:46:58:28:3e:53:8f:ce:d2:1f:bc:21:93:b9:dd:62: 05:f0:76:ad:74:87:35:77:ed:81:92:ff:a1:01:d5:25: 45:f5:c7:84:ce:92:f2:2e:e3:c7:c2:af:39:9d:11:74: 7f:ec:42:8a:25:1f:44:84:f1:f6:f5:0e:e7:d5:4c:73 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7c:74:7b:80:12:ce:92:36:7e:15:95:c5:10:43:8d:fe: fd:f0:22:6b:5c:56:78:94:09:69:2e:e9:af:60:87:19: 1b:28:3a:2f:30:8a:a7:b4:55:47:4d:73:b3:7e:f0:6f: 95:28:d9:ab:e4:be:36:bc:82:8a:e5:d9:ed:af:8a:5d: 6e:c3:6d:cb:a5:d1:9a:76:49:93:fc:e9:1e:14:e6:3c: 17:59:bd:82:97:b6:13:3a:1c:4b:43:19:1a:27:c7:3b: 4c:23:56:26:df:f9:e9:f2:79:72:c6:d7:6c:74:a2:d8: 4a:a0:20:c1:a7:52:fe:b4:c7:80:39:38:f3:f8:da:37: aa:17:80:81:79:47:af:8a:96:ee:7d:93:d9:f0:e0:31: 99:54:1d:97:ac:97:e6:36:69:ee:5f:ee:b5:3b:a6:14: 8f:94:be:cc:f5:57:d5:5c:6f:6e:f3:87:83:18:d9:4f: d0:3f:8a:31:2f:d2:74:0b:f1:69:0c:90:03:af:9b:1b: fd:96:50:b8:14:ee:a2:e2:6b:c3:42:d4:c4:35:c1:04: e5:68:fd:40:8a:48:7f:df:58:35:2c:89:ab:fd:f9:e2: d1:1e:18:d6:f1:d4:ae:fd:2b:88:73:49:18:75:8d:c9: b3:2d:89:62:9a:d2:13:a7:86:94:26:ad:8f:38:c3:14 Fingerprint (SHA-256): E7:6F:4C:8C:56:BD:1F:EF:43:44:F5:B8:C7:F1:F5:AA:4B:E1:7A:CF:16:44:2C:9F:4E:6E:B4:F7:F5:64:36:F7 Fingerprint (SHA1): 75:75:33:2C:E0:8B:FD:81:83:B5:96:C6:2E:7B:2D:9C:4A:26:35:54 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #11949: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1b:43:9a Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Jan 08 22:29:08 2016 Not After : Fri Apr 08 22:29:08 2016 Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:57:f9:31:7b:4b:52:98:78:64:2d:8d:6f:8b:e6:d8: ef:15:ad:94:c5:e1:f3:d0:76:53:62:15:b0:96:05:bc: 80:8c:80:39:e1:95:29:d2:f2:6a:8e:7c:ff:83:be:e9: ae:82:31:61:ef:dd:0a:b2:60:17:76:a7:26:80:e1:e5: a0:90:c2:fb:47:a0:66:90:8a:56:dc:c5:69:27:8e:ae: e5:bf:c9:82:eb:4f:c2:1c:7c:d2:91:9c:f4:02:41:4d: c4:9a:70:86:59:6f:02:1a:55:cb:9a:87:03:82:f7:ee: 9b:11:90:ce:16:05:b7:62:02:ac:43:4f:28:23:40:d5: e9:f8:d6:7d:77:9e:1e:8a:c1:a8:14:32:8a:c0:c3:9c: 99:56:8d:06:24:80:07:9f:30:50:a8:5e:c3:e0:ab:4a: 3c:4f:e2:5a:1a:72:11:63:32:48:4d:78:45:cf:a8:78: 81:bf:ee:ac:bc:da:a6:63:8a:e6:16:c3:78:40:a9:ca: 80:69:9b:2f:69:fe:e2:9e:ef:f8:b2:27:56:5e:e5:c2: 52:a6:48:f2:fe:ab:0a:d2:a5:3a:39:f9:32:15:76:1c: 57:db:93:54:bc:c2:fb:03:8b:ec:16:36:bf:a1:56:6c: ac:82:86:ae:05:64:43:e4:bd:7f:c2:6f:1f:04:62:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1e:58:75:45:e0:af:94:88:79:ba:ee:35:b7:eb:02:51: db:f5:82:5f:c4:8f:97:9e:1c:ba:ee:85:00:65:06:96: 4d:83:62:fb:74:8f:31:b9:74:5d:d0:3e:e6:75:30:cb: 1a:e6:b7:d4:d0:d2:e0:38:74:05:84:10:92:ed:e6:ce: ff:fc:95:ec:2d:c8:cd:8e:4f:92:56:a7:34:6a:71:19: 38:a6:37:ff:ac:28:b2:50:5e:8f:a7:8d:db:21:ff:8e: cc:7c:ec:80:2e:1e:d8:62:b8:0c:97:1e:4b:46:9e:85: e4:5b:fb:84:29:37:f0:fa:ee:97:21:26:45:f8:e3:53: c6:ce:36:bb:16:6f:9b:58:8c:7d:b0:9d:57:7e:6c:ae: b9:12:1b:18:cc:a6:2b:2e:96:a7:d7:ea:7f:5a:97:07: b3:d2:69:7b:62:e9:4d:4b:ab:8c:58:b4:e2:98:95:66: 5b:fc:eb:81:bc:b5:da:86:c3:b3:59:ad:ee:20:a7:d4: 69:62:40:19:0f:76:cc:05:3b:70:e5:a2:83:a3:18:30: b4:cb:60:03:20:d9:d6:39:49:f8:82:50:ad:12:cf:6c: b2:15:81:53:8b:57:97:90:9d:62:0c:10:a3:c1:c6:11: 24:28:f0:f2:85:23:8d:60:1b:65:00:11:a8:58:41:51 Fingerprint (SHA-256): CC:AC:87:DC:80:DD:48:75:5C:7D:C5:1D:B9:1E:AC:33:26:E0:B3:77:55:B5:02:23:93:14:99:5F:25:AA:7F:96 Fingerprint (SHA1): C4:41:4E:AD:5E:7B:E3:29:4B:6F:F5:C2:0E:87:5B:9A:A1:67:AD:CF Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #11950: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1b:43:b7 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Jan 08 22:29:23 2016 Not After : Fri Apr 08 22:29:23 2016 Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:46:d5:a6:2d:c9:8a:b1:5d:a7:b4:c6:0b:31:99:3b: e4:7a:e6:f1:53:2a:c1:f7:4d:39:46:93:f1:18:33:61: b0:92:15:17:46:c8:46:44:e4:4a:de:f0:72:a1:19:2c: b5:73:a8:4c:5e:4b:61:e7:24:11:9a:c8:79:ff:93:36: 90:65:f8:f5:8f:06:88:24:e3:b6:fa:79:e9:22:bd:3d: 9d:c4:35:ad:b0:c8:27:2e:0b:30:b8:96:fb:4f:78:5a: 8e:e1:c9:19:09:f1:54:f2:19:da:89:47:82:47:e2:6b: 1a:a3:e2:09:81:57:24:0a:7e:28:34:72:19:4f:7c:55: 20:9f:a3:a7:21:14:ea:3f:89:72:f8:c3:50:50:d3:df: 28:72:fe:e7:24:59:80:5a:8c:f3:05:76:b4:cf:ca:a1: 83:3e:3f:24:22:01:60:a2:2e:41:cf:4d:7d:c4:9e:0d: b7:37:46:2e:5b:36:7c:3f:ac:22:60:d2:ed:ea:b9:77: 35:00:a2:ac:b8:81:00:36:e7:19:5a:d2:7f:6f:61:9d: 98:f9:c8:ae:2b:3c:80:55:11:95:78:53:f6:8f:6c:3a: 4a:97:7e:4b:09:e0:11:54:b3:26:df:49:66:d1:10:bb: 7d:41:af:ab:58:9e:11:cf:51:fe:3c:51:6c:53:d7:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2b:c4:65:a3:22:fa:64:63:f3:56:d1:0d:63:bf:35:55: 82:58:0a:53:71:1e:60:e7:0a:60:2b:59:dc:21:c1:0e: b8:f1:93:f5:e0:49:1c:f1:06:02:38:4c:7d:b7:7a:03: c9:e9:e0:5e:7b:a9:f5:b8:03:ba:d7:0f:9b:42:ad:75: 1e:1a:13:15:cb:5b:64:f5:d9:cd:c3:9f:19:59:72:7b: 7f:7c:f7:6a:6c:21:fe:47:0f:b1:3b:1f:c3:2e:9d:18: d9:0c:43:41:e7:af:b4:82:34:ee:b6:85:bd:94:fe:5f: e4:80:6f:71:ef:59:c4:81:90:68:41:8d:df:02:50:9c: c4:be:cd:b6:ee:40:7e:47:df:db:f0:14:99:75:ca:a4: 8e:31:7e:18:84:59:08:aa:db:6b:d9:93:95:32:ca:fb: 21:91:e4:f1:49:18:fb:51:21:db:c1:2a:f3:5e:7b:92: b4:27:2b:c7:81:21:22:f4:d9:dd:8a:0a:eb:84:1f:54: 89:81:f8:86:1e:78:87:cd:d9:22:a6:18:f2:3b:4c:e9: 52:f8:77:33:8b:e9:8d:8f:df:5e:3d:2f:54:84:d4:11: 3d:35:4a:d6:f7:06:c7:53:4b:41:4b:c7:20:58:5a:1c: 29:8c:6d:92:db:d2:dd:96:6d:e5:c6:4d:20:13:34:56 Fingerprint (SHA-256): C9:94:F6:26:9B:07:50:BD:7E:D4:E3:9D:64:F0:35:66:34:4A:54:9D:66:F6:7D:7B:09:CE:F1:E2:52:FA:47:FD Fingerprint (SHA1): 3B:60:B0:6E:1F:B8:D2:D5:52:E1:0A:6C:5C:E7:A2:C2:73:79:2D:F5 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #11951: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1b:43:d3 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Jan 08 22:29:46 2016 Not After : Fri Apr 08 22:29:46 2016 Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:78:02:15:b5:ba:9f:ea:e4:b3:ae:67:ed:9c:f1:9f: 53:b3:c9:11:51:55:46:2f:55:ad:06:5a:fd:57:a2:3c: 5f:c8:8e:15:7a:a9:c9:b9:7b:e8:a9:a1:48:bb:b5:b3: 11:e2:b1:30:a0:16:3d:c8:0a:eb:b2:7b:6a:f1:05:13: cb:f6:a9:d1:4c:7a:82:24:6f:34:d3:34:f3:34:fc:5f: eb:2a:0f:34:f2:99:3a:71:94:68:11:ea:1b:de:1d:a7: 7d:42:34:a1:b8:a5:26:d0:ce:3d:e2:1d:13:43:a9:a0: ec:52:33:62:36:50:a8:ca:4a:4b:92:ba:1b:84:8c:a0: 38:90:52:b7:c2:bf:1c:9f:35:bc:b8:97:74:dc:fd:9c: 0f:ae:b6:ca:7b:24:af:99:17:02:4a:ca:4b:73:87:26: 80:75:00:27:1b:3f:69:c5:d0:7b:9f:ae:3f:22:e1:49: 7c:ab:0b:4e:a3:4f:c0:e8:c6:16:d5:1c:5a:c7:47:77: 67:19:16:26:b1:97:65:8b:e3:df:45:4a:d5:3e:67:0a: 93:90:2e:3a:3d:02:44:24:93:6c:e6:bc:b5:06:85:80: 2a:de:e6:e3:71:8e:20:f9:8f:f0:31:c8:f1:7c:20:83: 22:ba:11:98:d8:b4:c2:aa:20:4f:6c:13:f7:f9:ed:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:a5:de:f6:c6:ca:78:e2:1b:9c:bb:8f:4c:c5:7e:db: 67:93:5f:d9:76:32:90:ae:53:fc:6e:8a:db:1d:71:d5: fb:d0:29:cd:d9:8d:7e:d0:0e:b9:e0:f6:6e:f6:47:fb: 10:78:05:93:85:2f:c4:6e:a2:7f:a3:e3:8e:22:38:92: 84:a4:6c:f3:57:1b:41:b1:ed:6b:75:7e:68:4b:4e:b4: 81:0c:d9:48:23:3c:3a:4a:81:6d:81:39:3a:74:19:20: 01:45:5c:88:0c:ed:1e:21:61:b1:da:4d:66:b4:d8:b5: 0f:24:51:f6:e8:63:31:8b:31:7e:1d:fe:ea:1a:98:ac: 39:11:1f:44:af:64:e8:13:22:64:a0:20:f8:3e:c8:01: ce:05:1d:26:fb:7c:51:5f:b9:fb:4d:3e:7c:a3:4d:a7: 15:96:64:82:b4:89:d1:8d:44:9f:e1:1e:c2:dd:ae:81: 13:f9:5b:97:01:86:e1:3b:99:3d:8d:45:0b:bd:ce:3f: 0c:e3:ed:d7:2c:82:83:63:62:78:b8:94:d2:1d:55:7d: 33:20:dc:60:cd:9a:11:49:45:53:72:f1:b2:77:af:db: 50:50:97:1c:01:d8:a0:54:1a:8d:8a:82:97:d5:4a:29: 53:64:2c:92:06:dd:aa:39:1c:aa:73:87:2e:fa:12:98 Fingerprint (SHA-256): 77:14:4F:B7:B2:4D:71:55:B3:19:21:83:39:34:3C:27:B4:3E:A9:F6:E8:EF:C7:77:51:23:23:C3:94:7D:5E:44 Fingerprint (SHA1): 56:0A:B2:FE:CD:07:E1:F5:46:6E:7D:63:F3:1A:66:87:2A:B6:96:A3 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #11952: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #11953: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #11954: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #11955: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1b:44:1a Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Fri Jan 08 22:30:23 2016 Not After : Fri Apr 08 22:30:23 2016 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:7b:d8:d0:83:48:43:23:d8:be:ca:cc:54:d5:00:7b: 1a:ca:50:9c:96:4d:8c:2e:31:2b:9e:75:ac:0b:eb:7e: b1:6b:8c:e1:3a:06:fc:b7:68:b3:0a:b3:11:8e:a4:e0: 83:0b:83:fd:4e:63:f7:cb:bd:b5:56:65:2f:71:bb:44: 4d:b9:12:a0:4e:62:f5:1f:eb:5b:fb:83:78:4d:b1:30: 54:76:2c:67:79:d2:1f:99:08:47:4b:3f:c5:d2:0b:4d: f1:21:4c:7f:36:05:63:36:fd:f7:be:21:f8:45:53:1f: 52:a5:1f:af:75:83:98:03:d1:25:53:9b:cf:80:d6:f2: 12:bb:9c:94:25:53:57:99:1a:44:3d:23:46:22:fd:fc: de:a3:67:5d:44:e6:a2:3e:21:2a:8d:c2:77:f3:52:ae: 97:7a:83:1a:85:1a:c6:a2:e8:7a:48:79:1a:be:e9:b0: a1:84:43:6e:09:1f:78:47:da:0b:50:a2:ae:ea:0b:d2: 0a:89:de:42:a4:92:1a:64:cc:f5:71:c8:07:f6:ba:45: 47:f1:b0:38:2f:c3:e3:f5:46:02:82:3e:d2:5d:29:b7: 19:2e:25:cf:76:3e:65:fc:4c:2c:fb:63:a4:72:82:79: 43:f9:66:da:f9:a9:01:ed:42:d5:6e:6e:41:ca:ec:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:9b:3e:98:98:ce:c5:1d:f8:35:33:d0:bd:09:b9:8d: d3:67:64:ac:7c:06:3d:52:e6:95:f2:d1:34:54:27:c2: 45:85:74:13:29:eb:e8:3f:91:3e:5a:65:15:96:c9:de: 3d:5b:ba:16:6b:7f:aa:fa:d4:8e:cb:17:70:94:bf:f1: 7f:57:75:06:ec:52:03:8b:9b:20:12:e9:a7:16:45:8f: ba:bd:a9:ad:ff:f6:1a:71:c5:2b:40:98:88:f3:58:ad: 9d:58:8b:51:7a:de:f4:a3:c8:28:b3:5c:5b:17:77:21: db:24:1d:46:9f:a0:e9:15:3a:91:9a:08:49:1f:5e:e1: 8b:b9:6a:88:85:2e:d6:ba:f9:66:e3:2f:61:0d:bb:74: a7:d1:42:1c:d4:6d:7a:8a:70:13:a0:9f:56:40:8b:61: ab:8f:d0:ae:b4:58:96:d1:71:46:2b:68:0c:67:6f:59: 6c:ee:1c:4a:13:7b:4b:1d:90:49:8e:fc:83:fe:c9:23: 7e:da:f3:dd:b3:2f:98:c1:0f:1d:b2:30:85:c3:9f:a3: 68:f2:35:97:2c:4d:84:cc:5e:3a:52:dd:08:7c:09:75: 97:f1:84:06:f6:94:d1:ed:5e:c7:05:b0:4a:0c:4d:27: 4a:2f:f9:d3:6d:f5:3a:81:d3:56:fb:f6:93:30:4e:6b Fingerprint (SHA-256): 35:3C:83:13:0F:B3:25:61:C4:AF:6E:1F:5A:10:09:1B:9A:08:0C:DB:05:5B:75:48:A0:34:50:8F:40:14:79:8E Fingerprint (SHA1): 86:42:E9:4C:4A:69:A7:B5:40:3E:DE:2F:23:C6:2A:8D:F1:67:EB:19 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #11956: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der cert.sh: #11957: dump extension 2.5.29.17 to file /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #11958: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #11959: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der: error 0: Success cert.sh: #11960: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der: error 0: Success cert.sh: #11961: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der: error 0: Success cert.sh: #11962: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #11963: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:a5:1b:44:b7 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Fri Jan 08 22:31:31 2016 Not After : Fri Apr 08 22:31:31 2016 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:da:06:48:83:13:36:bb:d0:62:37:53:df:62:9b:c0: cb:02:e6:1d:8c:f1:8e:96:fc:78:67:bf:f6:84:37:cd: 45:c8:21:b6:7f:2c:d9:67:61:e5:f5:66:55:89:88:ef: 3b:60:5c:f2:e4:10:28:04:e4:ae:b9:e1:24:a7:45:a7: 0f:a4:49:56:f4:ba:b2:e9:f3:31:28:3f:ef:d7:4c:fc: c1:06:f9:44:f6:0f:3b:8d:7c:ab:ea:12:9b:7e:49:99: ab:6e:f7:4b:9b:f4:f9:2c:02:22:f2:13:1b:d3:03:3f: 6e:f4:b5:48:2e:07:90:db:5a:35:bf:6b:0b:17:59:67: 13:5b:3b:a0:66:4a:59:d4:d9:9e:38:e9:f8:2e:73:17: b4:b7:99:88:8f:2d:55:82:79:a8:9b:2c:a8:a7:05:83: 5b:52:d7:43:ff:4a:c6:40:47:d0:4f:f0:da:b7:47:e1: c9:ca:11:49:81:7a:22:54:5e:85:6d:11:cd:0e:3f:d2: bc:ff:ca:33:51:db:e7:79:66:3c:75:fb:39:6f:40:78: 58:44:3a:6a:f7:f0:54:a2:5d:bf:14:2e:44:df:d1:e8: 29:60:01:48:79:48:3f:f8:47:6a:db:cb:cc:07:43:ee: 90:e5:bf:7d:d0:c8:20:40:4f:71:c1:33:5e:03:2b:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:30:7d:ba:d1:b8:66:6e:c3:96:cb:5d:28:5e:dc:9e: b7:63:f7:f2:68:fa:ee:b5:b5:8f:1a:26:84:f4:03:94: 57:af:dd:e6:bc:91:b7:e6:17:3f:c8:9f:cf:5e:8f:17: db:d5:9d:5e:06:4d:75:4b:b9:5a:1f:7c:db:26:50:9b: ed:2d:f4:ae:44:6d:f1:53:db:d5:7b:bd:77:7c:ec:e1: 23:d2:ee:76:9f:e8:91:be:cd:16:75:a8:5c:6b:1a:a3: d1:d9:7a:cf:20:5b:b4:38:5c:24:d0:0c:62:fe:82:a6: 13:eb:83:18:a2:e9:26:b1:06:08:17:6f:8e:af:7a:c3: 91:81:67:d8:d7:b5:89:e2:2e:32:5c:2f:f8:1c:74:ba: 73:bf:c5:47:7a:5f:f7:dd:9c:c2:1a:48:c1:32:a1:bf: a8:ee:55:bf:5e:7e:1f:53:9c:00:2b:d8:ca:db:2d:ab: 4c:cd:fd:fd:5d:13:2e:fe:ab:39:64:ba:55:cc:ba:7f: 6f:71:59:2d:f5:f2:9e:27:47:89:4c:cd:38:05:26:da: 36:56:ac:8f:4e:95:ab:a0:1e:d5:e3:d1:82:e1:9f:ff: 8f:95:7e:ed:1e:ee:63:a8:c5:a0:7d:a4:17:1d:4b:ef: e4:d8:29:11:3c:41:d3:4e:0e:b1:af:92:51:29:fc:b8 Fingerprint (SHA-256): FB:61:AB:23:FB:14:A6:DD:93:D3:84:2E:AD:37:7C:1C:1A:6D:E9:E2:A2:2F:C2:2D:63:F8:75:1A:D1:55:65:53 Fingerprint (SHA1): 78:0C:F2:B1:14:4B:FB:D2:14:BA:91:8C:6F:EB:DB:56:9F:18:49:18 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #11964: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #11965: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #11966: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.pw cert.sh: #11967: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11968: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11969: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dbpass -o root.cert cert.sh: #11970: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #11971: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11972: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #11973: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw cert.sh: #11974: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11975: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -i ../CA/TestCA.ca.cert cert.sh: #11976: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #11977: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #11978: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11979: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #11980: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11981: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11982: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #11983: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11984: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11985: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #11986: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11987: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11988: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #11989: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11990: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11991: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #11992: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11993: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw cert.sh: #11994: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #11995: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -o root.cert cert.sh: #11996: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #11997: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11998: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #11999: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12000: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #12001: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #12002: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #12003: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #12004: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #12005: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #12006: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #12007: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #12008: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #12009: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #12010: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #12011: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #12012: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #12013: perform selftest - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12014: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #12015: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12016: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12017: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #12018: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12019: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12020: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #12021: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12022: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12023: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #12024: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12025: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12026: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #12027: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12028: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12029: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #12030: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12031: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12032: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #12033: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12034: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12035: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #12036: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12037: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12038: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #12039: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12040: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12041: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #12042: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12043: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12044: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #12045: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12046: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12047: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #12048: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12049: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12050: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #12051: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12052: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12053: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #12054: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12055: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12056: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #12057: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12058: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12059: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #12060: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12061: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12062: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #12063: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12064: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12065: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #12066: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12067: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12068: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #12069: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12070: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12071: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #12072: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12073: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12074: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #12075: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12076: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12077: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #12078: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12079: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12080: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #12081: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12082: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12083: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #12084: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12085: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12086: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #12087: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12088: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12089: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #12090: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12091: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12092: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #12093: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12094: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12095: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #12096: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12097: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12098: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #12099: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12100: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12101: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #12102: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12103: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12104: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #12105: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12106: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12107: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #12108: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12109: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12110: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #12111: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12112: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12113: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #12114: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12115: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12116: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #12117: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12118: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12119: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #12120: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12121: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12122: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #12123: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12124: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12125: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #12126: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12127: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12128: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #12129: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12130: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12131: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #12132: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12133: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12134: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #12135: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12136: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12137: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #12138: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12139: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12140: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #12141: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12142: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12143: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #12144: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12145: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12146: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #12147: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12148: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12149: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #12150: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12151: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12152: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #12153: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12154: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12155: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #12156: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12157: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12158: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #12159: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12160: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12161: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #12162: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12163: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12164: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #12165: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12166: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12167: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #12168: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12169: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12170: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #12171: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12172: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12173: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #12174: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12175: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12176: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #12177: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12178: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12179: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #12180: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12181: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12182: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #12183: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12184: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12185: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #12186: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12187: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12188: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #12189: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12190: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12191: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #12192: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12193: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12194: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #12195: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12196: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12197: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #12198: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12199: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12200: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #12201: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12202: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12203: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #12204: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12205: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12206: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #12207: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12208: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #12209: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #12210: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #12211: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #12212: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #12213: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #12214: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #12215: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #12216: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #12217: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #12218: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #12219: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #12220: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #12221: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #12222: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #12223: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #12224: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #12225: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Fri Jan 8 17:37:14 EST 2016 Running tests for dbtests TIMESTAMP dbtests BEGIN: Fri Jan 8 17:37:14 EST 2016 dbtests.sh: CERT and Key DB Tests =============================== --------------------------------------------------------------- | test opening the database read/write in a nonexisting directory --------------------------------------------------------------- certutil: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #12226: Certutil didn't work in a nonexisting dir 255 - PASSED dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtest: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #12227: Dbtest readonly didn't work in a nonexisting dir 46 - PASSED --------------------------------------------------------------- | test force opening the database in a nonexisting directory --------------------------------------------------------------- dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtests.sh: #12228: Dbtest force succeeded in a nonexisting dir 0 - PASSED --------------------------------------------------------------- | test opening the database readonly in an empty directory --------------------------------------------------------------- tstclnt: unable to open cert database: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #12229: Tstclnt didn't work in an empty dir 1 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/emptydir database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/emptydir/key3.db" does not exist. dbtest: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #12230: Dbtest readonly didn't work in an empty dir 46 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/emptydir dbtests.sh: #12231: Dbtest logout after empty DB Init has key - PASSED dbdir selected is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/emptydir dbtests.sh: #12232: Dbtest password DB Init maintains needlogin state - PASSED certutil: could not find certificate named "xxxx": SEC_ERROR_UNRECOGNIZED_OID: Unrecognized Object Identifier. dbtests.sh: #12233: Certutil didn't work in an empty dir 255 - PASSED --------------------------------------------------------------- | test force opening the database readonly in a empty directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/emptydir database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/emptydir/key3.db" does not exist. dbtests.sh: #12234: Dbtest force readonly succeeded in an empty dir 0 - PASSED --------------------------------------------------------------- | test opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/key3.db" does not exist. dbtest: function failed: SEC_ERROR_READ_ONLY: security library: read-only database. dbtests.sh: #12235: Dbtest r/w didn't work in an readonly dir 46 - PASSED certutil: could not find certificate named "TestUser": SEC_ERROR_UNRECOGNIZED_OID: Unrecognized Object Identifier. dbtests.sh: #12236: Certutil didn't work in an readonly dir 255 - PASSED --------------------------------------------------------------- | test opening the database ronly in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/key3.db" does not exist. dbtests.sh: #12237: Dbtest readonly succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | test force opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/key3.db" does not exist. dbtests.sh: #12238: Dbtest force succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | ls -l /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir --------------------------------------------------------------- dr-xr-xr-x. 2 mockbuild mockbuild 4096 Jan 8 17:37 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir -r--r-----. 1 mockbuild mockbuild 1222 Jan 8 17:37 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-dsa.cert -r--r-----. 1 mockbuild mockbuild 1424 Jan 8 17:37 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-dsamixed.cert -r--r-----. 1 mockbuild mockbuild 578 Jan 8 17:37 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-ec.cert -r--r-----. 1 mockbuild mockbuild 705 Jan 8 17:37 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-ecmixed.cert -r--r-----. 1 mockbuild mockbuild 870 Jan 8 17:37 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/TestUser.cert -r--------. 1 mockbuild mockbuild 206848 Jan 8 17:37 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/cert9.db -r--------. 1 mockbuild mockbuild 102400 Jan 8 17:37 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/key4.db -r--------. 1 mockbuild mockbuild 620 Jan 8 17:37 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/pkcs11.txt -r--r-----. 1 mockbuild mockbuild 393 Jan 8 17:37 /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/ronlydir/req --------------------------------------------------------------- | test creating a new cert with a conflicting nickname --------------------------------------------------------------- /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/conflictdir certutil: could not add certificate to token or database: SEC_ERROR_ADDING_CERT: Error adding certificate to database. dbtests.sh: #12239: Nicknane conflict test, could not import conflict nickname 255 - PASSED --------------------------------------------------------------- | test importing an old cert to a conflicting nickname --------------------------------------------------------------- Certificate: Data: Version: 3 (0x2) Serial Number: 40 (0x28) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:25 2016 Not After : Fri Jan 08 22:25:25 2021 Subject: "CN=Bob,E=Bob@bogus.com,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:52:27:e4:d5:c5:b5:2d:ef:ff:93:b9:07:a5:f7:a0: 52:cd:48:b5:cc:bd:b0:56:f8:37:e2:4d:b9:e1:c6:9f: 9b:2c:81:00:f7:56:7f:89:e8:bb:ae:bc:9e:15:33:dd: 64:b9:d4:7f:ab:8a:75:7f:ef:be:2e:d2:91:07:c3:55: c1:00:41:f2:6b:e5:f3:fb:59:08:b6:8d:a1:c2:ca:ac: 9f:44:36:c7:cb:6d:c9:93:03:66:f3:84:87:93:f2:0a: 56:63:92:39:12:24:24:8a:8c:c8:3f:e9:85:55:b7:11: 35:ab:17:81:f3:93:2c:64:f8:28:32:48:32:09:54:7e: 64:ca:eb:95:6f:0e:41:b4:dd:35:db:9c:42:d0:c4:70: 1c:7b:67:04:c6:59:1e:3d:e9:b3:ed:d1:61:db:01:cc: a7:97:6f:42:48:32:fe:e4:a4:85:ad:46:f4:01:1d:d8: 6d:31:af:fb:b8:58:aa:b2:62:55:ef:41:a9:82:9c:24: 36:51:eb:71:fa:2f:00:53:20:4c:d4:10:b0:42:b2:73: be:7c:5c:f9:85:d3:e3:0e:5f:7a:64:26:0c:94:ab:70: 34:f4:5d:e3:aa:a9:7e:b7:09:f6:48:fb:14:d2:65:9e: 78:8a:ec:dd:39:79:e2:76:8d:61:02:f9:f1:2d:4a:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:86:fc:e3:38:21:1c:3d:14:20:4f:b7:97:3d:5d:b7: 6b:49:e2:8f:77:d0:85:d1:fa:d7:c1:88:79:62:9b:fe: 9c:e3:7f:3e:1b:8c:11:62:a3:b1:4f:3e:2c:4a:5e:7d: cc:45:a7:bc:bf:cc:2a:95:a2:70:62:91:22:0f:dc:81: 8d:1c:da:04:15:ca:f3:fe:99:ab:6f:ae:e1:16:4d:d4: c1:64:0e:f5:59:a1:fc:f5:22:1b:f5:7a:7a:67:0a:9e: a6:cf:25:f9:84:d7:5f:6c:81:10:17:b7:f3:fe:96:39: dc:05:63:db:39:9e:c2:62:a2:4f:90:81:dd:18:6e:4e: f4:3c:ef:33:f7:57:13:f9:d3:8f:ce:3a:32:05:87:96: 20:1c:30:5a:20:1a:f2:5e:9c:97:e9:bf:56:fd:19:67: 34:8b:3b:3e:00:8d:a3:8d:d7:50:0c:fb:70:6a:4d:e6: c9:6b:65:88:5c:9c:35:fe:4d:b2:e0:df:ba:f1:0d:5e: e5:8b:85:42:7c:7a:b3:88:b1:27:ab:8d:12:64:6f:f4: 22:5c:c8:97:f6:ae:45:71:e7:f3:27:e0:e1:36:c9:08: 4c:8c:d1:40:31:9c:05:2a:b7:2b:2f:c9:39:30:98:6b: 6d:b3:0b:0f:66:5a:f1:4c:87:72:12:d7:24:54:57:d5 Fingerprint (SHA-256): CE:7A:76:56:64:A5:A1:5B:8F:B6:C3:1E:CA:50:CB:90:A5:3D:0F:5B:20:3A:34:A8:D1:03:AA:3C:38:4F:78:05 Fingerprint (SHA1): 0D:F4:5E:0B:01:5B:96:DB:01:37:9C:1C:9B:49:37:AF:A9:0C:48:81 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: dbtests.sh: #12240: Nicknane conflict test-setting nickname conflict was correctly rejected - PASSED TIMESTAMP dbtests END: Fri Jan 8 17:37:25 EST 2016 Running tests for tools TIMESTAMP tools BEGIN: Fri Jan 8 17:37:25 EST 2016 tools.sh: Tools Tests with ECC =============================== tools.sh: Exporting Alice's email cert & key - default ciphers tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12241: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ef:b8:e1:8b:a7:70:9a:e4:bb:41:ce:d2:7e:e2:b8:17 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12242: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12243: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12244: Exporting Alice's email EC cert & key (pk12util -o) - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12245: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 52:0c:a7:70:08:a3:fe:b9:cb:2d:cd:27:fb:0b:29:19 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Fri Jan 08 22:21:52 2016 Not After : Fri Jan 08 22:21:52 2066 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:ba:e9:72:38:15:e6:43:e1:a1:d9:80:d1:d8:da: 86:cd:b1:6f:b9:88:d9:d0:fd:09:58:51:90:a9:bb:41: 25:3e:e5:cf:a8:08:5e:a8:3f:f7:b6:ca:a4:68:b4:57: e6:66:5e:87:f1:2f:59:89:19:08:50:68:d3:6b:88:b2: 5c:07:cf:00:b2:7a:9a:53:57:1c:0d:6a:a9:f8:9c:b4: d3:c0:7e:c4:9c:14:ae:25:b9:f3:8d:eb:e9:3b:e3:0e: c6:71:b1:33:a2:1c:2a:85:5f:60:ad:e5:71:ab:2b:31: 9e:be:d8:8d:08:09:65:fd:8c:5c:1c:0a:7a:9e:d7:59: f5:2e:8e:3b:ab Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:88:02:42:00:d1:4f:93:16:50:a4:a4:e0:3b:82: e7:2d:44:4d:a1:18:d0:a0:8a:66:71:b6:a0:66:24:05: f1:e0:01:60:99:52:fd:da:bc:5b:83:54:aa:02:59:37: 42:27:58:0f:af:15:58:d2:73:b3:56:6b:af:2b:b0:85: e7:fd:37:7a:9b:31:f3:02:42:00:db:08:e4:8a:f7:96: 7b:c7:a3:54:bf:0d:cc:af:d3:12:db:d3:e4:58:9c:8f: 08:31:a7:c5:04:28:5d:a8:a6:96:6f:21:3f:27:a9:76: de:21:d1:bd:ad:0f:32:ab:df:8b:57:82:0a:cc:a6:d0: 7b:2c:7f:48:e4:0e:9a:ff:94:d2:87 Fingerprint (SHA-256): F5:8A:22:98:E7:B8:DE:4E:3C:8A:79:1C:03:A7:F6:C6:F3:37:55:E9:7C:83:B4:99:16:E5:7B:36:C2:4B:C5:65 Fingerprint (SHA1): 54:2D:03:1F:9D:7F:6A:2E:D0:A7:A1:EE:03:7D:E7:8F:3A:C1:3E:EB Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Fri Jan 08 22:25:07 2016 Not After : Fri Jan 08 22:25:07 2021 Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:97:c9:26:af:1b:dc:aa:55:8b:71:92:41:39:27:d3: d3:9f:03:59:99:58:91:11:ef:a5:59:c6:ba:32:c0:7e: 80:5b:3f:40:85:e0:0a:b2:79:e0:e9:ad:55:f9:b3:b2: ae:f7:66:93:8a:c4:52:6d:8c:12:79:e0:f6:a2:58:c6: 88:0a:24:c8:ab:4a:80:13:7b:bd:12:4d:45:64:5c:bf: 53:42:b6:96:85:66:97:5d:81:37:fb:9d:3b:ac:36:21: b7 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:86:02:41:09:16:9c:43:ee:df:6b:b7:41:7c:3b: f5:a6:1e:5a:24:38:2a:94:b3:fd:b1:9c:a0:b8:11:bc: 08:76:a5:5c:a8:1a:d4:cd:57:fa:e5:dd:73:1d:58:ed: 1b:ce:34:77:40:5d:f2:c7:49:27:87:bb:48:06:72:9c: d1:de:15:41:c8:ba:02:41:4b:04:e6:24:57:6c:c1:73: 40:df:d4:85:50:8a:2d:1e:1a:aa:ee:d7:ea:26:b7:3e: f5:a1:c0:80:17:8e:ad:bd:6c:8f:56:85:f0:87:52:f6: f5:ce:54:91:04:c1:e9:77:87:40:e9:1c:59:be:5f:3e: 73:24:51:09:92:e4:08:57:39 Fingerprint (SHA-256): 8D:9E:B5:D5:2D:60:06:D4:0F:48:1C:7C:64:FC:F4:C4:48:17:1E:54:F0:6D:C2:BC:88:61:AF:05:D7:83:75:DC Fingerprint (SHA1): FC:31:77:A8:DA:F8:D9:B6:95:68:51:67:5F:FA:59:AC:A8:75:09:1B Friendly Name: Alice-ec tools.sh: #12246: Listing Alice's pk12 EC file (pk12util -l) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12247: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 18:cb:1a:cb:9b:d4:77:31:c2:8b:11:c2:8d:4d:34:03 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12248: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12249: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12250: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 4e:b6:56:06:a2:cd:81:d6:26:bb:8d:f8:5f:68:8a:e1 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12251: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12252: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12253: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: c9:62:40:10:09:79:09:fb:f9:ca:3f:7c:1f:d9:ee:34 Iteration Count: 2000 (0x7d0) tools.sh: #12254: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12255: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12256: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2d:f3:90:c3:a4:2b:03:65:40:5c:21:3e:3d:e8:ac:bb Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12257: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12258: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12259: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 50:d4:f2:81:7b:29:38:45:0e:0e:c6:6d:7c:0a:7a:65 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12260: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12261: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12262: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ea:7d:61:6a:b3:df:3f:94:3a:f1:08:92:a5:e8:a0:8f Iteration Count: 2000 (0x7d0) tools.sh: #12263: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12264: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12265: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3e:93:05:ea:1e:b1:18:5f:c7:2a:79:67:ec:f4:2b:0f Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:ba:68:75:e9:9d:14:35:d8:46:c9:35:e0:02:30: 6e:b4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12266: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12267: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12268: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ad:e3:ce:16:23:b2:36:c1:bd:a5:1a:29:e9:1d:ec:6d Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:c8:00:c3:b0:64:f0:04:8d:45:ca:03:1e:b6:6b: 07:0c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12269: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12270: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12271: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: dc:df:b4:97:92:fe:da:bb:38:bb:19:4f:80:81:98:80 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:db:24:6e:ab:73:e1:32:33:07:6b:56:9d:a3:5a: 45:ea tools.sh: #12272: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12273: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12274: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: cf:47:54:0f:ef:4a:e2:e6:e9:cb:eb:a2:de:f6:0f:5f Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:83:fe:09:5b:34:51:9f:fc:98:b8:d4:03:8c:e7: 99:9b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12275: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12276: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12277: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 86:07:72:b7:a0:aa:60:4b:43:15:63:10:28:9d:5a:30 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:d1:c3:82:e6:ed:07:1f:cd:50:3c:a6:c3:99:2f: cc:95 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12278: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12279: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12280: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a2:ed:1d:b8:fd:47:ba:11:bf:3a:e6:e2:67:98:46:ab Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:d1:7d:f1:05:a7:28:17:b6:74:c4:0a:81:e7:58: 7b:54 tools.sh: #12281: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12282: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12283: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 07:a3:ae:62:6d:83:e8:b3:ad:9f:c1:50:9c:c5:4f:ab Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:33:7a:0c:61:d3:70:85:0d:e6:0f:30:8e:e8:22: 35:eb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12284: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12285: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12286: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 95:ab:7e:a5:32:00:30:00:91:72:35:50:97:27:0d:29 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:70:cd:5d:8b:1d:73:4e:9e:9f:40:3f:2a:f7:19: 7b:2d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12287: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12288: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12289: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a9:01:a6:fb:b4:33:a9:fd:4f:8c:62:67:ee:15:57:dc Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:76:50:11:b3:6c:99:f0:1f:84:69:e0:71:4e:28: 95:52 tools.sh: #12290: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12291: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12292: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 21:bf:c2:a3:c6:12:ec:09:01:68:a3:75:2b:97:3d:ce Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:73:aa:3d:ae:5c:84:a3:a4:c6:89:ab:fc:9b:2a: 5a:a8 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12293: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12294: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12295: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f9:37:a2:f4:98:2f:34:3e:76:03:1f:12:ab:74:94:fb Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:db:3b:40:94:55:61:bb:de:ad:ab:24:dc:1b:04: b8:9c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12296: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12297: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12298: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f0:16:a2:f5:ba:73:c6:af:13:4f:97:20:e0:39:a2:a0 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:10:a1:ae:ce:38:80:58:22:fb:57:ef:5b:af:8c: d0:c9 tools.sh: #12299: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12300: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12301: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7e:28:55:95:a8:05:09:b2:78:aa:69:bc:2b:39:2e:53 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:ba:7b:cb:b7:2d:d2:22:36:ad:ba:a6:68:53:eb: b9:12 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12302: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12303: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12304: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: df:d2:85:c4:97:6a:ac:dd:3d:86:1a:5a:0e:5a:d7:9f Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:23:e1:06:fc:37:6a:f9:b4:b9:7a:da:f8:6b:f1: f5:1c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12305: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12306: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12307: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 30:fe:d3:42:b5:eb:18:b9:bb:13:e4:c4:a9:78:f7:17 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:49:14:67:1d:1b:48:32:99:d8:79:73:33:25:b4: e9:13 tools.sh: #12308: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12309: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12310: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 68:63:66:c3:39:4e:4a:49:e9:10:82:79:59:3f:68:38 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:ff:ce:ed:b1:8a:a0:a9:9f:c5:89:25:43:d9:7f: 57:aa Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12311: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12312: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12313: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c7:3c:ac:41:b2:b6:b3:98:8c:22:ad:b6:24:3d:df:6a Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:37:91:19:76:71:3f:ae:64:b5:c1:0e:9f:85:f2: c4:62 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12314: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12315: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12316: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e6:1c:a0:5e:4b:1a:7f:fe:ea:5d:d6:54:73:fe:f4:d1 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:71:b3:ab:4e:3f:de:7a:38:e2:03:10:a3:65:fb: 3e:75 tools.sh: #12317: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12318: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12319: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 8c:5d:c2:26:cf:df:e5:ae:e6:cf:bc:24:3c:86:14:73 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12320: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12321: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12322: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 86:4a:0e:b6:6d:bc:14:35:35:b0:55:5d:a5:18:21:8b Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12323: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12324: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12325: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: a4:1a:c3:84:00:eb:0e:25:15:1e:8a:48:2a:ad:80:c6 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12326: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12327: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12328: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 21:16:74:fe:a1:c7:de:db:90:1e:c1:37:48:e7:6c:1a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12329: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12330: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12331: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 3a:ff:84:8d:3d:3a:01:2f:ee:e4:cb:2b:df:0c:8d:ed Iteration Count: 2000 (0x7d0) tools.sh: #12332: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12333: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12334: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 79:e7:ad:d2:71:63:48:ec:a7:0a:47:e1:23:91:7e:42 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12335: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12336: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12337: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: a4:f7:8b:09:cc:93:90:b8:f1:cd:7e:87:e8:61:97:8b Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12338: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12339: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12340: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: e9:ec:f2:80:a8:fe:f9:da:93:c2:98:7f:41:d1:a2:ce Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12341: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12342: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12343: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: bc:5f:72:f8:8f:1f:4c:7c:d5:c2:be:0d:47:47:04:ec Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12344: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12345: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12346: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: ed:fe:9d:2c:a1:99:2b:af:7b:37:93:cb:54:cd:e9:3a Iteration Count: 2000 (0x7d0) tools.sh: #12347: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12348: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12349: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 64:53:76:ba:01:be:6a:a9:1f:f7:45:17:10:39:09:50 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12350: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12351: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12352: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: b4:91:06:20:df:05:48:4d:a4:21:06:44:35:2c:37:c3 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12353: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12354: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12355: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: e0:c0:5d:f0:c2:8e:b9:70:dc:ed:7e:e9:15:92:b7:26 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12356: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12357: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12358: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 90:e7:9a:b3:ac:3e:59:10:e4:71:a2:76:31:06:a0:a8 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12359: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12360: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12361: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 78:bf:1d:4f:02:a4:60:6e:8a:5b:9c:41:3b:36:e0:b2 Iteration Count: 2000 (0x7d0) tools.sh: #12362: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12363: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12364: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b0:e6:11:c8:e5:20:36:65:f0:5b:5b:19:f4:ad:a1:09 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12365: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12366: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12367: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 08:47:69:62:eb:87:43:1a:35:00:9a:86:3b:63:cd:9a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12368: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12369: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12370: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 30:6a:44:21:fc:86:e5:c3:b6:31:b3:3d:58:b5:86:4f Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12371: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12372: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12373: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6a:55:2d:70:96:da:54:e4:27:26:d8:66:57:86:27:f8 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12374: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12375: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:null] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12376: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6f:05:ba:ac:98:c4:18:83:e3:96:3c:61:45:bc:e6:d3 Iteration Count: 2000 (0x7d0) tools.sh: #12377: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12378: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12379: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 50:1f:5b:c2:96:94:de:34:ac:57:63:4a:98:aa:42:57 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12380: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12381: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12382: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 44:33:37:a8:b3:42:c1:9f:f7:eb:61:c6:83:5c:3b:78 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12383: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12384: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12385: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b9:f7:66:5d:a5:bb:6e:8a:67:b8:bf:af:49:5b:a8:42 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12386: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12387: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12388: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4b:8e:7b:c9:b1:c4:a5:f6:d9:d7:4a:54:6c:ba:02:4b Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12389: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12390: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12391: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c0:c1:87:a5:20:2f:4d:b7:3a:af:b0:b3:17:e5:73:3c Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12392: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12393: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12394: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d5:65:f6:fd:e9:1b:c3:70:69:f7:90:52:5b:00:a1:7f Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12395: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12396: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12397: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ea:53:30:c0:95:1a:22:d1:4c:e3:72:6d:92:a0:cf:fc Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12398: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12399: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12400: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c4:82:d8:d4:20:6c:1a:8d:d2:60:4c:ab:6b:c7:68:d4 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12401: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12402: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12403: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 40:7f:cf:70:84:75:80:84:7b:47:5f:a4:e0:bb:56:de Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12404: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12405: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12406: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 64:af:44:c5:75:4f:74:15:8c:50:85:48:70:70:4e:01 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:20:41 2016 Not After : Fri Jan 08 22:20:41 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:74:17:a4:69:f0:74:1b:4b:fe:1b:97:28:2b:94:81: e2:c8:34:4a:57:cb:4a:91:d7:6d:c7:9b:ea:dc:d0:cb: a3:6b:82:ea:8c:24:c7:f9:84:dc:ff:63:d9:5a:47:c0: 4a:80:54:e7:85:41:f8:5c:7c:6b:bf:26:bc:49:c7:fe: ea:77:43:2c:1b:cd:cd:6f:62:b9:a3:6a:12:61:dd:95: 1a:a3:03:ff:17:f0:be:c6:6f:96:1c:6c:59:a8:d4:7e: 55:5e:47:28:a9:52:f6:3d:5e:c9:b7:eb:df:1b:b8:c5: 19:d5:4a:4b:d1:0e:40:69:11:4d:24:62:fa:5e:08:9f: db:a4:64:f3:e2:7b:26:7d:ed:12:8b:74:2c:eb:02:4c: 3b:2a:38:83:fe:b9:4c:67:47:1a:ce:66:52:ca:a5:64: c7:88:87:48:ac:b7:9b:95:2d:79:67:0c:ba:df:a6:ab: a8:8c:21:02:1d:5c:22:95:f6:b6:8d:49:4f:3b:00:38: c0:c6:59:d6:63:9e:10:95:62:f6:97:d5:a6:d4:1f:9d: 5e:65:70:8f:78:44:a4:9d:08:1c:99:17:a0:61:4c:12: 5b:08:7b:e4:0f:ed:f5:fc:c2:3b:7c:24:0a:9c:0a:f1: 54:26:26:02:5e:3c:39:c6:5c:9c:ef:a9:85:f4:f0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:3d:58:1e:49:e4:31:6e:c4:cb:50:61:e1:fb:1d:5f: 29:a8:f5:2e:30:f3:44:78:d4:79:91:4a:e5:be:30:0c: b5:13:97:74:16:76:57:9a:37:b0:0d:f8:51:06:97:e8: ad:fd:62:3a:5b:35:2f:d2:f5:e6:02:a6:5f:91:6e:91: d7:12:09:08:d6:0d:2d:16:ba:6f:1a:17:d9:24:8c:90: de:19:2d:cc:3c:5b:3f:b2:d1:76:2b:3e:50:4a:7c:49: 44:61:65:1d:67:31:60:33:ab:8a:4c:90:38:38:f2:c9: b7:65:31:a5:da:5a:9f:3d:6e:43:38:3f:01:5c:47:ba: 55:bd:fc:67:02:9a:f7:da:c6:68:37:56:26:a7:d2:1b: 18:49:92:a1:7a:5d:e5:3c:18:b8:3b:72:d3:84:ad:68: f3:04:b3:fd:9f:cb:b2:74:2e:26:a8:e8:48:1a:b9:59: 01:ee:a5:a6:ab:67:a8:6e:80:b8:b8:4e:f8:a7:0d:aa: e3:e6:fb:b4:af:b4:0e:f0:9f:c8:6d:15:6d:f0:bd:f6: bf:23:0a:9d:35:32:82:2e:a9:32:04:22:5f:aa:08:98: b4:81:e1:2f:e6:96:19:26:68:d8:d4:96:5f:56:a9:ff: 28:dd:7d:6a:aa:2c:5f:6d:fe:97:29:ad:e6:b4:85:06 Fingerprint (SHA-256): A9:02:D0:3C:50:9C:19:88:8A:8D:69:0A:3D:8C:2F:2D:E9:C7:AF:1D:F6:95:70:E8:1E:72:BC:E3:7E:A0:E3:13 Fingerprint (SHA1): 13:D7:FA:FF:3A:E6:D6:38:9D:68:69:1E:E1:F0:11:31:99:86:71:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:25:00 2016 Not After : Fri Jan 08 22:25:00 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:bd:4b:c9:57:86:d8:cb:48:78:0b:df:69:ef:85: a2:ac:76:db:3c:66:3f:c8:1f:b7:d9:b2:0a:31:1c:07: ab:56:a3:83:41:0f:e6:32:d6:d8:02:96:e3:30:d8:57: 3d:59:08:2e:24:4e:08:39:28:a0:ec:a9:09:3e:23:a8: 3d:c2:d0:97:de:05:07:c7:78:ea:58:06:6e:ef:e9:d2: 01:20:32:68:bb:3e:37:0a:c0:93:12:62:c9:34:58:3d: 99:77:e7:18:a6:9e:3a:a4:b7:67:58:69:38:0e:6e:f3: a1:51:8f:c9:b3:46:91:c1:36:e5:80:6e:42:ee:9e:fd: 39:ac:14:8f:59:aa:e3:97:8b:b6:2c:a8:3f:74:2d:2f: 2e:e2:d4:1d:87:85:f7:73:11:30:86:8d:7d:5a:b8:3e: 18:15:bd:35:4b:85:ef:b9:8d:4a:35:a9:66:bc:e0:e9: 41:0a:42:77:9e:5e:a4:a7:37:da:db:47:24:2d:0d:e8: 7e:40:c5:0a:f9:b5:ca:7e:c5:01:dc:32:ec:57:94:43: 37:51:fe:0b:0e:4a:f4:9a:dc:6f:a3:d5:27:93:8e:98: b9:a2:ec:1e:cd:e9:3b:b4:60:0e:74:f9:a6:ec:7d:08: 32:a4:a6:05:bf:57:7e:d0:52:e8:8a:b4:0a:3c:2b:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ca:d5:cf:de:a0:cb:32:01:89:24:6a:67:b7:06:72: 31:1f:8e:82:c4:8c:d5:0b:28:36:da:f4:4d:65:61:50: 0f:f2:08:b3:d6:98:14:8c:db:23:3b:35:dc:e7:4a:8d: 59:85:fc:61:79:f4:2a:04:6c:29:5e:74:c6:7f:46:51: e6:a4:af:5c:73:3a:cf:29:33:cc:7e:14:ae:ce:de:f9: 2c:37:0f:2b:2d:cb:f9:d6:7f:93:8a:e0:26:a3:6d:11: c9:30:0e:49:20:70:7d:a5:7d:a4:5e:c6:4b:97:6d:97: d1:b2:3a:21:f4:4d:18:d2:2e:ab:55:a7:1b:e6:40:2c: e2:1a:23:99:b1:1c:5f:66:c4:04:55:17:ac:36:0c:f9: 8c:b1:52:61:95:f3:80:1e:99:ed:f5:40:5a:5e:10:a5: 66:ea:31:d5:5f:15:b8:f4:46:3f:94:06:48:d7:c1:9b: 1c:75:fd:af:5c:d8:07:57:89:f5:28:6e:6a:df:36:74: 44:7b:65:80:39:fa:76:75:e0:bf:ed:9f:51:ee:10:d6: f6:b6:83:2d:0f:4b:38:27:3f:7f:60:3d:c5:3c:e7:d0: e0:c1:90:a6:9a:a6:01:a1:71:04:c6:56:42:6d:9e:0b: 92:68:cc:aa:a1:fa:3b:8f:c3:d6:c6:ef:36:2f:0d:4c Fingerprint (SHA-256): EE:2A:86:14:85:80:8B:80:EE:5B:53:74:B5:EA:5F:F1:14:D9:F7:E6:08:A9:F3:E8:96:19:52:12:69:56:68:26 Fingerprint (SHA1): B4:75:BD:F2:00:4C:94:38:5C:B8:23:7C:2F:91:0A:0A:43:44:92:C7 Friendly Name: Alice tools.sh: #12407: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12408: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c null pk12util: Algorithm: "null": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #12409: Exporting with [null:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12410: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #12411: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 32%) tree "../tools/html" signed successfully tools.sh: #12412: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #12413: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #12414: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html --> signjs.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #12415: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #12416: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #12417: Show who signed xpi (signtool -w) - PASSED TIMESTAMP tools END: Fri Jan 8 17:39:27 EST 2016 Running tests for fips TIMESTAMP fips BEGIN: Fri Jan 8 17:39:27 EST 2016 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. fips.sh: #12418: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #12419: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 3833997f1fc8230c066d1281f34c7e0b2eff2e77 NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #12420: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #12421: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #12422: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #12423: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #12424: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #12425: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #12426: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #12427: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #12428: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #12429: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #12430: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 3833997f1fc8230c066d1281f34c7e0b2eff2e77 FIPS_PUB_140_Test_Certificate fips.sh: #12431: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #12432: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #12433: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #12434: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #12435: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 3833997f1fc8230c066d1281f34c7e0b2eff2e77 FIPS_PUB_140_Test_Certificate fips.sh: #12436: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 106. **** **** ALL TESTS PASSED **** fips.sh: #12437: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 104. **** **** ALL TESTS PASSED **** fips.sh: #12438: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle/libsoftokn3.so -o -8 -b 5 cp /usr/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle Changing byte 0x00032fe4 (208868): from 01 (1) to 21 (33) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/fips/mangle dbtest -r -d ../fips fips.sh: #12439: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Fri Jan 8 17:40:48 EST 2016 Running tests for crmf TIMESTAMP crmf BEGIN: Fri Jan 8 17:40:48 EST 2016 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #12440: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #12441: CMMF test . - PASSED TIMESTAMP crmf END: Fri Jan 8 17:40:49 EST 2016 Running tests for smime TIMESTAMP smime BEGIN: Fri Jan 8 17:40:49 EST 2016 smime.sh: S/MIME Tests with ECC =============================== smime.sh: Signing Detached Message {SHA1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #12442: Create Detached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #12443: Verifying Alice's Detached Signature (SHA1) . - PASSED smime.sh: Signing Attached Message (SHA1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #12444: Create Attached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1 smime.sh: #12445: Decode Alice's Attached Signature (SHA1) . - PASSED diff alice.txt alice.data.SHA1 smime.sh: #12446: Compare Attached Signed Data and Original (SHA1) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA1} ------------------ cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1 smime.sh: #12447: Create Detached Signature Alice (ECDSA w/ SHA1) . - PASSED cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #12448: Verifying Alice's Detached Signature (ECDSA w/ SHA1) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA1) ------------------ cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1 smime.sh: #12449: Create Attached Signature Alice (ECDSA w/ SHA1) . - PASSED cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.SHA1 smime.sh: #12450: Decode Alice's Attached Signature (ECDSA w/ SHA1) . - PASSED diff alice.txt alice-ec.data.SHA1 smime.sh: #12451: Compare Attached Signed Data and Original (ECDSA w/ SHA1) . - PASSED smime.sh: Signing Detached Message {SHA256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #12452: Create Detached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #12453: Verifying Alice's Detached Signature (SHA256) . - PASSED smime.sh: Signing Attached Message (SHA256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #12454: Create Attached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256 smime.sh: #12455: Decode Alice's Attached Signature (SHA256) . - PASSED diff alice.txt alice.data.SHA256 smime.sh: #12456: Compare Attached Signed Data and Original (SHA256) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA256} ------------------ cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256 smime.sh: #12457: Create Detached Signature Alice (ECDSA w/ SHA256) . - PASSED cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #12458: Verifying Alice's Detached Signature (ECDSA w/ SHA256) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA256) ------------------ cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256 smime.sh: #12459: Create Attached Signature Alice (ECDSA w/ SHA256) . - PASSED cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.SHA256 smime.sh: #12460: Decode Alice's Attached Signature (ECDSA w/ SHA256) . - PASSED diff alice.txt alice-ec.data.SHA256 smime.sh: #12461: Compare Attached Signed Data and Original (ECDSA w/ SHA256) . - PASSED smime.sh: Signing Detached Message {SHA384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #12462: Create Detached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #12463: Verifying Alice's Detached Signature (SHA384) . - PASSED smime.sh: Signing Attached Message (SHA384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #12464: Create Attached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384 smime.sh: #12465: Decode Alice's Attached Signature (SHA384) . - PASSED diff alice.txt alice.data.SHA384 smime.sh: #12466: Compare Attached Signed Data and Original (SHA384) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA384} ------------------ cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384 smime.sh: #12467: Create Detached Signature Alice (ECDSA w/ SHA384) . - PASSED cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #12468: Verifying Alice's Detached Signature (ECDSA w/ SHA384) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA384) ------------------ cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384 smime.sh: #12469: Create Attached Signature Alice (ECDSA w/ SHA384) . - PASSED cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.SHA384 smime.sh: #12470: Decode Alice's Attached Signature (ECDSA w/ SHA384) . - PASSED diff alice.txt alice-ec.data.SHA384 smime.sh: #12471: Compare Attached Signed Data and Original (ECDSA w/ SHA384) . - PASSED smime.sh: Signing Detached Message {SHA512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #12472: Create Detached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #12473: Verifying Alice's Detached Signature (SHA512) . - PASSED smime.sh: Signing Attached Message (SHA512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #12474: Create Attached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512 smime.sh: #12475: Decode Alice's Attached Signature (SHA512) . - PASSED diff alice.txt alice.data.SHA512 smime.sh: #12476: Compare Attached Signed Data and Original (SHA512) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA512} ------------------ cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512 smime.sh: #12477: Create Detached Signature Alice (ECDSA w/ SHA512) . - PASSED cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #12478: Verifying Alice's Detached Signature (ECDSA w/ SHA512) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA512) ------------------ cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512 smime.sh: #12479: Create Attached Signature Alice (ECDSA w/ SHA512) . - PASSED cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.SHA512 smime.sh: #12480: Decode Alice's Attached Signature (ECDSA w/ SHA512) . - PASSED diff alice.txt alice-ec.data.SHA512 smime.sh: #12481: Compare Attached Signed Data and Original (ECDSA w/ SHA512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #12482: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #12483: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #12484: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@bogus.com,dave@bogus.com smime.sh: #12485: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@bogus.net smime.sh: #12486: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #12487: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #12488: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #12489: Decrypt with a Multiple Email cert . - PASSED smime.sh: #12490: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #12491: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #12492: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \ -d ../alicedir > co.der smime.sh: #12493: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #12494: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@bogus.com" > alice.enc smime.sh: #12495: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #12496: Decode Encrypted-Data . - PASSED smime.sh: #12497: Compare Decoded and Original Data . - PASSED smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #12498: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice.env -o alice_p7.data smime.sh: #12499: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #12500: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #12501: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #12502: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Fri Jan 8 17:41:23 EST 2016 Running tests for ssl TIMESTAMP ssl BEGIN: Fri Jan 8 17:41:23 EST 2016 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 17:41:23 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:41:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:41:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12503: Waiting for Server - FAILED kill -0 17620 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17620 found at Fri Jan 8 17:41:29 EST 2016 selfserv_9159 with PID 17620 started at Fri Jan 8 17:41:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12504: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 17620 at Fri Jan 8 17:41:29 EST 2016 kill -USR1 17620 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17620 killed at Fri Jan 8 17:41:30 EST 2016 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 17:41:30 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:41:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:41:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12505: Waiting for Server - FAILED kill -0 17689 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17689 found at Fri Jan 8 17:41:36 EST 2016 selfserv_9159 with PID 17689 started at Fri Jan 8 17:41:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12506: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 17689 at Fri Jan 8 17:41:36 EST 2016 kill -USR1 17689 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17689 killed at Fri Jan 8 17:41:37 EST 2016 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 17:41:37 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:41:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:41:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12507: Waiting for Server - FAILED kill -0 17757 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17757 found at Fri Jan 8 17:41:43 EST 2016 selfserv_9159 with PID 17757 started at Fri Jan 8 17:41:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12508: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 17757 at Fri Jan 8 17:41:43 EST 2016 kill -USR1 17757 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17757 killed at Fri Jan 8 17:41:44 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:41:44 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:41:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:41:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12509: Waiting for Server - FAILED kill -0 17838 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17838 found at Fri Jan 8 17:41:50 EST 2016 selfserv_9159 with PID 17838 started at Fri Jan 8 17:41:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12510: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 17838 at Fri Jan 8 17:41:50 EST 2016 kill -USR1 17838 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17838 killed at Fri Jan 8 17:41:50 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:41:51 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:41:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:41:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12511: Waiting for Server - FAILED kill -0 17907 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17907 found at Fri Jan 8 17:41:56 EST 2016 selfserv_9159 with PID 17907 started at Fri Jan 8 17:41:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12512: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 17907 at Fri Jan 8 17:41:57 EST 2016 kill -USR1 17907 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17907 killed at Fri Jan 8 17:41:57 EST 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:41:57 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:41:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:42:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12513: Waiting for Server - FAILED kill -0 17975 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17975 found at Fri Jan 8 17:42:03 EST 2016 selfserv_9159 with PID 17975 started at Fri Jan 8 17:42:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12514: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 17975 at Fri Jan 8 17:42:04 EST 2016 kill -USR1 17975 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17975 killed at Fri Jan 8 17:42:04 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:42:04 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:42:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:42:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12515: Waiting for Server - FAILED kill -0 18055 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18055 found at Fri Jan 8 17:42:10 EST 2016 selfserv_9159 with PID 18055 started at Fri Jan 8 17:42:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12516: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 18055 at Fri Jan 8 17:42:11 EST 2016 kill -USR1 18055 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18055 killed at Fri Jan 8 17:42:11 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:42:11 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:42:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:42:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12517: Waiting for Server - FAILED kill -0 18124 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18124 found at Fri Jan 8 17:42:17 EST 2016 selfserv_9159 with PID 18124 started at Fri Jan 8 17:42:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12518: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 18124 at Fri Jan 8 17:42:18 EST 2016 kill -USR1 18124 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18124 killed at Fri Jan 8 17:42:18 EST 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:42:18 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:42:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:42:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12519: Waiting for Server - FAILED kill -0 18192 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18192 found at Fri Jan 8 17:42:24 EST 2016 selfserv_9159 with PID 18192 started at Fri Jan 8 17:42:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12520: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 18192 at Fri Jan 8 17:42:25 EST 2016 kill -USR1 18192 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18192 killed at Fri Jan 8 17:42:25 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 17:42:25 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:42:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:42:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12521: Waiting for Server - FAILED kill -0 18272 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18272 found at Fri Jan 8 17:42:31 EST 2016 selfserv_9159 with PID 18272 started at Fri Jan 8 17:42:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12522: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 18272 at Fri Jan 8 17:42:32 EST 2016 kill -USR1 18272 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18272 killed at Fri Jan 8 17:42:32 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 17:42:32 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:42:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:42:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12523: Waiting for Server - FAILED kill -0 18341 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18341 found at Fri Jan 8 17:42:38 EST 2016 selfserv_9159 with PID 18341 started at Fri Jan 8 17:42:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12524: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 18341 at Fri Jan 8 17:42:39 EST 2016 kill -USR1 18341 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18341 killed at Fri Jan 8 17:42:39 EST 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 17:42:39 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:42:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:42:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12525: Waiting for Server - FAILED kill -0 18409 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18409 found at Fri Jan 8 17:42:45 EST 2016 selfserv_9159 with PID 18409 started at Fri Jan 8 17:42:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12526: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 18409 at Fri Jan 8 17:42:45 EST 2016 kill -USR1 18409 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18409 killed at Fri Jan 8 17:42:46 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:42:46 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:42:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:42:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12527: Waiting for Server - FAILED kill -0 18489 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18489 found at Fri Jan 8 17:42:52 EST 2016 selfserv_9159 with PID 18489 started at Fri Jan 8 17:42:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12528: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 18489 at Fri Jan 8 17:42:52 EST 2016 kill -USR1 18489 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18489 killed at Fri Jan 8 17:42:53 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:42:53 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:42:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:42:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12529: Waiting for Server - FAILED kill -0 18558 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18558 found at Fri Jan 8 17:42:59 EST 2016 selfserv_9159 with PID 18558 started at Fri Jan 8 17:42:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12530: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 18558 at Fri Jan 8 17:42:59 EST 2016 kill -USR1 18558 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18558 killed at Fri Jan 8 17:43:00 EST 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:43:00 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:43:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:43:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12531: Waiting for Server - FAILED kill -0 18626 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18626 found at Fri Jan 8 17:43:06 EST 2016 selfserv_9159 with PID 18626 started at Fri Jan 8 17:43:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12532: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 18626 at Fri Jan 8 17:43:06 EST 2016 kill -USR1 18626 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18626 killed at Fri Jan 8 17:43:07 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:43:07 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:43:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:43:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12533: Waiting for Server - FAILED kill -0 18706 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18706 found at Fri Jan 8 17:43:13 EST 2016 selfserv_9159 with PID 18706 started at Fri Jan 8 17:43:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12534: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 18706 at Fri Jan 8 17:43:13 EST 2016 kill -USR1 18706 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18706 killed at Fri Jan 8 17:43:14 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:43:14 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:43:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:43:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12535: Waiting for Server - FAILED kill -0 18775 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18775 found at Fri Jan 8 17:43:20 EST 2016 selfserv_9159 with PID 18775 started at Fri Jan 8 17:43:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12536: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 18775 at Fri Jan 8 17:43:20 EST 2016 kill -USR1 18775 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18775 killed at Fri Jan 8 17:43:20 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:43:21 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:43:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:43:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12537: Waiting for Server - FAILED kill -0 18843 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18843 found at Fri Jan 8 17:43:26 EST 2016 selfserv_9159 with PID 18843 started at Fri Jan 8 17:43:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12538: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 18843 at Fri Jan 8 17:43:27 EST 2016 kill -USR1 18843 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18843 killed at Fri Jan 8 17:43:27 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 17:43:28 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:43:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:43:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12539: Waiting for Server - FAILED kill -0 18923 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18923 found at Fri Jan 8 17:43:33 EST 2016 selfserv_9159 with PID 18923 started at Fri Jan 8 17:43:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12540: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 18923 at Fri Jan 8 17:43:34 EST 2016 kill -USR1 18923 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18923 killed at Fri Jan 8 17:43:34 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 17:43:34 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:43:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:43:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12541: Waiting for Server - FAILED kill -0 18992 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 18992 found at Fri Jan 8 17:43:40 EST 2016 selfserv_9159 with PID 18992 started at Fri Jan 8 17:43:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12542: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 18992 at Fri Jan 8 17:43:41 EST 2016 kill -USR1 18992 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 18992 killed at Fri Jan 8 17:43:41 EST 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 17:43:41 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:43:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:43:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12543: Waiting for Server - FAILED kill -0 19060 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19060 found at Fri Jan 8 17:43:47 EST 2016 selfserv_9159 with PID 19060 started at Fri Jan 8 17:43:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12544: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 19060 at Fri Jan 8 17:43:48 EST 2016 kill -USR1 19060 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19060 killed at Fri Jan 8 17:43:48 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:43:48 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:43:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:43:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12545: Waiting for Server - FAILED kill -0 19140 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19140 found at Fri Jan 8 17:43:54 EST 2016 selfserv_9159 with PID 19140 started at Fri Jan 8 17:43:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12546: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 19140 at Fri Jan 8 17:43:55 EST 2016 kill -USR1 19140 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19140 killed at Fri Jan 8 17:43:55 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:43:55 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:43:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:44:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12547: Waiting for Server - FAILED kill -0 19210 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19210 found at Fri Jan 8 17:44:01 EST 2016 selfserv_9159 with PID 19210 started at Fri Jan 8 17:44:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12548: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 19210 at Fri Jan 8 17:44:02 EST 2016 kill -USR1 19210 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19210 killed at Fri Jan 8 17:44:02 EST 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:44:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:44:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:44:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12549: Waiting for Server - FAILED kill -0 19278 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19278 found at Fri Jan 8 17:44:08 EST 2016 selfserv_9159 with PID 19278 started at Fri Jan 8 17:44:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12550: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 19278 at Fri Jan 8 17:44:09 EST 2016 kill -USR1 19278 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19278 killed at Fri Jan 8 17:44:09 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:44:09 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:44:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:44:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12551: Waiting for Server - FAILED kill -0 19358 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19358 found at Fri Jan 8 17:44:15 EST 2016 selfserv_9159 with PID 19358 started at Fri Jan 8 17:44:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12552: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 19358 at Fri Jan 8 17:44:15 EST 2016 kill -USR1 19358 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19358 killed at Fri Jan 8 17:44:16 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:44:16 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:44:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:44:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12553: Waiting for Server - FAILED kill -0 19427 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19427 found at Fri Jan 8 17:44:22 EST 2016 selfserv_9159 with PID 19427 started at Fri Jan 8 17:44:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12554: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 19427 at Fri Jan 8 17:44:22 EST 2016 kill -USR1 19427 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19427 killed at Fri Jan 8 17:44:23 EST 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:44:23 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:44:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:44:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12555: Waiting for Server - FAILED kill -0 19495 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19495 found at Fri Jan 8 17:44:29 EST 2016 selfserv_9159 with PID 19495 started at Fri Jan 8 17:44:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12556: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 19495 at Fri Jan 8 17:44:29 EST 2016 kill -USR1 19495 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19495 killed at Fri Jan 8 17:44:30 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 17:44:30 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:44:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:44:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12557: Waiting for Server - FAILED kill -0 19575 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19575 found at Fri Jan 8 17:44:36 EST 2016 selfserv_9159 with PID 19575 started at Fri Jan 8 17:44:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12558: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 19575 at Fri Jan 8 17:44:36 EST 2016 kill -USR1 19575 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19575 killed at Fri Jan 8 17:44:37 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 17:44:37 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:44:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:44:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12559: Waiting for Server - FAILED kill -0 19644 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19644 found at Fri Jan 8 17:44:43 EST 2016 selfserv_9159 with PID 19644 started at Fri Jan 8 17:44:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12560: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 19644 at Fri Jan 8 17:44:43 EST 2016 kill -USR1 19644 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19644 killed at Fri Jan 8 17:44:44 EST 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 17:44:44 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:44:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:44:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12561: Waiting for Server - FAILED kill -0 19712 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19712 found at Fri Jan 8 17:44:50 EST 2016 selfserv_9159 with PID 19712 started at Fri Jan 8 17:44:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12562: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 19712 at Fri Jan 8 17:44:50 EST 2016 kill -USR1 19712 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19712 killed at Fri Jan 8 17:44:50 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:44:51 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:44:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:44:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12563: Waiting for Server - FAILED kill -0 19793 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19793 found at Fri Jan 8 17:44:57 EST 2016 selfserv_9159 with PID 19793 started at Fri Jan 8 17:44:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12564: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 19793 at Fri Jan 8 17:44:57 EST 2016 kill -USR1 19793 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19793 killed at Fri Jan 8 17:44:57 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:44:58 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:44:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:45:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12565: Waiting for Server - FAILED kill -0 19861 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19861 found at Fri Jan 8 17:45:03 EST 2016 selfserv_9159 with PID 19861 started at Fri Jan 8 17:45:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12566: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 19861 at Fri Jan 8 17:45:04 EST 2016 kill -USR1 19861 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19861 killed at Fri Jan 8 17:45:04 EST 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:45:04 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:45:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:45:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12567: Waiting for Server - FAILED kill -0 19931 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19931 found at Fri Jan 8 17:45:10 EST 2016 selfserv_9159 with PID 19931 started at Fri Jan 8 17:45:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12568: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 19931 at Fri Jan 8 17:45:11 EST 2016 kill -USR1 19931 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19931 killed at Fri Jan 8 17:45:11 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:45:11 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:45:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:45:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12569: Waiting for Server - FAILED kill -0 20012 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20012 found at Fri Jan 8 17:45:17 EST 2016 selfserv_9159 with PID 20012 started at Fri Jan 8 17:45:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12570: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 20012 at Fri Jan 8 17:45:18 EST 2016 kill -USR1 20012 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20012 killed at Fri Jan 8 17:45:18 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:45:18 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:45:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:45:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12571: Waiting for Server - FAILED kill -0 20080 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20080 found at Fri Jan 8 17:45:24 EST 2016 selfserv_9159 with PID 20080 started at Fri Jan 8 17:45:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12572: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 20080 at Fri Jan 8 17:45:25 EST 2016 kill -USR1 20080 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20080 killed at Fri Jan 8 17:45:25 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:45:25 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:45:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:45:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12573: Waiting for Server - FAILED kill -0 20148 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20148 found at Fri Jan 8 17:45:31 EST 2016 selfserv_9159 with PID 20148 started at Fri Jan 8 17:45:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12574: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 20148 at Fri Jan 8 17:45:32 EST 2016 kill -USR1 20148 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20148 killed at Fri Jan 8 17:45:32 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 17:45:32 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:45:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:45:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12575: Waiting for Server - FAILED kill -0 20230 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20230 found at Fri Jan 8 17:45:38 EST 2016 selfserv_9159 with PID 20230 started at Fri Jan 8 17:45:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12576: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 20230 at Fri Jan 8 17:45:39 EST 2016 kill -USR1 20230 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20230 killed at Fri Jan 8 17:45:39 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 17:45:39 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:45:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:45:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12577: Waiting for Server - FAILED kill -0 20298 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20298 found at Fri Jan 8 17:45:45 EST 2016 selfserv_9159 with PID 20298 started at Fri Jan 8 17:45:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12578: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 20298 at Fri Jan 8 17:45:45 EST 2016 kill -USR1 20298 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20298 killed at Fri Jan 8 17:45:46 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 17:45:46 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:45:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:45:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12579: Waiting for Server - FAILED kill -0 20366 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20366 found at Fri Jan 8 17:45:52 EST 2016 selfserv_9159 with PID 20366 started at Fri Jan 8 17:45:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12580: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 20366 at Fri Jan 8 17:45:52 EST 2016 kill -USR1 20366 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20366 killed at Fri Jan 8 17:45:53 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:45:53 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:45:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:45:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12581: Waiting for Server - FAILED kill -0 20447 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20447 found at Fri Jan 8 17:45:59 EST 2016 selfserv_9159 with PID 20447 started at Fri Jan 8 17:45:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12582: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 20447 at Fri Jan 8 17:45:59 EST 2016 kill -USR1 20447 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20447 killed at Fri Jan 8 17:46:00 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:46:00 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:46:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:46:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12583: Waiting for Server - FAILED kill -0 20515 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20515 found at Fri Jan 8 17:46:06 EST 2016 selfserv_9159 with PID 20515 started at Fri Jan 8 17:46:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12584: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 20515 at Fri Jan 8 17:46:06 EST 2016 kill -USR1 20515 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20515 killed at Fri Jan 8 17:46:07 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:46:07 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:46:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:46:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12585: Waiting for Server - FAILED kill -0 20583 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20583 found at Fri Jan 8 17:46:13 EST 2016 selfserv_9159 with PID 20583 started at Fri Jan 8 17:46:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12586: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 20583 at Fri Jan 8 17:46:13 EST 2016 kill -USR1 20583 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20583 killed at Fri Jan 8 17:46:14 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:46:14 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:46:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:46:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12587: Waiting for Server - FAILED kill -0 20664 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20664 found at Fri Jan 8 17:46:20 EST 2016 selfserv_9159 with PID 20664 started at Fri Jan 8 17:46:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12588: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 20664 at Fri Jan 8 17:46:20 EST 2016 kill -USR1 20664 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20664 killed at Fri Jan 8 17:46:21 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:46:21 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:46:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:46:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12589: Waiting for Server - FAILED kill -0 20732 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20732 found at Fri Jan 8 17:46:27 EST 2016 selfserv_9159 with PID 20732 started at Fri Jan 8 17:46:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12590: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 20732 at Fri Jan 8 17:46:27 EST 2016 kill -USR1 20732 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20732 killed at Fri Jan 8 17:46:27 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:46:28 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:46:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:46:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12591: Waiting for Server - FAILED kill -0 20800 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20800 found at Fri Jan 8 17:46:33 EST 2016 selfserv_9159 with PID 20800 started at Fri Jan 8 17:46:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12592: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 20800 at Fri Jan 8 17:46:34 EST 2016 kill -USR1 20800 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20800 killed at Fri Jan 8 17:46:34 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 17:46:35 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:46:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:46:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12593: Waiting for Server - FAILED kill -0 20881 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20881 found at Fri Jan 8 17:46:40 EST 2016 selfserv_9159 with PID 20881 started at Fri Jan 8 17:46:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12594: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 20881 at Fri Jan 8 17:46:41 EST 2016 kill -USR1 20881 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20881 killed at Fri Jan 8 17:46:41 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 17:46:41 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:46:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:46:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12595: Waiting for Server - FAILED kill -0 20949 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20949 found at Fri Jan 8 17:46:47 EST 2016 selfserv_9159 with PID 20949 started at Fri Jan 8 17:46:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12596: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 20949 at Fri Jan 8 17:46:48 EST 2016 kill -USR1 20949 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20949 killed at Fri Jan 8 17:46:48 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 17:46:48 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:46:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:46:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12597: Waiting for Server - FAILED kill -0 21017 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21017 found at Fri Jan 8 17:46:54 EST 2016 selfserv_9159 with PID 21017 started at Fri Jan 8 17:46:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12598: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 21017 at Fri Jan 8 17:46:55 EST 2016 kill -USR1 21017 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21017 killed at Fri Jan 8 17:46:55 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:46:55 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:46:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:47:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12599: Waiting for Server - FAILED kill -0 21098 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21098 found at Fri Jan 8 17:47:01 EST 2016 selfserv_9159 with PID 21098 started at Fri Jan 8 17:47:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12600: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 21098 at Fri Jan 8 17:47:02 EST 2016 kill -USR1 21098 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21098 killed at Fri Jan 8 17:47:02 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:47:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:47:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:47:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12601: Waiting for Server - FAILED kill -0 21166 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21166 found at Fri Jan 8 17:47:08 EST 2016 selfserv_9159 with PID 21166 started at Fri Jan 8 17:47:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12602: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 21166 at Fri Jan 8 17:47:09 EST 2016 kill -USR1 21166 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21166 killed at Fri Jan 8 17:47:09 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:47:09 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:47:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:47:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12603: Waiting for Server - FAILED kill -0 21234 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21234 found at Fri Jan 8 17:47:15 EST 2016 selfserv_9159 with PID 21234 started at Fri Jan 8 17:47:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12604: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 21234 at Fri Jan 8 17:47:16 EST 2016 kill -USR1 21234 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21234 killed at Fri Jan 8 17:47:16 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:47:16 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:47:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:47:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12605: Waiting for Server - FAILED kill -0 21315 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21315 found at Fri Jan 8 17:47:22 EST 2016 selfserv_9159 with PID 21315 started at Fri Jan 8 17:47:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12606: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 21315 at Fri Jan 8 17:47:23 EST 2016 kill -USR1 21315 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21315 killed at Fri Jan 8 17:47:23 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:47:23 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:47:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:47:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12607: Waiting for Server - FAILED kill -0 21383 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21383 found at Fri Jan 8 17:47:29 EST 2016 selfserv_9159 with PID 21383 started at Fri Jan 8 17:47:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12608: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 21383 at Fri Jan 8 17:47:29 EST 2016 kill -USR1 21383 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21383 killed at Fri Jan 8 17:47:30 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:47:30 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:47:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:47:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12609: Waiting for Server - FAILED kill -0 21451 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21451 found at Fri Jan 8 17:47:36 EST 2016 selfserv_9159 with PID 21451 started at Fri Jan 8 17:47:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12610: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 21451 at Fri Jan 8 17:47:36 EST 2016 kill -USR1 21451 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21451 killed at Fri Jan 8 17:47:37 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 17:47:37 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:47:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:47:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12611: Waiting for Server - FAILED kill -0 21532 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21532 found at Fri Jan 8 17:47:43 EST 2016 selfserv_9159 with PID 21532 started at Fri Jan 8 17:47:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12612: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 21532 at Fri Jan 8 17:47:43 EST 2016 kill -USR1 21532 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21532 killed at Fri Jan 8 17:47:44 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 17:47:44 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:47:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:47:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12613: Waiting for Server - FAILED kill -0 21600 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21600 found at Fri Jan 8 17:47:50 EST 2016 selfserv_9159 with PID 21600 started at Fri Jan 8 17:47:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12614: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 21600 at Fri Jan 8 17:47:50 EST 2016 kill -USR1 21600 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21600 killed at Fri Jan 8 17:47:51 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 17:47:51 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:47:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:47:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12615: Waiting for Server - FAILED kill -0 21668 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21668 found at Fri Jan 8 17:47:57 EST 2016 selfserv_9159 with PID 21668 started at Fri Jan 8 17:47:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12616: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 21668 at Fri Jan 8 17:47:57 EST 2016 kill -USR1 21668 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21668 killed at Fri Jan 8 17:47:58 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:47:58 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:47:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:48:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12617: Waiting for Server - FAILED kill -0 21749 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21749 found at Fri Jan 8 17:48:04 EST 2016 selfserv_9159 with PID 21749 started at Fri Jan 8 17:48:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12618: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 21749 at Fri Jan 8 17:48:04 EST 2016 kill -USR1 21749 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21749 killed at Fri Jan 8 17:48:05 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:48:05 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:48:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:48:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12619: Waiting for Server - FAILED kill -0 21817 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21817 found at Fri Jan 8 17:48:11 EST 2016 selfserv_9159 with PID 21817 started at Fri Jan 8 17:48:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12620: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 21817 at Fri Jan 8 17:48:11 EST 2016 kill -USR1 21817 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21817 killed at Fri Jan 8 17:48:11 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:48:12 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:48:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:48:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12621: Waiting for Server - FAILED kill -0 21885 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21885 found at Fri Jan 8 17:48:17 EST 2016 selfserv_9159 with PID 21885 started at Fri Jan 8 17:48:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12622: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 21885 at Fri Jan 8 17:48:18 EST 2016 kill -USR1 21885 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21885 killed at Fri Jan 8 17:48:18 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:48:18 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:48:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:48:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12623: Waiting for Server - FAILED kill -0 21966 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21966 found at Fri Jan 8 17:48:24 EST 2016 selfserv_9159 with PID 21966 started at Fri Jan 8 17:48:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12624: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 21966 at Fri Jan 8 17:48:25 EST 2016 kill -USR1 21966 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21966 killed at Fri Jan 8 17:48:25 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:48:25 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:48:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:48:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12625: Waiting for Server - FAILED kill -0 22034 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22034 found at Fri Jan 8 17:48:31 EST 2016 selfserv_9159 with PID 22034 started at Fri Jan 8 17:48:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12626: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 22034 at Fri Jan 8 17:48:32 EST 2016 kill -USR1 22034 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22034 killed at Fri Jan 8 17:48:32 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:48:32 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:48:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:48:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12627: Waiting for Server - FAILED kill -0 22102 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22102 found at Fri Jan 8 17:48:38 EST 2016 selfserv_9159 with PID 22102 started at Fri Jan 8 17:48:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12628: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 22102 at Fri Jan 8 17:48:39 EST 2016 kill -USR1 22102 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22102 killed at Fri Jan 8 17:48:39 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 17:48:39 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:48:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:48:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12629: Waiting for Server - FAILED kill -0 22183 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22183 found at Fri Jan 8 17:48:45 EST 2016 selfserv_9159 with PID 22183 started at Fri Jan 8 17:48:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12630: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 22183 at Fri Jan 8 17:48:46 EST 2016 kill -USR1 22183 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22183 killed at Fri Jan 8 17:48:46 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 17:48:46 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:48:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:48:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12631: Waiting for Server - FAILED kill -0 22251 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22251 found at Fri Jan 8 17:48:52 EST 2016 selfserv_9159 with PID 22251 started at Fri Jan 8 17:48:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12632: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 22251 at Fri Jan 8 17:48:53 EST 2016 kill -USR1 22251 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22251 killed at Fri Jan 8 17:48:53 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 17:48:53 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:48:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:48:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12633: Waiting for Server - FAILED kill -0 22319 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22319 found at Fri Jan 8 17:48:59 EST 2016 selfserv_9159 with PID 22319 started at Fri Jan 8 17:48:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12634: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 22319 at Fri Jan 8 17:48:59 EST 2016 kill -USR1 22319 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22319 killed at Fri Jan 8 17:49:00 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:49:00 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:49:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:49:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12635: Waiting for Server - FAILED kill -0 22400 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22400 found at Fri Jan 8 17:49:06 EST 2016 selfserv_9159 with PID 22400 started at Fri Jan 8 17:49:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12636: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 22400 at Fri Jan 8 17:49:06 EST 2016 kill -USR1 22400 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22400 killed at Fri Jan 8 17:49:07 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:49:07 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:49:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:49:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12637: Waiting for Server - FAILED kill -0 22468 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22468 found at Fri Jan 8 17:49:13 EST 2016 selfserv_9159 with PID 22468 started at Fri Jan 8 17:49:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12638: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 22468 at Fri Jan 8 17:49:13 EST 2016 kill -USR1 22468 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22468 killed at Fri Jan 8 17:49:14 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:49:14 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:49:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:49:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12639: Waiting for Server - FAILED kill -0 22536 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22536 found at Fri Jan 8 17:49:20 EST 2016 selfserv_9159 with PID 22536 started at Fri Jan 8 17:49:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12640: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 22536 at Fri Jan 8 17:49:20 EST 2016 kill -USR1 22536 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22536 killed at Fri Jan 8 17:49:21 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:49:21 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:49:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:49:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12641: Waiting for Server - FAILED kill -0 22617 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22617 found at Fri Jan 8 17:49:27 EST 2016 selfserv_9159 with PID 22617 started at Fri Jan 8 17:49:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12642: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 22617 at Fri Jan 8 17:49:27 EST 2016 kill -USR1 22617 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22617 killed at Fri Jan 8 17:49:28 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:49:28 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:49:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:49:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12643: Waiting for Server - FAILED kill -0 22685 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22685 found at Fri Jan 8 17:49:34 EST 2016 selfserv_9159 with PID 22685 started at Fri Jan 8 17:49:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12644: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 22685 at Fri Jan 8 17:49:34 EST 2016 kill -USR1 22685 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22685 killed at Fri Jan 8 17:49:35 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:49:35 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:49:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:49:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12645: Waiting for Server - FAILED kill -0 22753 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22753 found at Fri Jan 8 17:49:41 EST 2016 selfserv_9159 with PID 22753 started at Fri Jan 8 17:49:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12646: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 22753 at Fri Jan 8 17:49:41 EST 2016 kill -USR1 22753 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22753 killed at Fri Jan 8 17:49:41 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 17:49:42 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:49:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:49:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12647: Waiting for Server - FAILED kill -0 22834 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22834 found at Fri Jan 8 17:49:48 EST 2016 selfserv_9159 with PID 22834 started at Fri Jan 8 17:49:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12648: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 22834 at Fri Jan 8 17:49:48 EST 2016 kill -USR1 22834 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22834 killed at Fri Jan 8 17:49:48 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 17:49:49 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:49:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:49:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12649: Waiting for Server - FAILED kill -0 22902 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22902 found at Fri Jan 8 17:49:54 EST 2016 selfserv_9159 with PID 22902 started at Fri Jan 8 17:49:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12650: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 22902 at Fri Jan 8 17:49:55 EST 2016 kill -USR1 22902 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22902 killed at Fri Jan 8 17:49:55 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 17:49:55 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:49:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:50:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12651: Waiting for Server - FAILED kill -0 22970 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22970 found at Fri Jan 8 17:50:01 EST 2016 selfserv_9159 with PID 22970 started at Fri Jan 8 17:50:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12652: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 22970 at Fri Jan 8 17:50:02 EST 2016 kill -USR1 22970 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22970 killed at Fri Jan 8 17:50:02 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:50:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:50:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:50:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12653: Waiting for Server - FAILED kill -0 23051 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23051 found at Fri Jan 8 17:50:08 EST 2016 selfserv_9159 with PID 23051 started at Fri Jan 8 17:50:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12654: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23051 at Fri Jan 8 17:50:09 EST 2016 kill -USR1 23051 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23051 killed at Fri Jan 8 17:50:09 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:50:09 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:50:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:50:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12655: Waiting for Server - FAILED kill -0 23119 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23119 found at Fri Jan 8 17:50:15 EST 2016 selfserv_9159 with PID 23119 started at Fri Jan 8 17:50:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12656: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23119 at Fri Jan 8 17:50:16 EST 2016 kill -USR1 23119 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23119 killed at Fri Jan 8 17:50:16 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:50:16 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:50:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:50:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12657: Waiting for Server - FAILED kill -0 23187 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23187 found at Fri Jan 8 17:50:22 EST 2016 selfserv_9159 with PID 23187 started at Fri Jan 8 17:50:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12658: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23187 at Fri Jan 8 17:50:23 EST 2016 kill -USR1 23187 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23187 killed at Fri Jan 8 17:50:23 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:50:23 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:50:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:50:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12659: Waiting for Server - FAILED kill -0 23268 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23268 found at Fri Jan 8 17:50:29 EST 2016 selfserv_9159 with PID 23268 started at Fri Jan 8 17:50:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12660: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 23268 at Fri Jan 8 17:50:30 EST 2016 kill -USR1 23268 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23268 killed at Fri Jan 8 17:50:30 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:50:30 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:50:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:50:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12661: Waiting for Server - FAILED kill -0 23336 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23336 found at Fri Jan 8 17:50:36 EST 2016 selfserv_9159 with PID 23336 started at Fri Jan 8 17:50:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12662: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23336 at Fri Jan 8 17:50:36 EST 2016 kill -USR1 23336 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23336 killed at Fri Jan 8 17:50:37 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:50:37 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:50:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:50:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12663: Waiting for Server - FAILED kill -0 23404 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23404 found at Fri Jan 8 17:50:43 EST 2016 selfserv_9159 with PID 23404 started at Fri Jan 8 17:50:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12664: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 23404 at Fri Jan 8 17:50:43 EST 2016 kill -USR1 23404 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23404 killed at Fri Jan 8 17:50:44 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 17:50:44 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:50:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:50:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12665: Waiting for Server - FAILED kill -0 23485 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23485 found at Fri Jan 8 17:50:50 EST 2016 selfserv_9159 with PID 23485 started at Fri Jan 8 17:50:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12666: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 23485 at Fri Jan 8 17:50:50 EST 2016 kill -USR1 23485 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23485 killed at Fri Jan 8 17:50:51 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 17:50:51 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:50:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:50:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12667: Waiting for Server - FAILED kill -0 23553 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23553 found at Fri Jan 8 17:50:57 EST 2016 selfserv_9159 with PID 23553 started at Fri Jan 8 17:50:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12668: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 23553 at Fri Jan 8 17:50:57 EST 2016 kill -USR1 23553 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23553 killed at Fri Jan 8 17:50:58 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9159 starting at Fri Jan 8 17:50:58 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:50:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:51:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12669: Waiting for Server - FAILED kill -0 23621 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23621 found at Fri Jan 8 17:51:04 EST 2016 selfserv_9159 with PID 23621 started at Fri Jan 8 17:51:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12670: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 23621 at Fri Jan 8 17:51:04 EST 2016 kill -USR1 23621 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23621 killed at Fri Jan 8 17:51:05 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:51:05 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:51:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:51:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12671: Waiting for Server - FAILED kill -0 23702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23702 found at Fri Jan 8 17:51:11 EST 2016 selfserv_9159 with PID 23702 started at Fri Jan 8 17:51:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12672: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 23702 at Fri Jan 8 17:51:11 EST 2016 kill -USR1 23702 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23702 killed at Fri Jan 8 17:51:12 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:51:12 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:51:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:51:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12673: Waiting for Server - FAILED kill -0 23770 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23770 found at Fri Jan 8 17:51:18 EST 2016 selfserv_9159 with PID 23770 started at Fri Jan 8 17:51:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12674: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 23770 at Fri Jan 8 17:51:18 EST 2016 kill -USR1 23770 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23770 killed at Fri Jan 8 17:51:18 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:51:19 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:51:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:51:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12675: Waiting for Server - FAILED kill -0 23838 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23838 found at Fri Jan 8 17:51:24 EST 2016 selfserv_9159 with PID 23838 started at Fri Jan 8 17:51:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12676: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 23838 at Fri Jan 8 17:51:25 EST 2016 kill -USR1 23838 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23838 killed at Fri Jan 8 17:51:25 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:51:26 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:51:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:51:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12677: Waiting for Server - FAILED kill -0 23919 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23919 found at Fri Jan 8 17:51:31 EST 2016 selfserv_9159 with PID 23919 started at Fri Jan 8 17:51:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12678: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 23919 at Fri Jan 8 17:51:32 EST 2016 kill -USR1 23919 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23919 killed at Fri Jan 8 17:51:32 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:51:32 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:51:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:51:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12679: Waiting for Server - FAILED kill -0 23987 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23987 found at Fri Jan 8 17:51:38 EST 2016 selfserv_9159 with PID 23987 started at Fri Jan 8 17:51:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12680: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 23987 at Fri Jan 8 17:51:39 EST 2016 kill -USR1 23987 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23987 killed at Fri Jan 8 17:51:39 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:51:39 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:51:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:51:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12681: Waiting for Server - FAILED kill -0 24055 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24055 found at Fri Jan 8 17:51:45 EST 2016 selfserv_9159 with PID 24055 started at Fri Jan 8 17:51:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12682: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 24055 at Fri Jan 8 17:51:46 EST 2016 kill -USR1 24055 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24055 killed at Fri Jan 8 17:51:46 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:51:46 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:51:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:51:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12683: Waiting for Server - FAILED kill -0 24145 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24145 found at Fri Jan 8 17:51:52 EST 2016 selfserv_9159 with PID 24145 started at Fri Jan 8 17:51:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12684: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 24145 at Fri Jan 8 17:51:53 EST 2016 kill -USR1 24145 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24145 killed at Fri Jan 8 17:51:53 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:51:53 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:51:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:51:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12685: Waiting for Server - FAILED kill -0 24213 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24213 found at Fri Jan 8 17:51:59 EST 2016 selfserv_9159 with PID 24213 started at Fri Jan 8 17:51:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12686: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 24213 at Fri Jan 8 17:52:00 EST 2016 kill -USR1 24213 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24213 killed at Fri Jan 8 17:52:00 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:52:00 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:52:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:52:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12687: Waiting for Server - FAILED kill -0 24281 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24281 found at Fri Jan 8 17:52:06 EST 2016 selfserv_9159 with PID 24281 started at Fri Jan 8 17:52:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12688: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 24281 at Fri Jan 8 17:52:07 EST 2016 kill -USR1 24281 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24281 killed at Fri Jan 8 17:52:07 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:52:07 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:52:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:52:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12689: Waiting for Server - FAILED kill -0 24362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24362 found at Fri Jan 8 17:52:13 EST 2016 selfserv_9159 with PID 24362 started at Fri Jan 8 17:52:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12690: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 24362 at Fri Jan 8 17:52:13 EST 2016 kill -USR1 24362 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24362 killed at Fri Jan 8 17:52:14 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:52:14 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:52:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:52:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12691: Waiting for Server - FAILED kill -0 24430 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24430 found at Fri Jan 8 17:52:20 EST 2016 selfserv_9159 with PID 24430 started at Fri Jan 8 17:52:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12692: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 24430 at Fri Jan 8 17:52:20 EST 2016 kill -USR1 24430 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24430 killed at Fri Jan 8 17:52:21 EST 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:52:21 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:52:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:52:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12693: Waiting for Server - FAILED kill -0 24498 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24498 found at Fri Jan 8 17:52:27 EST 2016 selfserv_9159 with PID 24498 started at Fri Jan 8 17:52:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12694: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 24498 at Fri Jan 8 17:52:27 EST 2016 kill -USR1 24498 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24498 killed at Fri Jan 8 17:52:28 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:52:28 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:52:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:52:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12695: Waiting for Server - FAILED kill -0 24579 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24579 found at Fri Jan 8 17:52:34 EST 2016 selfserv_9159 with PID 24579 started at Fri Jan 8 17:52:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12696: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 24579 at Fri Jan 8 17:52:34 EST 2016 kill -USR1 24579 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24579 killed at Fri Jan 8 17:52:35 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:52:35 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:52:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:52:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12697: Waiting for Server - FAILED kill -0 24647 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24647 found at Fri Jan 8 17:52:41 EST 2016 selfserv_9159 with PID 24647 started at Fri Jan 8 17:52:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12698: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 24647 at Fri Jan 8 17:52:41 EST 2016 kill -USR1 24647 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24647 killed at Fri Jan 8 17:52:42 EST 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:52:42 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:52:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:52:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12699: Waiting for Server - FAILED kill -0 24715 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24715 found at Fri Jan 8 17:52:48 EST 2016 selfserv_9159 with PID 24715 started at Fri Jan 8 17:52:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12700: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 24715 at Fri Jan 8 17:52:48 EST 2016 kill -USR1 24715 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24715 killed at Fri Jan 8 17:52:49 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:52:49 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:52:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:52:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12701: Waiting for Server - FAILED kill -0 24796 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24796 found at Fri Jan 8 17:52:55 EST 2016 selfserv_9159 with PID 24796 started at Fri Jan 8 17:52:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12702: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 24796 at Fri Jan 8 17:52:55 EST 2016 kill -USR1 24796 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24796 killed at Fri Jan 8 17:52:55 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:52:56 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:52:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:53:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12703: Waiting for Server - FAILED kill -0 24866 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24866 found at Fri Jan 8 17:53:01 EST 2016 selfserv_9159 with PID 24866 started at Fri Jan 8 17:53:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12704: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 24866 at Fri Jan 8 17:53:02 EST 2016 kill -USR1 24866 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24866 killed at Fri Jan 8 17:53:02 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:53:02 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:53:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:53:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12705: Waiting for Server - FAILED kill -0 24934 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24934 found at Fri Jan 8 17:53:08 EST 2016 selfserv_9159 with PID 24934 started at Fri Jan 8 17:53:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12706: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 24934 at Fri Jan 8 17:53:09 EST 2016 kill -USR1 24934 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24934 killed at Fri Jan 8 17:53:09 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:53:09 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:53:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:53:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12707: Waiting for Server - FAILED kill -0 25017 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25017 found at Fri Jan 8 17:53:15 EST 2016 selfserv_9159 with PID 25017 started at Fri Jan 8 17:53:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12708: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 25017 at Fri Jan 8 17:53:16 EST 2016 kill -USR1 25017 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25017 killed at Fri Jan 8 17:53:16 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:53:16 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:53:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:53:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12709: Waiting for Server - FAILED kill -0 25085 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25085 found at Fri Jan 8 17:53:22 EST 2016 selfserv_9159 with PID 25085 started at Fri Jan 8 17:53:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12710: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 25085 at Fri Jan 8 17:53:23 EST 2016 kill -USR1 25085 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25085 killed at Fri Jan 8 17:53:23 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:53:23 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:53:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:53:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12711: Waiting for Server - FAILED kill -0 25155 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25155 found at Fri Jan 8 17:53:29 EST 2016 selfserv_9159 with PID 25155 started at Fri Jan 8 17:53:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12712: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 25155 at Fri Jan 8 17:53:30 EST 2016 kill -USR1 25155 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25155 killed at Fri Jan 8 17:53:30 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:53:30 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:53:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:53:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12713: Waiting for Server - FAILED kill -0 25237 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25237 found at Fri Jan 8 17:53:36 EST 2016 selfserv_9159 with PID 25237 started at Fri Jan 8 17:53:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12714: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 25237 at Fri Jan 8 17:53:37 EST 2016 kill -USR1 25237 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25237 killed at Fri Jan 8 17:53:37 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:53:37 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:53:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:53:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12715: Waiting for Server - FAILED kill -0 25305 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25305 found at Fri Jan 8 17:53:43 EST 2016 selfserv_9159 with PID 25305 started at Fri Jan 8 17:53:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12716: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 25305 at Fri Jan 8 17:53:44 EST 2016 kill -USR1 25305 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25305 killed at Fri Jan 8 17:53:44 EST 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:53:44 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:53:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:53:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12717: Waiting for Server - FAILED kill -0 25373 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25373 found at Fri Jan 8 17:53:50 EST 2016 selfserv_9159 with PID 25373 started at Fri Jan 8 17:53:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12718: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 25373 at Fri Jan 8 17:53:50 EST 2016 kill -USR1 25373 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25373 killed at Fri Jan 8 17:53:51 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:53:51 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:53:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:53:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12719: Waiting for Server - FAILED kill -0 25454 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25454 found at Fri Jan 8 17:53:57 EST 2016 selfserv_9159 with PID 25454 started at Fri Jan 8 17:53:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12720: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 25454 at Fri Jan 8 17:53:57 EST 2016 kill -USR1 25454 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25454 killed at Fri Jan 8 17:53:58 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:53:58 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:53:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:54:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12721: Waiting for Server - FAILED kill -0 25522 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25522 found at Fri Jan 8 17:54:04 EST 2016 selfserv_9159 with PID 25522 started at Fri Jan 8 17:54:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12722: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 25522 at Fri Jan 8 17:54:04 EST 2016 kill -USR1 25522 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25522 killed at Fri Jan 8 17:54:05 EST 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:54:05 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:54:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:54:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12723: Waiting for Server - FAILED kill -0 25590 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25590 found at Fri Jan 8 17:54:11 EST 2016 selfserv_9159 with PID 25590 started at Fri Jan 8 17:54:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12724: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 25590 at Fri Jan 8 17:54:11 EST 2016 kill -USR1 25590 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25590 killed at Fri Jan 8 17:54:12 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:54:12 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:54:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:54:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12725: Waiting for Server - FAILED kill -0 25671 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25671 found at Fri Jan 8 17:54:18 EST 2016 selfserv_9159 with PID 25671 started at Fri Jan 8 17:54:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12726: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 25671 at Fri Jan 8 17:54:18 EST 2016 kill -USR1 25671 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25671 killed at Fri Jan 8 17:54:19 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:54:19 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:54:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:54:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12727: Waiting for Server - FAILED kill -0 25739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25739 found at Fri Jan 8 17:54:25 EST 2016 selfserv_9159 with PID 25739 started at Fri Jan 8 17:54:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12728: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 25739 at Fri Jan 8 17:54:25 EST 2016 kill -USR1 25739 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25739 killed at Fri Jan 8 17:54:26 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:54:26 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:54:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:54:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12729: Waiting for Server - FAILED kill -0 25808 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25808 found at Fri Jan 8 17:54:32 EST 2016 selfserv_9159 with PID 25808 started at Fri Jan 8 17:54:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12730: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 25808 at Fri Jan 8 17:54:32 EST 2016 kill -USR1 25808 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25808 killed at Fri Jan 8 17:54:32 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:54:33 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:54:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:54:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12731: Waiting for Server - FAILED kill -0 25888 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25888 found at Fri Jan 8 17:54:38 EST 2016 selfserv_9159 with PID 25888 started at Fri Jan 8 17:54:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12732: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 25888 at Fri Jan 8 17:54:39 EST 2016 kill -USR1 25888 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25888 killed at Fri Jan 8 17:54:39 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:54:39 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:54:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:54:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12733: Waiting for Server - FAILED kill -0 25956 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25956 found at Fri Jan 8 17:54:45 EST 2016 selfserv_9159 with PID 25956 started at Fri Jan 8 17:54:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12734: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 25956 at Fri Jan 8 17:54:46 EST 2016 kill -USR1 25956 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25956 killed at Fri Jan 8 17:54:46 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:54:46 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:54:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:54:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12735: Waiting for Server - FAILED kill -0 26025 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26025 found at Fri Jan 8 17:54:52 EST 2016 selfserv_9159 with PID 26025 started at Fri Jan 8 17:54:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12736: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 26025 at Fri Jan 8 17:54:53 EST 2016 kill -USR1 26025 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26025 killed at Fri Jan 8 17:54:53 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:54:53 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:54:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:54:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12737: Waiting for Server - FAILED kill -0 26105 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26105 found at Fri Jan 8 17:54:59 EST 2016 selfserv_9159 with PID 26105 started at Fri Jan 8 17:54:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12738: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 26105 at Fri Jan 8 17:55:00 EST 2016 kill -USR1 26105 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26105 killed at Fri Jan 8 17:55:00 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:55:00 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:55:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:55:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12739: Waiting for Server - FAILED kill -0 26173 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26173 found at Fri Jan 8 17:55:06 EST 2016 selfserv_9159 with PID 26173 started at Fri Jan 8 17:55:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12740: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 26173 at Fri Jan 8 17:55:07 EST 2016 kill -USR1 26173 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26173 killed at Fri Jan 8 17:55:07 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:55:07 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:55:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:55:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12741: Waiting for Server - FAILED kill -0 26242 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26242 found at Fri Jan 8 17:55:13 EST 2016 selfserv_9159 with PID 26242 started at Fri Jan 8 17:55:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12742: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 26242 at Fri Jan 8 17:55:14 EST 2016 kill -USR1 26242 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26242 killed at Fri Jan 8 17:55:14 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:55:14 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:55:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:55:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12743: Waiting for Server - FAILED kill -0 26322 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26322 found at Fri Jan 8 17:55:20 EST 2016 selfserv_9159 with PID 26322 started at Fri Jan 8 17:55:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12744: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 26322 at Fri Jan 8 17:55:21 EST 2016 kill -USR1 26322 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26322 killed at Fri Jan 8 17:55:21 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:55:21 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:55:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:55:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12745: Waiting for Server - FAILED kill -0 26390 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26390 found at Fri Jan 8 17:55:27 EST 2016 selfserv_9159 with PID 26390 started at Fri Jan 8 17:55:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12746: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 26390 at Fri Jan 8 17:55:27 EST 2016 kill -USR1 26390 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26390 killed at Fri Jan 8 17:55:28 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:55:28 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:55:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:55:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12747: Waiting for Server - FAILED kill -0 26459 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26459 found at Fri Jan 8 17:55:34 EST 2016 selfserv_9159 with PID 26459 started at Fri Jan 8 17:55:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12748: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 26459 at Fri Jan 8 17:55:34 EST 2016 kill -USR1 26459 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26459 killed at Fri Jan 8 17:55:35 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:55:35 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:55:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:55:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12749: Waiting for Server - FAILED kill -0 26539 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26539 found at Fri Jan 8 17:55:41 EST 2016 selfserv_9159 with PID 26539 started at Fri Jan 8 17:55:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12750: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 26539 at Fri Jan 8 17:55:41 EST 2016 kill -USR1 26539 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26539 killed at Fri Jan 8 17:55:42 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:55:42 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:55:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:55:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12751: Waiting for Server - FAILED kill -0 26607 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26607 found at Fri Jan 8 17:55:48 EST 2016 selfserv_9159 with PID 26607 started at Fri Jan 8 17:55:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12752: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 26607 at Fri Jan 8 17:55:48 EST 2016 kill -USR1 26607 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26607 killed at Fri Jan 8 17:55:49 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:55:49 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:55:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:55:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12753: Waiting for Server - FAILED kill -0 26676 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26676 found at Fri Jan 8 17:55:55 EST 2016 selfserv_9159 with PID 26676 started at Fri Jan 8 17:55:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12754: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 26676 at Fri Jan 8 17:55:55 EST 2016 kill -USR1 26676 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26676 killed at Fri Jan 8 17:55:56 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:55:56 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:55:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:56:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12755: Waiting for Server - FAILED kill -0 26756 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26756 found at Fri Jan 8 17:56:02 EST 2016 selfserv_9159 with PID 26756 started at Fri Jan 8 17:56:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12756: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 26756 at Fri Jan 8 17:56:02 EST 2016 kill -USR1 26756 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26756 killed at Fri Jan 8 17:56:03 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:56:03 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:56:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:56:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12757: Waiting for Server - FAILED kill -0 26824 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26824 found at Fri Jan 8 17:56:09 EST 2016 selfserv_9159 with PID 26824 started at Fri Jan 8 17:56:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12758: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 26824 at Fri Jan 8 17:56:09 EST 2016 kill -USR1 26824 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26824 killed at Fri Jan 8 17:56:09 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:56:10 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:56:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:56:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12759: Waiting for Server - FAILED kill -0 26893 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26893 found at Fri Jan 8 17:56:15 EST 2016 selfserv_9159 with PID 26893 started at Fri Jan 8 17:56:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12760: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 26893 at Fri Jan 8 17:56:16 EST 2016 kill -USR1 26893 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26893 killed at Fri Jan 8 17:56:16 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:56:17 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:56:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:56:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12761: Waiting for Server - FAILED kill -0 26973 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26973 found at Fri Jan 8 17:56:22 EST 2016 selfserv_9159 with PID 26973 started at Fri Jan 8 17:56:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12762: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 26973 at Fri Jan 8 17:56:23 EST 2016 kill -USR1 26973 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26973 killed at Fri Jan 8 17:56:23 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:56:23 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:56:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:56:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12763: Waiting for Server - FAILED kill -0 27042 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 27042 found at Fri Jan 8 17:56:29 EST 2016 selfserv_9159 with PID 27042 started at Fri Jan 8 17:56:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12764: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 27042 at Fri Jan 8 17:56:30 EST 2016 kill -USR1 27042 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27042 killed at Fri Jan 8 17:56:30 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:56:30 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:56:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:56:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12765: Waiting for Server - FAILED kill -0 27112 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 27112 found at Fri Jan 8 17:56:36 EST 2016 selfserv_9159 with PID 27112 started at Fri Jan 8 17:56:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12766: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 27112 at Fri Jan 8 17:56:37 EST 2016 kill -USR1 27112 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27112 killed at Fri Jan 8 17:56:37 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:56:37 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:56:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:56:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12767: Waiting for Server - FAILED kill -0 27194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 27194 found at Fri Jan 8 17:56:43 EST 2016 selfserv_9159 with PID 27194 started at Fri Jan 8 17:56:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12768: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 27194 at Fri Jan 8 17:56:44 EST 2016 kill -USR1 27194 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27194 killed at Fri Jan 8 17:56:44 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:56:44 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:56:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:56:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12769: Waiting for Server - FAILED kill -0 27262 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 27262 found at Fri Jan 8 17:56:50 EST 2016 selfserv_9159 with PID 27262 started at Fri Jan 8 17:56:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12770: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 27262 at Fri Jan 8 17:56:51 EST 2016 kill -USR1 27262 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27262 killed at Fri Jan 8 17:56:51 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:56:51 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:56:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:56:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12771: Waiting for Server - FAILED kill -0 27331 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 27331 found at Fri Jan 8 17:56:57 EST 2016 selfserv_9159 with PID 27331 started at Fri Jan 8 17:56:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12772: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 27331 at Fri Jan 8 17:56:58 EST 2016 kill -USR1 27331 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27331 killed at Fri Jan 8 17:56:58 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:56:58 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:56:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:57:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12773: Waiting for Server - FAILED kill -0 27411 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 27411 found at Fri Jan 8 17:57:04 EST 2016 selfserv_9159 with PID 27411 started at Fri Jan 8 17:57:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12774: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 27411 at Fri Jan 8 17:57:05 EST 2016 kill -USR1 27411 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27411 killed at Fri Jan 8 17:57:05 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:57:05 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:57:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:57:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12775: Waiting for Server - FAILED kill -0 27479 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 27479 found at Fri Jan 8 17:57:11 EST 2016 selfserv_9159 with PID 27479 started at Fri Jan 8 17:57:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12776: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 27479 at Fri Jan 8 17:57:11 EST 2016 kill -USR1 27479 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27479 killed at Fri Jan 8 17:57:12 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:57:12 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:57:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:57:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12777: Waiting for Server - FAILED kill -0 27548 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 27548 found at Fri Jan 8 17:57:18 EST 2016 selfserv_9159 with PID 27548 started at Fri Jan 8 17:57:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12778: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 27548 at Fri Jan 8 17:57:18 EST 2016 kill -USR1 27548 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27548 killed at Fri Jan 8 17:57:19 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:57:19 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:57:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:57:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12779: Waiting for Server - FAILED kill -0 27628 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 27628 found at Fri Jan 8 17:57:25 EST 2016 selfserv_9159 with PID 27628 started at Fri Jan 8 17:57:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12780: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 27628 at Fri Jan 8 17:57:25 EST 2016 kill -USR1 27628 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27628 killed at Fri Jan 8 17:57:26 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:57:26 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:57:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:57:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12781: Waiting for Server - FAILED kill -0 27696 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 27696 found at Fri Jan 8 17:57:32 EST 2016 selfserv_9159 with PID 27696 started at Fri Jan 8 17:57:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12782: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 27696 at Fri Jan 8 17:57:32 EST 2016 kill -USR1 27696 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27696 killed at Fri Jan 8 17:57:33 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:57:33 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:57:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:57:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12783: Waiting for Server - FAILED kill -0 27765 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 27765 found at Fri Jan 8 17:57:39 EST 2016 selfserv_9159 with PID 27765 started at Fri Jan 8 17:57:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12784: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 27765 at Fri Jan 8 17:57:39 EST 2016 kill -USR1 27765 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27765 killed at Fri Jan 8 17:57:40 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:57:40 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:57:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:57:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12785: Waiting for Server - FAILED kill -0 27845 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 27845 found at Fri Jan 8 17:57:46 EST 2016 selfserv_9159 with PID 27845 started at Fri Jan 8 17:57:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12786: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 27845 at Fri Jan 8 17:57:46 EST 2016 kill -USR1 27845 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27845 killed at Fri Jan 8 17:57:46 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:57:47 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:57:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:57:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12787: Waiting for Server - FAILED kill -0 27913 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 27913 found at Fri Jan 8 17:57:52 EST 2016 selfserv_9159 with PID 27913 started at Fri Jan 8 17:57:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12788: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 27913 at Fri Jan 8 17:57:53 EST 2016 kill -USR1 27913 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27913 killed at Fri Jan 8 17:57:53 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:57:53 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:57:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:57:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12789: Waiting for Server - FAILED kill -0 27982 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 27982 found at Fri Jan 8 17:57:59 EST 2016 selfserv_9159 with PID 27982 started at Fri Jan 8 17:57:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12790: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 27982 at Fri Jan 8 17:58:00 EST 2016 kill -USR1 27982 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 27982 killed at Fri Jan 8 17:58:00 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:58:00 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:58:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:58:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12791: Waiting for Server - FAILED kill -0 28062 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28062 found at Fri Jan 8 17:58:06 EST 2016 selfserv_9159 with PID 28062 started at Fri Jan 8 17:58:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12792: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 28062 at Fri Jan 8 17:58:07 EST 2016 kill -USR1 28062 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28062 killed at Fri Jan 8 17:58:07 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:58:07 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:58:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:58:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12793: Waiting for Server - FAILED kill -0 28130 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28130 found at Fri Jan 8 17:58:13 EST 2016 selfserv_9159 with PID 28130 started at Fri Jan 8 17:58:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12794: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 28130 at Fri Jan 8 17:58:14 EST 2016 kill -USR1 28130 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28130 killed at Fri Jan 8 17:58:14 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9159 starting at Fri Jan 8 17:58:14 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:58:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:58:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12795: Waiting for Server - FAILED kill -0 28199 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28199 found at Fri Jan 8 17:58:20 EST 2016 selfserv_9159 with PID 28199 started at Fri Jan 8 17:58:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12796: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 28199 at Fri Jan 8 17:58:21 EST 2016 kill -USR1 28199 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28199 killed at Fri Jan 8 17:58:21 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:58:21 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:58:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:58:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12797: Waiting for Server - FAILED kill -0 28279 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28279 found at Fri Jan 8 17:58:27 EST 2016 selfserv_9159 with PID 28279 started at Fri Jan 8 17:58:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12798: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 28279 at Fri Jan 8 17:58:28 EST 2016 kill -USR1 28279 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28279 killed at Fri Jan 8 17:58:28 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:58:28 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:58:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:58:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12799: Waiting for Server - FAILED kill -0 28347 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28347 found at Fri Jan 8 17:58:34 EST 2016 selfserv_9159 with PID 28347 started at Fri Jan 8 17:58:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12800: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 28347 at Fri Jan 8 17:58:35 EST 2016 kill -USR1 28347 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28347 killed at Fri Jan 8 17:58:35 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:58:35 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:58:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:58:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12801: Waiting for Server - FAILED kill -0 28416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28416 found at Fri Jan 8 17:58:41 EST 2016 selfserv_9159 with PID 28416 started at Fri Jan 8 17:58:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12802: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 28416 at Fri Jan 8 17:58:41 EST 2016 kill -USR1 28416 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28416 killed at Fri Jan 8 17:58:42 EST 2016 ssl.sh: Cache CRL SSL Client Tests - with ECC =============================== /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/authin.tl.tmp 0 selfserv_9159 starting at Fri Jan 8 17:58:42 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:58:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:58:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12803: Waiting for Server - FAILED kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:58:48 EST 2016 selfserv_9159 with PID 28491 started at Fri Jan 8 17:58:48 EST 2016 Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:58:48 EST 2016 ssl.sh: #12804: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:58:49 EST 2016 ssl.sh: #12805: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:58:50 EST 2016 ssl.sh: #12806: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:58:50 EST 2016 ssl.sh: #12807: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:58:51 EST 2016 ssl.sh: #12808: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:58:51 EST 2016 ssl.sh: #12809: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:58:52 EST 2016 ssl.sh: #12810: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:58:52 EST 2016 ssl.sh: #12811: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:58:53 EST 2016 ssl.sh: #12812: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:58:53 EST 2016 ssl.sh: #12813: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:58:54 EST 2016 ssl.sh: #12814: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:58:55 EST 2016 ssl.sh: #12815: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:58:55 EST 2016 ssl.sh: #12816: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:58:56 EST 2016 ================= CRL Reloaded ============= ssl.sh: #12817: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:58:56 EST 2016 ssl.sh: #12818: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:58:57 EST 2016 ssl.sh: #12819: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:58:57 EST 2016 ssl.sh: #12820: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:58:58 EST 2016 ssl.sh: #12821: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:58:58 EST 2016 ssl.sh: #12822: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:58:59 EST 2016 ssl.sh: #12823: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:59:00 EST 2016 ssl.sh: #12824: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:59:00 EST 2016 ssl.sh: #12825: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:59:01 EST 2016 ssl.sh: #12826: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:59:01 EST 2016 ssl.sh: #12827: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:59:02 EST 2016 ssl.sh: #12828: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:59:02 EST 2016 ssl.sh: #12829: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:59:03 EST 2016 ssl.sh: #12830: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:59:04 EST 2016 ================= CRL Reloaded ============= ssl.sh: #12831: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:59:04 EST 2016 ssl.sh: #12832: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:59:05 EST 2016 ssl.sh: #12833: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:59:05 EST 2016 ssl.sh: #12834: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:59:06 EST 2016 ssl.sh: #12835: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:59:06 EST 2016 ssl.sh: #12836: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:59:07 EST 2016 ssl.sh: #12837: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:59:07 EST 2016 ssl.sh: #12838: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:59:08 EST 2016 ssl.sh: #12839: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:59:09 EST 2016 ssl.sh: #12840: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:59:09 EST 2016 ssl.sh: #12841: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:59:10 EST 2016 ssl.sh: #12842: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:59:10 EST 2016 ssl.sh: #12843: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28491 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 28491 found at Fri Jan 8 17:59:11 EST 2016 ssl.sh: #12844: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 28491 at Fri Jan 8 17:59:11 EST 2016 kill -USR1 28491 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 28491 killed at Fri Jan 8 17:59:11 EST 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:59:11 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:59:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:59:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12845: Waiting for Server - FAILED kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:17 EST 2016 selfserv_9159 with PID 29926 started at Fri Jan 8 17:59:17 EST 2016 Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:18 EST 2016 ssl.sh: #12846: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:18 EST 2016 ssl.sh: #12847: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:19 EST 2016 ssl.sh: #12848: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:20 EST 2016 ssl.sh: #12849: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:20 EST 2016 ssl.sh: #12850: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:21 EST 2016 ssl.sh: #12851: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:21 EST 2016 ssl.sh: #12852: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:22 EST 2016 ssl.sh: #12853: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:22 EST 2016 ssl.sh: #12854: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:23 EST 2016 ssl.sh: #12855: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:23 EST 2016 ssl.sh: #12856: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:24 EST 2016 ssl.sh: #12857: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:25 EST 2016 ssl.sh: #12858: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:25 EST 2016 ================= CRL Reloaded ============= ssl.sh: #12859: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:26 EST 2016 ssl.sh: #12860: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:26 EST 2016 ssl.sh: #12861: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:27 EST 2016 ssl.sh: #12862: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:27 EST 2016 ssl.sh: #12863: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:28 EST 2016 ssl.sh: #12864: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:28 EST 2016 ssl.sh: #12865: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:29 EST 2016 ssl.sh: #12866: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:30 EST 2016 ssl.sh: #12867: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:30 EST 2016 ssl.sh: #12868: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:31 EST 2016 ssl.sh: #12869: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:31 EST 2016 ssl.sh: #12870: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:32 EST 2016 ssl.sh: #12871: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:32 EST 2016 ssl.sh: #12872: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:33 EST 2016 ================= CRL Reloaded ============= ssl.sh: #12873: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:34 EST 2016 ssl.sh: #12874: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:34 EST 2016 ssl.sh: #12875: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:35 EST 2016 ssl.sh: #12876: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:35 EST 2016 ssl.sh: #12877: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:36 EST 2016 ssl.sh: #12878: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:36 EST 2016 ssl.sh: #12879: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:37 EST 2016 ssl.sh: #12880: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:37 EST 2016 ssl.sh: #12881: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:38 EST 2016 ssl.sh: #12882: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:39 EST 2016 ssl.sh: #12883: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:39 EST 2016 ssl.sh: #12884: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:40 EST 2016 ssl.sh: #12885: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29926 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 29926 found at Fri Jan 8 17:59:40 EST 2016 ssl.sh: #12886: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 29926 at Fri Jan 8 17:59:40 EST 2016 kill -USR1 29926 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 29926 killed at Fri Jan 8 17:59:41 EST 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9159 starting at Fri Jan 8 17:59:41 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 17:59:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 17:59:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12887: Waiting for Server - FAILED kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 17:59:47 EST 2016 selfserv_9159 with PID 31362 started at Fri Jan 8 17:59:47 EST 2016 Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 17:59:47 EST 2016 ssl.sh: #12888: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 17:59:48 EST 2016 ssl.sh: #12889: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 17:59:48 EST 2016 ssl.sh: #12890: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 17:59:49 EST 2016 ssl.sh: #12891: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 17:59:50 EST 2016 ssl.sh: #12892: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 17:59:50 EST 2016 ssl.sh: #12893: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 17:59:51 EST 2016 ssl.sh: #12894: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 17:59:51 EST 2016 ssl.sh: #12895: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 17:59:52 EST 2016 ssl.sh: #12896: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 17:59:52 EST 2016 ssl.sh: #12897: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 17:59:53 EST 2016 ssl.sh: #12898: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 17:59:54 EST 2016 ssl.sh: #12899: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 17:59:54 EST 2016 ssl.sh: #12900: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 17:59:55 EST 2016 ================= CRL Reloaded ============= ssl.sh: #12901: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 17:59:55 EST 2016 ssl.sh: #12902: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 17:59:56 EST 2016 ssl.sh: #12903: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 17:59:56 EST 2016 ssl.sh: #12904: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 17:59:57 EST 2016 ssl.sh: #12905: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 17:59:57 EST 2016 ssl.sh: #12906: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 17:59:58 EST 2016 ssl.sh: #12907: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 17:59:59 EST 2016 ssl.sh: #12908: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 17:59:59 EST 2016 ssl.sh: #12909: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 18:00:00 EST 2016 ssl.sh: #12910: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 18:00:00 EST 2016 ssl.sh: #12911: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 18:00:01 EST 2016 ssl.sh: #12912: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 18:00:01 EST 2016 ssl.sh: #12913: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 18:00:02 EST 2016 ssl.sh: #12914: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 18:00:02 EST 2016 ================= CRL Reloaded ============= ssl.sh: #12915: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 18:00:03 EST 2016 ssl.sh: #12916: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 18:00:04 EST 2016 ssl.sh: #12917: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 18:00:04 EST 2016 ssl.sh: #12918: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 18:00:05 EST 2016 ssl.sh: #12919: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 18:00:05 EST 2016 ssl.sh: #12920: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 18:00:06 EST 2016 ssl.sh: #12921: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 18:00:06 EST 2016 ssl.sh: #12922: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 18:00:07 EST 2016 ssl.sh: #12923: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 18:00:07 EST 2016 ssl.sh: #12924: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 18:00:08 EST 2016 ssl.sh: #12925: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 18:00:09 EST 2016 ssl.sh: #12926: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 18:00:09 EST 2016 ssl.sh: #12927: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 31362 found at Fri Jan 8 18:00:10 EST 2016 ssl.sh: #12928: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 31362 at Fri Jan 8 18:00:10 EST 2016 kill -USR1 31362 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 31362 killed at Fri Jan 8 18:00:10 EST 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 18:00:10 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:00:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:00:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12929: Waiting for Server - FAILED kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:16 EST 2016 selfserv_9159 with PID 329 started at Fri Jan 8 18:00:16 EST 2016 Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:17 EST 2016 ssl.sh: #12930: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:17 EST 2016 ssl.sh: #12931: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:18 EST 2016 ssl.sh: #12932: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:18 EST 2016 ssl.sh: #12933: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:19 EST 2016 ssl.sh: #12934: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:20 EST 2016 ssl.sh: #12935: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:20 EST 2016 ssl.sh: #12936: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:21 EST 2016 ssl.sh: #12937: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:21 EST 2016 ssl.sh: #12938: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:22 EST 2016 ssl.sh: #12939: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:22 EST 2016 ssl.sh: #12940: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:23 EST 2016 ssl.sh: #12941: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:24 EST 2016 ssl.sh: #12942: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:24 EST 2016 ================= CRL Reloaded ============= ssl.sh: #12943: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:25 EST 2016 ssl.sh: #12944: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:25 EST 2016 ssl.sh: #12945: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:26 EST 2016 ssl.sh: #12946: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:26 EST 2016 ssl.sh: #12947: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:27 EST 2016 ssl.sh: #12948: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:27 EST 2016 ssl.sh: #12949: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:28 EST 2016 ssl.sh: #12950: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:29 EST 2016 ssl.sh: #12951: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:29 EST 2016 ssl.sh: #12952: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:30 EST 2016 ssl.sh: #12953: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:30 EST 2016 ssl.sh: #12954: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:31 EST 2016 ssl.sh: #12955: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:31 EST 2016 ssl.sh: #12956: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:32 EST 2016 ================= CRL Reloaded ============= ssl.sh: #12957: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:33 EST 2016 ssl.sh: #12958: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:33 EST 2016 ssl.sh: #12959: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:34 EST 2016 ssl.sh: #12960: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:34 EST 2016 ssl.sh: #12961: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:35 EST 2016 ssl.sh: #12962: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:35 EST 2016 ssl.sh: #12963: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:36 EST 2016 ssl.sh: #12964: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:36 EST 2016 ssl.sh: #12965: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:37 EST 2016 ssl.sh: #12966: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:38 EST 2016 ssl.sh: #12967: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:38 EST 2016 ssl.sh: #12968: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:39 EST 2016 ssl.sh: #12969: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V :ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 329 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 329 found at Fri Jan 8 18:00:39 EST 2016 ssl.sh: #12970: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9159 with PID 329 at Fri Jan 8 18:00:39 EST 2016 kill -USR1 329 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 329 killed at Fri Jan 8 18:00:40 EST 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 18:00:40 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:00:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:00:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12971: Waiting for Server - FAILED kill -0 1795 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1795 found at Fri Jan 8 18:00:46 EST 2016 selfserv_9159 with PID 1795 started at Fri Jan 8 18:00:46 EST 2016 trying to kill selfserv_9159 with PID 1795 at Fri Jan 8 18:00:46 EST 2016 kill -USR1 1795 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1795 killed at Fri Jan 8 18:00:46 EST 2016 selfserv_9159 starting at Fri Jan 8 18:00:46 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:00:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:00:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #12972: Waiting for Server - FAILED kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:00:52 EST 2016 selfserv_9159 with PID 1849 started at Fri Jan 8 18:00:52 EST 2016 Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:00:53 EST 2016 ssl.sh: #12973: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:00:53 EST 2016 ssl.sh: #12974: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:00:54 EST 2016 ssl.sh: #12975: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:00:54 EST 2016 ssl.sh: #12976: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:00:55 EST 2016 ssl.sh: #12977: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:00:55 EST 2016 ssl.sh: #12978: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:00:56 EST 2016 ssl.sh: #12979: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:00:57 EST 2016 ssl.sh: #12980: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:00:57 EST 2016 ssl.sh: #12981: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:00:58 EST 2016 ssl.sh: #12982: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:00:58 EST 2016 ssl.sh: #12983: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:00:59 EST 2016 ssl.sh: #12984: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:00:59 EST 2016 ssl.sh: #12985: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:01:00 EST 2016 ================= CRL Reloaded ============= ssl.sh: #12986: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:01:01 EST 2016 ssl.sh: #12987: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:01:01 EST 2016 ssl.sh: #12988: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:01:02 EST 2016 ssl.sh: #12989: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:01:02 EST 2016 ssl.sh: #12990: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:01:03 EST 2016 ssl.sh: #12991: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:01:03 EST 2016 ssl.sh: #12992: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:01:04 EST 2016 ssl.sh: #12993: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:01:04 EST 2016 ssl.sh: #12994: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:01:05 EST 2016 ssl.sh: #12995: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:01:06 EST 2016 ssl.sh: #12996: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:01:06 EST 2016 ssl.sh: #12997: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:01:07 EST 2016 ssl.sh: #12998: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:01:07 EST 2016 ssl.sh: #12999: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:01:08 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13000: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:01:08 EST 2016 ssl.sh: #13001: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:01:09 EST 2016 ssl.sh: #13002: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:01:10 EST 2016 ssl.sh: #13003: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:01:10 EST 2016 ssl.sh: #13004: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:01:11 EST 2016 ssl.sh: #13005: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:01:11 EST 2016 ssl.sh: #13006: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:01:12 EST 2016 ssl.sh: #13007: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:01:12 EST 2016 ssl.sh: #13008: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:01:13 EST 2016 ssl.sh: #13009: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:01:13 EST 2016 ssl.sh: #13010: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:01:14 EST 2016 ssl.sh: #13011: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:01:15 EST 2016 ssl.sh: #13012: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1849 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 1849 found at Fri Jan 8 18:01:15 EST 2016 ssl.sh: #13013: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 1849 at Fri Jan 8 18:01:15 EST 2016 kill -USR1 1849 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 1849 killed at Fri Jan 8 18:01:16 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 18:01:16 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:01:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:01:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13014: Waiting for Server - FAILED kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:22 EST 2016 selfserv_9159 with PID 3299 started at Fri Jan 8 18:01:22 EST 2016 Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:22 EST 2016 ssl.sh: #13015: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:23 EST 2016 ssl.sh: #13016: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:23 EST 2016 ssl.sh: #13017: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:24 EST 2016 ssl.sh: #13018: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:24 EST 2016 ssl.sh: #13019: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:25 EST 2016 ssl.sh: #13020: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:26 EST 2016 ssl.sh: #13021: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:26 EST 2016 ssl.sh: #13022: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:27 EST 2016 ssl.sh: #13023: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:27 EST 2016 ssl.sh: #13024: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:28 EST 2016 ssl.sh: #13025: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:28 EST 2016 ssl.sh: #13026: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:29 EST 2016 ssl.sh: #13027: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:30 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13028: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:30 EST 2016 ssl.sh: #13029: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:31 EST 2016 ssl.sh: #13030: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:31 EST 2016 ssl.sh: #13031: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:32 EST 2016 ssl.sh: #13032: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:32 EST 2016 ssl.sh: #13033: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:33 EST 2016 ssl.sh: #13034: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:33 EST 2016 ssl.sh: #13035: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:34 EST 2016 ssl.sh: #13036: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:35 EST 2016 ssl.sh: #13037: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:35 EST 2016 ssl.sh: #13038: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:36 EST 2016 ssl.sh: #13039: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:36 EST 2016 ssl.sh: #13040: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:37 EST 2016 ssl.sh: #13041: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:37 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13042: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:38 EST 2016 ssl.sh: #13043: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:38 EST 2016 ssl.sh: #13044: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:39 EST 2016 ssl.sh: #13045: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:40 EST 2016 ssl.sh: #13046: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:40 EST 2016 ssl.sh: #13047: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:41 EST 2016 ssl.sh: #13048: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:41 EST 2016 ssl.sh: #13049: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:42 EST 2016 ssl.sh: #13050: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:42 EST 2016 ssl.sh: #13051: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:43 EST 2016 ssl.sh: #13052: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:44 EST 2016 ssl.sh: #13053: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:44 EST 2016 ssl.sh: #13054: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3299 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 3299 found at Fri Jan 8 18:01:45 EST 2016 ssl.sh: #13055: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 3299 at Fri Jan 8 18:01:45 EST 2016 kill -USR1 3299 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 3299 killed at Fri Jan 8 18:01:45 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 18:01:45 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:01:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:01:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13056: Waiting for Server - FAILED kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:01:51 EST 2016 selfserv_9159 with PID 4739 started at Fri Jan 8 18:01:51 EST 2016 Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:01:52 EST 2016 ssl.sh: #13057: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:01:52 EST 2016 ssl.sh: #13058: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:01:53 EST 2016 ssl.sh: #13059: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:01:53 EST 2016 ssl.sh: #13060: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:01:54 EST 2016 ssl.sh: #13061: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:01:55 EST 2016 ssl.sh: #13062: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:01:55 EST 2016 ssl.sh: #13063: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:01:56 EST 2016 ssl.sh: #13064: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:01:56 EST 2016 ssl.sh: #13065: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:01:57 EST 2016 ssl.sh: #13066: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:01:57 EST 2016 ssl.sh: #13067: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:01:58 EST 2016 ssl.sh: #13068: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:01:59 EST 2016 ssl.sh: #13069: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:01:59 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13070: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:02:00 EST 2016 ssl.sh: #13071: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:02:00 EST 2016 ssl.sh: #13072: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:02:01 EST 2016 ssl.sh: #13073: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:02:01 EST 2016 ssl.sh: #13074: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:02:02 EST 2016 ssl.sh: #13075: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:02:02 EST 2016 ssl.sh: #13076: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:02:03 EST 2016 ssl.sh: #13077: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:02:03 EST 2016 ssl.sh: #13078: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:02:04 EST 2016 ssl.sh: #13079: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:02:05 EST 2016 ssl.sh: #13080: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:02:05 EST 2016 ssl.sh: #13081: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:02:06 EST 2016 ssl.sh: #13082: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:02:06 EST 2016 ssl.sh: #13083: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:02:07 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13084: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:02:07 EST 2016 ssl.sh: #13085: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:02:08 EST 2016 ssl.sh: #13086: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:02:09 EST 2016 ssl.sh: #13087: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:02:09 EST 2016 ssl.sh: #13088: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:02:10 EST 2016 ssl.sh: #13089: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:02:10 EST 2016 ssl.sh: #13090: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:02:11 EST 2016 ssl.sh: #13091: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:02:11 EST 2016 ssl.sh: #13092: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:02:12 EST 2016 ssl.sh: #13093: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:02:12 EST 2016 ssl.sh: #13094: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:02:13 EST 2016 ssl.sh: #13095: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:02:14 EST 2016 ssl.sh: #13096: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4739 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 4739 found at Fri Jan 8 18:02:14 EST 2016 ssl.sh: #13097: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 4739 at Fri Jan 8 18:02:14 EST 2016 kill -USR1 4739 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 4739 killed at Fri Jan 8 18:02:15 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 18:02:15 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:02:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:02:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13098: Waiting for Server - FAILED kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:21 EST 2016 selfserv_9159 with PID 6174 started at Fri Jan 8 18:02:21 EST 2016 Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:21 EST 2016 ssl.sh: #13099: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:22 EST 2016 ssl.sh: #13100: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:22 EST 2016 ssl.sh: #13101: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:23 EST 2016 ssl.sh: #13102: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:23 EST 2016 ssl.sh: #13103: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:24 EST 2016 ssl.sh: #13104: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:25 EST 2016 ssl.sh: #13105: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:25 EST 2016 ssl.sh: #13106: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:26 EST 2016 ssl.sh: #13107: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:26 EST 2016 ssl.sh: #13108: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:27 EST 2016 ssl.sh: #13109: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:27 EST 2016 ssl.sh: #13110: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:28 EST 2016 ssl.sh: #13111: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:29 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13112: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:29 EST 2016 ssl.sh: #13113: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:30 EST 2016 ssl.sh: #13114: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:30 EST 2016 ssl.sh: #13115: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:31 EST 2016 ssl.sh: #13116: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:31 EST 2016 ssl.sh: #13117: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:32 EST 2016 ssl.sh: #13118: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:32 EST 2016 ssl.sh: #13119: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:33 EST 2016 ssl.sh: #13120: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:34 EST 2016 ssl.sh: #13121: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:34 EST 2016 ssl.sh: #13122: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:35 EST 2016 ssl.sh: #13123: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:35 EST 2016 ssl.sh: #13124: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:36 EST 2016 ssl.sh: #13125: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:36 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13126: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:37 EST 2016 ssl.sh: #13127: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:37 EST 2016 ssl.sh: #13128: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:38 EST 2016 ssl.sh: #13129: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:39 EST 2016 ssl.sh: #13130: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:39 EST 2016 ssl.sh: #13131: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:40 EST 2016 ssl.sh: #13132: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:40 EST 2016 ssl.sh: #13133: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:41 EST 2016 ssl.sh: #13134: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:41 EST 2016 ssl.sh: #13135: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:42 EST 2016 ssl.sh: #13136: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:43 EST 2016 ssl.sh: #13137: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:43 EST 2016 ssl.sh: #13138: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6174 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 6174 found at Fri Jan 8 18:02:44 EST 2016 ssl.sh: #13139: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 6174 at Fri Jan 8 18:02:44 EST 2016 kill -USR1 6174 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 6174 killed at Fri Jan 8 18:02:44 EST 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 18:02:44 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:02:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:02:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13140: Waiting for Server - FAILED kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:02:50 EST 2016 selfserv_9159 with PID 7612 started at Fri Jan 8 18:02:50 EST 2016 Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:02:51 EST 2016 ssl.sh: #13141: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:02:51 EST 2016 ssl.sh: #13142: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:02:52 EST 2016 ssl.sh: #13143: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:02:52 EST 2016 ssl.sh: #13144: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:02:53 EST 2016 ssl.sh: #13145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:02:54 EST 2016 ssl.sh: #13146: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:02:54 EST 2016 ssl.sh: #13147: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:02:55 EST 2016 ssl.sh: #13148: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:02:55 EST 2016 ssl.sh: #13149: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:02:56 EST 2016 ssl.sh: #13150: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:02:56 EST 2016 ssl.sh: #13151: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:02:57 EST 2016 ssl.sh: #13152: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:02:58 EST 2016 ssl.sh: #13153: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:02:58 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13154: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:02:59 EST 2016 ssl.sh: #13155: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:02:59 EST 2016 ssl.sh: #13156: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:03:00 EST 2016 ssl.sh: #13157: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:03:00 EST 2016 ssl.sh: #13158: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:03:01 EST 2016 ssl.sh: #13159: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:03:01 EST 2016 ssl.sh: #13160: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:03:02 EST 2016 ssl.sh: #13161: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:03:03 EST 2016 ssl.sh: #13162: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:03:03 EST 2016 ssl.sh: #13163: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:03:04 EST 2016 ssl.sh: #13164: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:03:04 EST 2016 ssl.sh: #13165: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:03:05 EST 2016 ssl.sh: #13166: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:03:05 EST 2016 ssl.sh: #13167: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:03:06 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13168: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:03:06 EST 2016 ssl.sh: #13169: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:03:07 EST 2016 ssl.sh: #13170: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:03:08 EST 2016 ssl.sh: #13171: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:03:08 EST 2016 ssl.sh: #13172: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:03:09 EST 2016 ssl.sh: #13173: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:03:09 EST 2016 ssl.sh: #13174: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:03:10 EST 2016 ssl.sh: #13175: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:03:10 EST 2016 ssl.sh: #13176: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:03:11 EST 2016 ssl.sh: #13177: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:03:12 EST 2016 ssl.sh: #13178: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:03:12 EST 2016 ssl.sh: #13179: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:03:13 EST 2016 ssl.sh: #13180: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 7612 found at Fri Jan 8 18:03:13 EST 2016 ssl.sh: #13181: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 7612 at Fri Jan 8 18:03:13 EST 2016 kill -USR1 7612 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 7612 killed at Fri Jan 8 18:03:14 EST 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 18:03:14 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:03:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:03:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13182: Waiting for Server - FAILED kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:20 EST 2016 selfserv_9159 with PID 9047 started at Fri Jan 8 18:03:20 EST 2016 Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:20 EST 2016 ssl.sh: #13183: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:21 EST 2016 ssl.sh: #13184: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:21 EST 2016 ssl.sh: #13185: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:22 EST 2016 ssl.sh: #13186: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:22 EST 2016 ssl.sh: #13187: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:23 EST 2016 ssl.sh: #13188: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:24 EST 2016 ssl.sh: #13189: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:24 EST 2016 ssl.sh: #13190: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:25 EST 2016 ssl.sh: #13191: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:25 EST 2016 ssl.sh: #13192: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:26 EST 2016 ssl.sh: #13193: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:26 EST 2016 ssl.sh: #13194: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:27 EST 2016 ssl.sh: #13195: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:28 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13196: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:28 EST 2016 ssl.sh: #13197: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:29 EST 2016 ssl.sh: #13198: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:29 EST 2016 ssl.sh: #13199: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:30 EST 2016 ssl.sh: #13200: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:30 EST 2016 ssl.sh: #13201: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:31 EST 2016 ssl.sh: #13202: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:31 EST 2016 ssl.sh: #13203: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:32 EST 2016 ssl.sh: #13204: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:33 EST 2016 ssl.sh: #13205: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:33 EST 2016 ssl.sh: #13206: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:34 EST 2016 ssl.sh: #13207: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:34 EST 2016 ssl.sh: #13208: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:35 EST 2016 ssl.sh: #13209: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:35 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13210: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:36 EST 2016 ssl.sh: #13211: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:37 EST 2016 ssl.sh: #13212: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:37 EST 2016 ssl.sh: #13213: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:38 EST 2016 ssl.sh: #13214: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:38 EST 2016 ssl.sh: #13215: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:39 EST 2016 ssl.sh: #13216: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:39 EST 2016 ssl.sh: #13217: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:40 EST 2016 ssl.sh: #13218: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:40 EST 2016 ssl.sh: #13219: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:41 EST 2016 ssl.sh: #13220: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:42 EST 2016 ssl.sh: #13221: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:42 EST 2016 ssl.sh: #13222: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9047 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 9047 found at Fri Jan 8 18:03:43 EST 2016 ssl.sh: #13223: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 9047 at Fri Jan 8 18:03:43 EST 2016 kill -USR1 9047 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 9047 killed at Fri Jan 8 18:03:43 EST 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 18:03:43 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:03:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:03:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13224: Waiting for Server - FAILED kill -0 10488 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10488 found at Fri Jan 8 18:03:49 EST 2016 selfserv_9159 with PID 10488 started at Fri Jan 8 18:03:49 EST 2016 trying to kill selfserv_9159 with PID 10488 at Fri Jan 8 18:03:49 EST 2016 kill -USR1 10488 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10488 killed at Fri Jan 8 18:03:50 EST 2016 selfserv_9159 starting at Fri Jan 8 18:03:50 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:03:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:03:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13225: Waiting for Server - FAILED kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:03:56 EST 2016 selfserv_9159 with PID 10542 started at Fri Jan 8 18:03:56 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:03:56 EST 2016 ssl.sh: #13226: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:03:57 EST 2016 ssl.sh: #13227: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:03:57 EST 2016 ssl.sh: #13228: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:03:58 EST 2016 ssl.sh: #13229: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:03:58 EST 2016 ssl.sh: #13230: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:03:59 EST 2016 ssl.sh: #13231: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:00 EST 2016 ssl.sh: #13232: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:00 EST 2016 ssl.sh: #13233: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:01 EST 2016 ssl.sh: #13234: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:01 EST 2016 ssl.sh: #13235: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:02 EST 2016 ssl.sh: #13236: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:02 EST 2016 ssl.sh: #13237: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:03 EST 2016 ssl.sh: #13238: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:04 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13239: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:04 EST 2016 ssl.sh: #13240: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:05 EST 2016 ssl.sh: #13241: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:05 EST 2016 ssl.sh: #13242: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:06 EST 2016 ssl.sh: #13243: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:06 EST 2016 ssl.sh: #13244: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:07 EST 2016 ssl.sh: #13245: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:07 EST 2016 ssl.sh: #13246: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:08 EST 2016 ssl.sh: #13247: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:09 EST 2016 ssl.sh: #13248: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:09 EST 2016 ssl.sh: #13249: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:10 EST 2016 ssl.sh: #13250: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:10 EST 2016 ssl.sh: #13251: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:11 EST 2016 ssl.sh: #13252: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:11 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13253: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:12 EST 2016 ssl.sh: #13254: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:13 EST 2016 ssl.sh: #13255: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:13 EST 2016 ssl.sh: #13256: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:14 EST 2016 ssl.sh: #13257: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:14 EST 2016 ssl.sh: #13258: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:15 EST 2016 ssl.sh: #13259: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:15 EST 2016 ssl.sh: #13260: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:16 EST 2016 ssl.sh: #13261: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:16 EST 2016 ssl.sh: #13262: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:17 EST 2016 ssl.sh: #13263: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:18 EST 2016 ssl.sh: #13264: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:18 EST 2016 ssl.sh: #13265: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10542 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 10542 found at Fri Jan 8 18:04:19 EST 2016 ssl.sh: #13266: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 10542 at Fri Jan 8 18:04:19 EST 2016 kill -USR1 10542 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 10542 killed at Fri Jan 8 18:04:19 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 18:04:19 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:04:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:04:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13267: Waiting for Server - FAILED kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:25 EST 2016 selfserv_9159 with PID 11979 started at Fri Jan 8 18:04:25 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:26 EST 2016 ssl.sh: #13268: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:26 EST 2016 ssl.sh: #13269: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:27 EST 2016 ssl.sh: #13270: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:27 EST 2016 ssl.sh: #13271: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:28 EST 2016 ssl.sh: #13272: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:29 EST 2016 ssl.sh: #13273: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:29 EST 2016 ssl.sh: #13274: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:30 EST 2016 ssl.sh: #13275: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:30 EST 2016 ssl.sh: #13276: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:31 EST 2016 ssl.sh: #13277: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:31 EST 2016 ssl.sh: #13278: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:32 EST 2016 ssl.sh: #13279: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:33 EST 2016 ssl.sh: #13280: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:33 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13281: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:34 EST 2016 ssl.sh: #13282: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:34 EST 2016 ssl.sh: #13283: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:35 EST 2016 ssl.sh: #13284: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:35 EST 2016 ssl.sh: #13285: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:36 EST 2016 ssl.sh: #13286: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:36 EST 2016 ssl.sh: #13287: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:37 EST 2016 ssl.sh: #13288: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:38 EST 2016 ssl.sh: #13289: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:38 EST 2016 ssl.sh: #13290: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:39 EST 2016 ssl.sh: #13291: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:39 EST 2016 ssl.sh: #13292: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:40 EST 2016 ssl.sh: #13293: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:40 EST 2016 ssl.sh: #13294: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:41 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13295: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:42 EST 2016 ssl.sh: #13296: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:42 EST 2016 ssl.sh: #13297: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:43 EST 2016 ssl.sh: #13298: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:43 EST 2016 ssl.sh: #13299: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:44 EST 2016 ssl.sh: #13300: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:44 EST 2016 ssl.sh: #13301: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:45 EST 2016 ssl.sh: #13302: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:45 EST 2016 ssl.sh: #13303: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:46 EST 2016 ssl.sh: #13304: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:47 EST 2016 ssl.sh: #13305: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:47 EST 2016 ssl.sh: #13306: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:48 EST 2016 ssl.sh: #13307: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11979 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 11979 found at Fri Jan 8 18:04:48 EST 2016 ssl.sh: #13308: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 11979 at Fri Jan 8 18:04:48 EST 2016 kill -USR1 11979 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 11979 killed at Fri Jan 8 18:04:49 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 18:04:49 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:04:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:04:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13309: Waiting for Server - FAILED kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:04:55 EST 2016 selfserv_9159 with PID 13416 started at Fri Jan 8 18:04:55 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:04:55 EST 2016 ssl.sh: #13310: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:04:56 EST 2016 ssl.sh: #13311: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:04:56 EST 2016 ssl.sh: #13312: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:04:57 EST 2016 ssl.sh: #13313: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:04:58 EST 2016 ssl.sh: #13314: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:04:58 EST 2016 ssl.sh: #13315: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:04:59 EST 2016 ssl.sh: #13316: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:04:59 EST 2016 ssl.sh: #13317: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:00 EST 2016 ssl.sh: #13318: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:00 EST 2016 ssl.sh: #13319: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:01 EST 2016 ssl.sh: #13320: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:02 EST 2016 ssl.sh: #13321: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:02 EST 2016 ssl.sh: #13322: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:03 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13323: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:03 EST 2016 ssl.sh: #13324: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:04 EST 2016 ssl.sh: #13325: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:04 EST 2016 ssl.sh: #13326: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:05 EST 2016 ssl.sh: #13327: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:05 EST 2016 ssl.sh: #13328: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:06 EST 2016 ssl.sh: #13329: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:07 EST 2016 ssl.sh: #13330: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:07 EST 2016 ssl.sh: #13331: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:08 EST 2016 ssl.sh: #13332: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:08 EST 2016 ssl.sh: #13333: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:09 EST 2016 ssl.sh: #13334: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:09 EST 2016 ssl.sh: #13335: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:10 EST 2016 ssl.sh: #13336: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:11 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13337: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:11 EST 2016 ssl.sh: #13338: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:12 EST 2016 ssl.sh: #13339: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:12 EST 2016 ssl.sh: #13340: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:13 EST 2016 ssl.sh: #13341: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:13 EST 2016 ssl.sh: #13342: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:14 EST 2016 ssl.sh: #13343: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:14 EST 2016 ssl.sh: #13344: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:15 EST 2016 ssl.sh: #13345: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:16 EST 2016 ssl.sh: #13346: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:16 EST 2016 ssl.sh: #13347: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:17 EST 2016 ssl.sh: #13348: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:17 EST 2016 ssl.sh: #13349: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13416 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 13416 found at Fri Jan 8 18:05:18 EST 2016 ssl.sh: #13350: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 13416 at Fri Jan 8 18:05:18 EST 2016 kill -USR1 13416 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 13416 killed at Fri Jan 8 18:05:18 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9159 starting at Fri Jan 8 18:05:18 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:05:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:05:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13351: Waiting for Server - FAILED kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:24 EST 2016 selfserv_9159 with PID 14851 started at Fri Jan 8 18:05:24 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:25 EST 2016 ssl.sh: #13352: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:25 EST 2016 ssl.sh: #13353: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:26 EST 2016 ssl.sh: #13354: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:27 EST 2016 ssl.sh: #13355: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:27 EST 2016 ssl.sh: #13356: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:28 EST 2016 ssl.sh: #13357: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:28 EST 2016 ssl.sh: #13358: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:29 EST 2016 ssl.sh: #13359: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:29 EST 2016 ssl.sh: #13360: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:30 EST 2016 ssl.sh: #13361: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:31 EST 2016 ssl.sh: #13362: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:31 EST 2016 ssl.sh: #13363: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:32 EST 2016 ssl.sh: #13364: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:32 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13365: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:33 EST 2016 ssl.sh: #13366: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:33 EST 2016 ssl.sh: #13367: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:34 EST 2016 ssl.sh: #13368: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:34 EST 2016 ssl.sh: #13369: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:35 EST 2016 ssl.sh: #13370: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:36 EST 2016 ssl.sh: #13371: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:36 EST 2016 ssl.sh: #13372: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:37 EST 2016 ssl.sh: #13373: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:37 EST 2016 ssl.sh: #13374: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:38 EST 2016 ssl.sh: #13375: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:38 EST 2016 ssl.sh: #13376: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:39 EST 2016 ssl.sh: #13377: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:40 EST 2016 ssl.sh: #13378: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:40 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13379: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:41 EST 2016 ssl.sh: #13380: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:41 EST 2016 ssl.sh: #13381: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:42 EST 2016 ssl.sh: #13382: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:42 EST 2016 ssl.sh: #13383: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:43 EST 2016 ssl.sh: #13384: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:43 EST 2016 ssl.sh: #13385: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:44 EST 2016 ssl.sh: #13386: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:45 EST 2016 ssl.sh: #13387: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:45 EST 2016 ssl.sh: #13388: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:46 EST 2016 ssl.sh: #13389: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:46 EST 2016 ssl.sh: #13390: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:47 EST 2016 ssl.sh: #13391: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 14851 found at Fri Jan 8 18:05:48 EST 2016 ssl.sh: #13392: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 14851 at Fri Jan 8 18:05:48 EST 2016 kill -USR1 14851 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 14851 killed at Fri Jan 8 18:05:48 EST 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 18:05:48 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:05:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:05:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13393: Waiting for Server - FAILED kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:05:54 EST 2016 selfserv_9159 with PID 16288 started at Fri Jan 8 18:05:54 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:05:55 EST 2016 ssl.sh: #13394: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:05:55 EST 2016 ssl.sh: #13395: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:05:56 EST 2016 ssl.sh: #13396: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:05:56 EST 2016 ssl.sh: #13397: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:05:57 EST 2016 ssl.sh: #13398: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:05:57 EST 2016 ssl.sh: #13399: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:05:58 EST 2016 ssl.sh: #13400: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:05:58 EST 2016 ssl.sh: #13401: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:05:59 EST 2016 ssl.sh: #13402: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:06:00 EST 2016 ssl.sh: #13403: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:06:00 EST 2016 ssl.sh: #13404: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:06:01 EST 2016 ssl.sh: #13405: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:06:01 EST 2016 ssl.sh: #13406: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:06:02 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13407: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:06:02 EST 2016 ssl.sh: #13408: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:06:03 EST 2016 ssl.sh: #13409: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:06:03 EST 2016 ssl.sh: #13410: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:06:04 EST 2016 ssl.sh: #13411: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:06:05 EST 2016 ssl.sh: #13412: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:06:05 EST 2016 ssl.sh: #13413: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:06:06 EST 2016 ssl.sh: #13414: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:06:06 EST 2016 ssl.sh: #13415: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:06:07 EST 2016 ssl.sh: #13416: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:06:07 EST 2016 ssl.sh: #13417: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:06:08 EST 2016 ssl.sh: #13418: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:06:09 EST 2016 ssl.sh: #13419: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:06:09 EST 2016 ssl.sh: #13420: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:06:10 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13421: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:06:10 EST 2016 ssl.sh: #13422: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:06:11 EST 2016 ssl.sh: #13423: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:06:11 EST 2016 ssl.sh: #13424: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:06:12 EST 2016 ssl.sh: #13425: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:06:12 EST 2016 ssl.sh: #13426: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:06:13 EST 2016 ssl.sh: #13427: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:06:14 EST 2016 ssl.sh: #13428: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:06:14 EST 2016 ssl.sh: #13429: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:06:15 EST 2016 ssl.sh: #13430: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:06:15 EST 2016 ssl.sh: #13431: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:06:16 EST 2016 ssl.sh: #13432: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:06:16 EST 2016 ssl.sh: #13433: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16288 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 16288 found at Fri Jan 8 18:06:17 EST 2016 ssl.sh: #13434: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 16288 at Fri Jan 8 18:06:17 EST 2016 kill -USR1 16288 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 16288 killed at Fri Jan 8 18:06:18 EST 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 18:06:18 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:06:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:06:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13435: Waiting for Server - FAILED kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:24 EST 2016 selfserv_9159 with PID 17724 started at Fri Jan 8 18:06:24 EST 2016 Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:24 EST 2016 ssl.sh: #13436: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:25 EST 2016 ssl.sh: #13437: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:25 EST 2016 ssl.sh: #13438: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:26 EST 2016 ssl.sh: #13439: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:26 EST 2016 ssl.sh: #13440: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:27 EST 2016 ssl.sh: #13441: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:27 EST 2016 ssl.sh: #13442: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:28 EST 2016 ssl.sh: #13443: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:28 EST 2016 ssl.sh: #13444: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:29 EST 2016 ssl.sh: #13445: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:30 EST 2016 ssl.sh: #13446: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:30 EST 2016 ssl.sh: #13447: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:31 EST 2016 ssl.sh: #13448: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:31 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13449: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:32 EST 2016 ssl.sh: #13450: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:32 EST 2016 ssl.sh: #13451: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:33 EST 2016 ssl.sh: #13452: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:34 EST 2016 ssl.sh: #13453: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:34 EST 2016 ssl.sh: #13454: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:35 EST 2016 ssl.sh: #13455: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:35 EST 2016 ssl.sh: #13456: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:36 EST 2016 ssl.sh: #13457: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:36 EST 2016 ssl.sh: #13458: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:37 EST 2016 ssl.sh: #13459: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:38 EST 2016 ssl.sh: #13460: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:38 EST 2016 ssl.sh: #13461: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:39 EST 2016 ssl.sh: #13462: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:39 EST 2016 ================= CRL Reloaded ============= ssl.sh: #13463: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:40 EST 2016 ssl.sh: #13464: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:40 EST 2016 ssl.sh: #13465: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:41 EST 2016 ssl.sh: #13466: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:41 EST 2016 ssl.sh: #13467: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:42 EST 2016 ssl.sh: #13468: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:43 EST 2016 ssl.sh: #13469: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:43 EST 2016 ssl.sh: #13470: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:44 EST 2016 ssl.sh: #13471: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:44 EST 2016 ssl.sh: #13472: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:45 EST 2016 ssl.sh: #13473: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:45 EST 2016 ssl.sh: #13474: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:46 EST 2016 ssl.sh: #13475: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17724 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 17724 found at Fri Jan 8 18:06:47 EST 2016 ssl.sh: #13476: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9159 with PID 17724 at Fri Jan 8 18:06:47 EST 2016 kill -USR1 17724 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 17724 killed at Fri Jan 8 18:06:47 EST 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9159 starting at Fri Jan 8 18:06:47 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:06:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:06:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13477: Waiting for Server - FAILED kill -0 19161 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19161 found at Fri Jan 8 18:06:53 EST 2016 selfserv_9159 with PID 19161 started at Fri Jan 8 18:06:53 EST 2016 trying to kill selfserv_9159 with PID 19161 at Fri Jan 8 18:06:53 EST 2016 kill -USR1 19161 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19161 killed at Fri Jan 8 18:06:54 EST 2016 ssl.sh: SSL Cert Status (OCSP Stapling) - server bypass/client bypass - with ECC =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9159 starting at Fri Jan 8 18:06:54 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T good \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:06:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:06:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13478: Waiting for Server - FAILED kill -0 19221 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19221 found at Fri Jan 8 18:07:00 EST 2016 selfserv_9159 with PID 19221 started at Fri Jan 8 18:07:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13479: OCSP stapling, signed response, good status produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9159 with PID 19221 at Fri Jan 8 18:07:00 EST 2016 kill -USR1 19221 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19221 killed at Fri Jan 8 18:07:00 EST 2016 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9159 starting at Fri Jan 8 18:07:01 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T revoked \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:07:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:07:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13480: Waiting for Server - FAILED kill -0 19282 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19282 found at Fri Jan 8 18:07:06 EST 2016 selfserv_9159 with PID 19282 started at Fri Jan 8 18:07:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13481: OCSP stapling, signed response, revoked status produced a returncode of 1, expected is 3 - FAILED trying to kill selfserv_9159 with PID 19282 at Fri Jan 8 18:07:07 EST 2016 kill -USR1 19282 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19282 killed at Fri Jan 8 18:07:07 EST 2016 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9159 starting at Fri Jan 8 18:07:07 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T unknown \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:07:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:07:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13482: Waiting for Server - FAILED kill -0 19344 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19344 found at Fri Jan 8 18:07:13 EST 2016 selfserv_9159 with PID 19344 started at Fri Jan 8 18:07:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13483: OCSP stapling, signed response, unknown status produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9159 with PID 19344 at Fri Jan 8 18:07:14 EST 2016 kill -USR1 19344 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19344 killed at Fri Jan 8 18:07:14 EST 2016 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9159 starting at Fri Jan 8 18:07:14 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T failure \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:07:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:07:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13484: Waiting for Server - FAILED kill -0 19405 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19405 found at Fri Jan 8 18:07:20 EST 2016 selfserv_9159 with PID 19405 started at Fri Jan 8 18:07:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13485: OCSP stapling, unsigned failure response produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9159 with PID 19405 at Fri Jan 8 18:07:21 EST 2016 kill -USR1 19405 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19405 killed at Fri Jan 8 18:07:21 EST 2016 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9159 starting at Fri Jan 8 18:07:21 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T badsig \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:07:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:07:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13486: Waiting for Server - FAILED kill -0 19466 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19466 found at Fri Jan 8 18:07:27 EST 2016 selfserv_9159 with PID 19466 started at Fri Jan 8 18:07:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13487: OCSP stapling, good status, bad signature produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9159 with PID 19466 at Fri Jan 8 18:07:28 EST 2016 kill -USR1 19466 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19466 killed at Fri Jan 8 18:07:28 EST 2016 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9159 starting at Fri Jan 8 18:07:28 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T corrupted \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:07:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:07:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13488: Waiting for Server - FAILED kill -0 19528 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19528 found at Fri Jan 8 18:07:34 EST 2016 selfserv_9159 with PID 19528 started at Fri Jan 8 18:07:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13489: OCSP stapling, invalid cert status data produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9159 with PID 19528 at Fri Jan 8 18:07:35 EST 2016 kill -USR1 19528 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19528 killed at Fri Jan 8 18:07:35 EST 2016 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9159 starting at Fri Jan 8 18:07:35 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:07:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:07:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13490: Waiting for Server - FAILED kill -0 19589 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19589 found at Fri Jan 8 18:07:41 EST 2016 selfserv_9159 with PID 19589 started at Fri Jan 8 18:07:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13491: Valid cert, Server doesn't staple produced a returncode of 1, expected is 2 - FAILED trying to kill selfserv_9159 with PID 19589 at Fri Jan 8 18:07:41 EST 2016 kill -USR1 19589 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19589 killed at Fri Jan 8 18:07:42 EST 2016 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9159 starting at Fri Jan 8 18:07:42 EST 2016 selfserv_9159 -D -p 9159 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T random \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:07:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:07:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13492: Waiting for Server - FAILED kill -0 19650 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19650 found at Fri Jan 8 18:07:48 EST 2016 selfserv_9159 with PID 19650 started at Fri Jan 8 18:07:48 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss \ -c 1000 -V ssl3: -N -T localhost.localdomain strsclnt started at Fri Jan 8 18:07:48 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:07:48 EST 2016 ssl.sh: #13493: Stress OCSP stapling, server uses random status produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 19650 at Fri Jan 8 18:07:48 EST 2016 kill -USR1 19650 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19650 killed at Fri Jan 8 18:07:49 EST 2016 ssl.sh: SSL Stress Test - server bypass/client bypass - with ECC =============================== ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9159 starting at Fri Jan 8 18:07:49 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:07:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:07:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13494: Waiting for Server - FAILED kill -0 19803 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19803 found at Fri Jan 8 18:07:55 EST 2016 selfserv_9159 with PID 19803 started at Fri Jan 8 18:07:55 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -c 1000 -C c -V :ssl3 \ localhost.localdomain strsclnt started at Fri Jan 8 18:07:55 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:07:56 EST 2016 ssl.sh: #13495: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 19803 at Fri Jan 8 18:07:56 EST 2016 kill -USR1 19803 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19803 killed at Fri Jan 8 18:07:56 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9159 starting at Fri Jan 8 18:07:56 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:07:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:08:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13496: Waiting for Server - FAILED kill -0 19882 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19882 found at Fri Jan 8 18:08:02 EST 2016 selfserv_9159 with PID 19882 started at Fri Jan 8 18:08:02 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Fri Jan 8 18:08:02 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:08:03 EST 2016 ssl.sh: #13497: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 19882 at Fri Jan 8 18:08:03 EST 2016 kill -USR1 19882 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19882 killed at Fri Jan 8 18:08:03 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9159 starting at Fri Jan 8 18:08:03 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:08:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:08:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13498: Waiting for Server - FAILED kill -0 19963 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 19963 found at Fri Jan 8 18:08:09 EST 2016 selfserv_9159 with PID 19963 started at Fri Jan 8 18:08:09 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Fri Jan 8 18:08:09 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:08:10 EST 2016 ssl.sh: #13499: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 19963 at Fri Jan 8 18:08:10 EST 2016 kill -USR1 19963 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 19963 killed at Fri Jan 8 18:08:10 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9159 starting at Fri Jan 8 18:08:11 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:08:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:08:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13500: Waiting for Server - FAILED kill -0 20043 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20043 found at Fri Jan 8 18:08:16 EST 2016 selfserv_9159 with PID 20043 started at Fri Jan 8 18:08:16 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 18:08:16 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:08:17 EST 2016 ssl.sh: #13501: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 20043 at Fri Jan 8 18:08:17 EST 2016 kill -USR1 20043 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20043 killed at Fri Jan 8 18:08:18 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9159 starting at Fri Jan 8 18:08:18 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:08:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:08:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13502: Waiting for Server - FAILED kill -0 20122 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20122 found at Fri Jan 8 18:08:24 EST 2016 selfserv_9159 with PID 20122 started at Fri Jan 8 18:08:24 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Fri Jan 8 18:08:24 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:08:24 EST 2016 ssl.sh: #13503: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 20122 at Fri Jan 8 18:08:24 EST 2016 kill -USR1 20122 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20122 killed at Fri Jan 8 18:08:25 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9159 starting at Fri Jan 8 18:08:25 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:08:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:08:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13504: Waiting for Server - FAILED kill -0 20202 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20202 found at Fri Jan 8 18:08:31 EST 2016 selfserv_9159 with PID 20202 started at Fri Jan 8 18:08:31 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 18:08:31 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:08:31 EST 2016 ssl.sh: #13505: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 20202 at Fri Jan 8 18:08:31 EST 2016 kill -USR1 20202 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20202 killed at Fri Jan 8 18:08:32 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9159 starting at Fri Jan 8 18:08:32 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:08:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:08:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13506: Waiting for Server - FAILED kill -0 20282 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20282 found at Fri Jan 8 18:08:38 EST 2016 selfserv_9159 with PID 20282 started at Fri Jan 8 18:08:38 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 18:08:38 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:08:38 EST 2016 ssl.sh: #13507: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 20282 at Fri Jan 8 18:08:38 EST 2016 kill -USR1 20282 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20282 killed at Fri Jan 8 18:08:39 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9159 starting at Fri Jan 8 18:08:39 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:08:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:08:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13508: Waiting for Server - FAILED kill -0 20367 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20367 found at Fri Jan 8 18:08:45 EST 2016 selfserv_9159 with PID 20367 started at Fri Jan 8 18:08:45 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 18:08:45 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:08:45 EST 2016 ssl.sh: #13509: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 20367 at Fri Jan 8 18:08:45 EST 2016 kill -USR1 20367 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20367 killed at Fri Jan 8 18:08:46 EST 2016 ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 18:08:46 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:08:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:08:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13510: Waiting for Server - FAILED kill -0 20474 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20474 found at Fri Jan 8 18:08:52 EST 2016 selfserv_9159 with PID 20474 started at Fri Jan 8 18:08:52 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -c 100 -C c -V :ssl3 -N -n TestUser \ localhost.localdomain strsclnt started at Fri Jan 8 18:08:52 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:08:53 EST 2016 ssl.sh: #13511: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 20474 at Fri Jan 8 18:08:53 EST 2016 kill -USR1 20474 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20474 killed at Fri Jan 8 18:08:53 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 18:08:53 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:08:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:08:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13512: Waiting for Server - FAILED kill -0 20554 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20554 found at Fri Jan 8 18:08:59 EST 2016 selfserv_9159 with PID 20554 started at Fri Jan 8 18:08:59 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Fri Jan 8 18:08:59 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:09:00 EST 2016 ssl.sh: #13513: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 20554 at Fri Jan 8 18:09:00 EST 2016 kill -USR1 20554 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20554 killed at Fri Jan 8 18:09:00 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9159 starting at Fri Jan 8 18:09:00 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:09:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:09:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13514: Waiting for Server - FAILED kill -0 20633 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20633 found at Fri Jan 8 18:09:06 EST 2016 selfserv_9159 with PID 20633 started at Fri Jan 8 18:09:06 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Fri Jan 8 18:09:06 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:09:07 EST 2016 ssl.sh: #13515: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 20633 at Fri Jan 8 18:09:07 EST 2016 kill -USR1 20633 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20633 killed at Fri Jan 8 18:09:07 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9159 starting at Fri Jan 8 18:09:07 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:09:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:09:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13516: Waiting for Server - FAILED kill -0 20712 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20712 found at Fri Jan 8 18:09:13 EST 2016 selfserv_9159 with PID 20712 started at Fri Jan 8 18:09:13 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Fri Jan 8 18:09:13 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:09:14 EST 2016 ssl.sh: #13517: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 20712 at Fri Jan 8 18:09:14 EST 2016 kill -USR1 20712 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20712 killed at Fri Jan 8 18:09:14 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9159 starting at Fri Jan 8 18:09:15 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:09:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:09:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13518: Waiting for Server - FAILED kill -0 20792 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20792 found at Fri Jan 8 18:09:20 EST 2016 selfserv_9159 with PID 20792 started at Fri Jan 8 18:09:20 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 18:09:20 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:09:21 EST 2016 ssl.sh: #13519: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 20792 at Fri Jan 8 18:09:21 EST 2016 kill -USR1 20792 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20792 killed at Fri Jan 8 18:09:22 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9159 starting at Fri Jan 8 18:09:22 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:09:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:09:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13520: Waiting for Server - FAILED kill -0 20871 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20871 found at Fri Jan 8 18:09:28 EST 2016 selfserv_9159 with PID 20871 started at Fri Jan 8 18:09:28 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 18:09:28 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:09:28 EST 2016 ssl.sh: #13521: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 20871 at Fri Jan 8 18:09:28 EST 2016 kill -USR1 20871 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20871 killed at Fri Jan 8 18:09:29 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9159 starting at Fri Jan 8 18:09:29 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:09:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:09:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13522: Waiting for Server - FAILED kill -0 20951 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 20951 found at Fri Jan 8 18:09:35 EST 2016 selfserv_9159 with PID 20951 started at Fri Jan 8 18:09:35 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 18:09:35 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:09:35 EST 2016 ssl.sh: #13523: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 20951 at Fri Jan 8 18:09:35 EST 2016 kill -USR1 20951 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 20951 killed at Fri Jan 8 18:09:36 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9159 starting at Fri Jan 8 18:09:36 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:09:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:09:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13524: Waiting for Server - FAILED kill -0 21036 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21036 found at Fri Jan 8 18:09:42 EST 2016 selfserv_9159 with PID 21036 started at Fri Jan 8 18:09:42 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 18:09:42 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:09:42 EST 2016 ssl.sh: #13525: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 21036 at Fri Jan 8 18:09:42 EST 2016 kill -USR1 21036 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21036 killed at Fri Jan 8 18:09:43 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9159 starting at Fri Jan 8 18:09:43 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:09:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:09:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13526: Waiting for Server - FAILED kill -0 21121 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21121 found at Fri Jan 8 18:09:49 EST 2016 selfserv_9159 with PID 21121 started at Fri Jan 8 18:09:49 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Fri Jan 8 18:09:49 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:09:49 EST 2016 ssl.sh: #13527: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 21121 at Fri Jan 8 18:09:50 EST 2016 kill -USR1 21121 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21121 killed at Fri Jan 8 18:09:50 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 18:09:50 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:09:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:09:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13528: Waiting for Server - FAILED kill -0 21222 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21222 found at Fri Jan 8 18:09:56 EST 2016 selfserv_9159 with PID 21222 started at Fri Jan 8 18:09:56 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Fri Jan 8 18:09:56 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:09:57 EST 2016 ssl.sh: #13529: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 21222 at Fri Jan 8 18:09:57 EST 2016 kill -USR1 21222 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21222 killed at Fri Jan 8 18:09:57 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 18:09:57 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:09:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:10:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13530: Waiting for Server - FAILED kill -0 21301 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21301 found at Fri Jan 8 18:10:03 EST 2016 selfserv_9159 with PID 21301 started at Fri Jan 8 18:10:03 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Fri Jan 8 18:10:03 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:10:04 EST 2016 ssl.sh: #13531: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 21301 at Fri Jan 8 18:10:04 EST 2016 kill -USR1 21301 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21301 killed at Fri Jan 8 18:10:04 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9159 starting at Fri Jan 8 18:10:04 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:10:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:10:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13532: Waiting for Server - FAILED kill -0 21380 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21380 found at Fri Jan 8 18:10:10 EST 2016 selfserv_9159 with PID 21380 started at Fri Jan 8 18:10:10 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Fri Jan 8 18:10:10 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:10:11 EST 2016 ssl.sh: #13533: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 21380 at Fri Jan 8 18:10:11 EST 2016 kill -USR1 21380 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21380 killed at Fri Jan 8 18:10:11 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 18:10:11 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:10:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:10:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13534: Waiting for Server - FAILED kill -0 21460 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21460 found at Fri Jan 8 18:10:17 EST 2016 selfserv_9159 with PID 21460 started at Fri Jan 8 18:10:17 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Fri Jan 8 18:10:17 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:10:18 EST 2016 ssl.sh: #13535: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 21460 at Fri Jan 8 18:10:18 EST 2016 kill -USR1 21460 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21460 killed at Fri Jan 8 18:10:18 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 18:10:19 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:10:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:10:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13536: Waiting for Server - FAILED kill -0 21539 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21539 found at Fri Jan 8 18:10:24 EST 2016 selfserv_9159 with PID 21539 started at Fri Jan 8 18:10:24 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Fri Jan 8 18:10:25 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:10:25 EST 2016 ssl.sh: #13537: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 21539 at Fri Jan 8 18:10:25 EST 2016 kill -USR1 21539 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21539 killed at Fri Jan 8 18:10:26 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9159 starting at Fri Jan 8 18:10:26 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:10:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:10:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13538: Waiting for Server - FAILED kill -0 21618 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21618 found at Fri Jan 8 18:10:32 EST 2016 selfserv_9159 with PID 21618 started at Fri Jan 8 18:10:32 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Fri Jan 8 18:10:32 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:10:32 EST 2016 ssl.sh: #13539: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 21618 at Fri Jan 8 18:10:32 EST 2016 kill -USR1 21618 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21618 killed at Fri Jan 8 18:10:33 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9159 starting at Fri Jan 8 18:10:33 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:10:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:10:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13540: Waiting for Server - FAILED kill -0 21698 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21698 found at Fri Jan 8 18:10:39 EST 2016 selfserv_9159 with PID 21698 started at Fri Jan 8 18:10:39 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Fri Jan 8 18:10:39 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:10:39 EST 2016 ssl.sh: #13541: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 21698 at Fri Jan 8 18:10:39 EST 2016 kill -USR1 21698 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21698 killed at Fri Jan 8 18:10:40 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9159 starting at Fri Jan 8 18:10:40 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:10:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:10:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13542: Waiting for Server - FAILED kill -0 21777 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21777 found at Fri Jan 8 18:10:46 EST 2016 selfserv_9159 with PID 21777 started at Fri Jan 8 18:10:46 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Fri Jan 8 18:10:46 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:10:46 EST 2016 ssl.sh: #13543: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 21777 at Fri Jan 8 18:10:46 EST 2016 kill -USR1 21777 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21777 killed at Fri Jan 8 18:10:47 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9159 starting at Fri Jan 8 18:10:47 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:10:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:10:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13544: Waiting for Server - FAILED kill -0 21856 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21856 found at Fri Jan 8 18:10:53 EST 2016 selfserv_9159 with PID 21856 started at Fri Jan 8 18:10:53 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Fri Jan 8 18:10:53 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:10:53 EST 2016 ssl.sh: #13545: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 21856 at Fri Jan 8 18:10:53 EST 2016 kill -USR1 21856 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21856 killed at Fri Jan 8 18:10:54 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9159 starting at Fri Jan 8 18:10:54 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:10:54 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:10:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13546: Waiting for Server - FAILED kill -0 21936 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 21936 found at Fri Jan 8 18:11:00 EST 2016 selfserv_9159 with PID 21936 started at Fri Jan 8 18:11:00 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Fri Jan 8 18:11:00 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:11:00 EST 2016 ssl.sh: #13547: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 21936 at Fri Jan 8 18:11:01 EST 2016 kill -USR1 21936 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 21936 killed at Fri Jan 8 18:11:01 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 18:11:01 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:11:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:11:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13548: Waiting for Server - FAILED kill -0 22036 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22036 found at Fri Jan 8 18:11:07 EST 2016 selfserv_9159 with PID 22036 started at Fri Jan 8 18:11:07 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C009 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 18:11:07 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:11:08 EST 2016 ssl.sh: #13549: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 22036 at Fri Jan 8 18:11:08 EST 2016 kill -USR1 22036 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22036 killed at Fri Jan 8 18:11:08 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9159 starting at Fri Jan 8 18:11:08 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:11:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:11:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13550: Waiting for Server - FAILED kill -0 22115 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22115 found at Fri Jan 8 18:11:14 EST 2016 selfserv_9159 with PID 22115 started at Fri Jan 8 18:11:14 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 18:11:14 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:11:15 EST 2016 ssl.sh: #13551: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 22115 at Fri Jan 8 18:11:15 EST 2016 kill -USR1 22115 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22115 killed at Fri Jan 8 18:11:15 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 18:11:15 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:11:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:11:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13552: Waiting for Server - FAILED kill -0 22195 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22195 found at Fri Jan 8 18:11:21 EST 2016 selfserv_9159 with PID 22195 started at Fri Jan 8 18:11:21 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C004 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 18:11:21 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:11:22 EST 2016 ssl.sh: #13553: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 22195 at Fri Jan 8 18:11:22 EST 2016 kill -USR1 22195 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22195 killed at Fri Jan 8 18:11:22 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 18:11:23 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:11:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:11:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13554: Waiting for Server - FAILED kill -0 22274 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22274 found at Fri Jan 8 18:11:28 EST 2016 selfserv_9159 with PID 22274 started at Fri Jan 8 18:11:28 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C00E -N -n TestUser-ecmixed \ localhost.localdomain strsclnt started at Fri Jan 8 18:11:28 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:11:29 EST 2016 ssl.sh: #13555: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 22274 at Fri Jan 8 18:11:29 EST 2016 kill -USR1 22274 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22274 killed at Fri Jan 8 18:11:30 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9159 starting at Fri Jan 8 18:11:30 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:11:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:11:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13556: Waiting for Server - FAILED kill -0 22353 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22353 found at Fri Jan 8 18:11:36 EST 2016 selfserv_9159 with PID 22353 started at Fri Jan 8 18:11:36 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 18:11:36 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:11:36 EST 2016 ssl.sh: #13557: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 22353 at Fri Jan 8 18:11:36 EST 2016 kill -USR1 22353 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22353 killed at Fri Jan 8 18:11:37 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9159 starting at Fri Jan 8 18:11:37 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:11:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:11:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13558: Waiting for Server - FAILED kill -0 22433 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22433 found at Fri Jan 8 18:11:43 EST 2016 selfserv_9159 with PID 22433 started at Fri Jan 8 18:11:43 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \ localhost.localdomain strsclnt started at Fri Jan 8 18:11:43 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:11:43 EST 2016 ssl.sh: #13559: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 22433 at Fri Jan 8 18:11:43 EST 2016 kill -USR1 22433 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22433 killed at Fri Jan 8 18:11:44 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 18:11:44 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:11:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:11:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13560: Waiting for Server - FAILED kill -0 22533 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22533 found at Fri Jan 8 18:11:50 EST 2016 selfserv_9159 with PID 22533 started at Fri Jan 8 18:11:50 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Fri Jan 8 18:11:50 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:11:50 EST 2016 ssl.sh: #13561: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 22533 at Fri Jan 8 18:11:50 EST 2016 kill -USR1 22533 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22533 killed at Fri Jan 8 18:11:51 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9159 starting at Fri Jan 8 18:11:51 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:11:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:11:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13562: Waiting for Server - FAILED kill -0 22612 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22612 found at Fri Jan 8 18:11:57 EST 2016 selfserv_9159 with PID 22612 started at Fri Jan 8 18:11:57 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Fri Jan 8 18:11:57 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:11:57 EST 2016 ssl.sh: #13563: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 22612 at Fri Jan 8 18:11:58 EST 2016 kill -USR1 22612 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22612 killed at Fri Jan 8 18:11:58 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 18:11:58 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:11:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:12:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13564: Waiting for Server - FAILED kill -0 22692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22692 found at Fri Jan 8 18:12:04 EST 2016 selfserv_9159 with PID 22692 started at Fri Jan 8 18:12:04 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Fri Jan 8 18:12:04 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:12:05 EST 2016 ssl.sh: #13565: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 22692 at Fri Jan 8 18:12:05 EST 2016 kill -USR1 22692 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22692 killed at Fri Jan 8 18:12:05 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 18:12:05 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:12:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:12:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13566: Waiting for Server - FAILED kill -0 22771 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22771 found at Fri Jan 8 18:12:11 EST 2016 selfserv_9159 with PID 22771 started at Fri Jan 8 18:12:11 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Fri Jan 8 18:12:11 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:12:12 EST 2016 ssl.sh: #13567: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 22771 at Fri Jan 8 18:12:12 EST 2016 kill -USR1 22771 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22771 killed at Fri Jan 8 18:12:12 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 18:12:12 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:12:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:12:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13568: Waiting for Server - FAILED kill -0 22864 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22864 found at Fri Jan 8 18:12:18 EST 2016 selfserv_9159 with PID 22864 started at Fri Jan 8 18:12:18 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Fri Jan 8 18:12:18 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:12:19 EST 2016 ssl.sh: #13569: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 22864 at Fri Jan 8 18:12:19 EST 2016 kill -USR1 22864 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22864 killed at Fri Jan 8 18:12:19 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9159 starting at Fri Jan 8 18:12:19 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:12:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:12:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13570: Waiting for Server - FAILED kill -0 22958 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 22958 found at Fri Jan 8 18:12:25 EST 2016 selfserv_9159 with PID 22958 started at Fri Jan 8 18:12:25 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Fri Jan 8 18:12:25 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:12:26 EST 2016 ssl.sh: #13571: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 22958 at Fri Jan 8 18:12:26 EST 2016 kill -USR1 22958 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 22958 killed at Fri Jan 8 18:12:26 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 18:12:27 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:12:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:12:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13572: Waiting for Server - FAILED kill -0 23037 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23037 found at Fri Jan 8 18:12:32 EST 2016 selfserv_9159 with PID 23037 started at Fri Jan 8 18:12:32 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Fri Jan 8 18:12:32 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:12:33 EST 2016 ssl.sh: #13573: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 23037 at Fri Jan 8 18:12:33 EST 2016 kill -USR1 23037 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23037 killed at Fri Jan 8 18:12:34 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 18:12:34 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:12:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:12:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13574: Waiting for Server - FAILED kill -0 23117 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23117 found at Fri Jan 8 18:12:40 EST 2016 selfserv_9159 with PID 23117 started at Fri Jan 8 18:12:40 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Fri Jan 8 18:12:40 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:12:40 EST 2016 ssl.sh: #13575: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 23117 at Fri Jan 8 18:12:40 EST 2016 kill -USR1 23117 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23117 killed at Fri Jan 8 18:12:41 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 18:12:41 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:12:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:12:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13576: Waiting for Server - FAILED kill -0 23217 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23217 found at Fri Jan 8 18:12:47 EST 2016 selfserv_9159 with PID 23217 started at Fri Jan 8 18:12:47 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0032 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 18:12:47 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:12:47 EST 2016 ssl.sh: #13577: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 23217 at Fri Jan 8 18:12:47 EST 2016 kill -USR1 23217 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23217 killed at Fri Jan 8 18:12:48 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9159 starting at Fri Jan 8 18:12:48 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:12:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:12:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13578: Waiting for Server - FAILED kill -0 23296 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23296 found at Fri Jan 8 18:12:54 EST 2016 selfserv_9159 with PID 23296 started at Fri Jan 8 18:12:54 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0067 -n TestUser-dsamixed \ localhost.localdomain strsclnt started at Fri Jan 8 18:12:54 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:12:54 EST 2016 ssl.sh: #13579: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 23296 at Fri Jan 8 18:12:55 EST 2016 kill -USR1 23296 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23296 killed at Fri Jan 8 18:12:55 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 18:12:55 EST 2016 selfserv_9159 -D -p 9159 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:12:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:13:01 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13580: Waiting for Server - FAILED kill -0 23390 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23390 found at Fri Jan 8 18:13:01 EST 2016 selfserv_9159 with PID 23390 started at Fri Jan 8 18:13:01 EST 2016 strsclnt -q -p 9159 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :00A2 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 18:13:01 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:13:02 EST 2016 ssl.sh: #13581: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 23390 at Fri Jan 8 18:13:02 EST 2016 kill -USR1 23390 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23390 killed at Fri Jan 8 18:13:02 EST 2016 ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server bypass/client bypass - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Stress Test Extended Test - server bypass/client bypass - with ECC =============================== ssl.sh: skipping -c_1000_-C_A Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9159 starting at Fri Jan 8 18:13:03 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:13:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:13:08 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13582: Waiting for Server - FAILED kill -0 23543 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23543 found at Fri Jan 8 18:13:08 EST 2016 selfserv_9159 with PID 23543 started at Fri Jan 8 18:13:08 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -c 1000 -C c -V :ssl3 \ localhost.localdomain strsclnt started at Fri Jan 8 18:13:08 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:13:09 EST 2016 ssl.sh: #13583: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 23543 at Fri Jan 8 18:13:09 EST 2016 kill -USR1 23543 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23543 killed at Fri Jan 8 18:13:09 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9159 starting at Fri Jan 8 18:13:10 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:13:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:13:15 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13584: Waiting for Server - FAILED kill -0 23622 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23622 found at Fri Jan 8 18:13:15 EST 2016 selfserv_9159 with PID 23622 started at Fri Jan 8 18:13:16 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Fri Jan 8 18:13:16 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:13:16 EST 2016 ssl.sh: #13585: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 23622 at Fri Jan 8 18:13:16 EST 2016 kill -USR1 23622 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23622 killed at Fri Jan 8 18:13:17 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9159 starting at Fri Jan 8 18:13:17 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:13:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:13:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13586: Waiting for Server - FAILED kill -0 23702 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23702 found at Fri Jan 8 18:13:23 EST 2016 selfserv_9159 with PID 23702 started at Fri Jan 8 18:13:23 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Fri Jan 8 18:13:23 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:13:23 EST 2016 ssl.sh: #13587: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 23702 at Fri Jan 8 18:13:23 EST 2016 kill -USR1 23702 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23702 killed at Fri Jan 8 18:13:24 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9159 starting at Fri Jan 8 18:13:24 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:13:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:13:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13588: Waiting for Server - FAILED kill -0 23781 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23781 found at Fri Jan 8 18:13:30 EST 2016 selfserv_9159 with PID 23781 started at Fri Jan 8 18:13:30 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Fri Jan 8 18:13:30 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:13:30 EST 2016 ssl.sh: #13589: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 23781 at Fri Jan 8 18:13:30 EST 2016 kill -USR1 23781 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23781 killed at Fri Jan 8 18:13:31 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9159 starting at Fri Jan 8 18:13:31 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:13:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:13:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13590: Waiting for Server - FAILED kill -0 23860 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23860 found at Fri Jan 8 18:13:37 EST 2016 selfserv_9159 with PID 23860 started at Fri Jan 8 18:13:37 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Fri Jan 8 18:13:37 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:13:37 EST 2016 ssl.sh: #13591: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 23860 at Fri Jan 8 18:13:37 EST 2016 kill -USR1 23860 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23860 killed at Fri Jan 8 18:13:38 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9159 starting at Fri Jan 8 18:13:38 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:13:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:13:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13592: Waiting for Server - FAILED kill -0 23940 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 23940 found at Fri Jan 8 18:13:44 EST 2016 selfserv_9159 with PID 23940 started at Fri Jan 8 18:13:44 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 18:13:44 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:13:44 EST 2016 ssl.sh: #13593: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 23940 at Fri Jan 8 18:13:44 EST 2016 kill -USR1 23940 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 23940 killed at Fri Jan 8 18:13:45 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9159 starting at Fri Jan 8 18:13:45 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:13:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:13:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13594: Waiting for Server - FAILED kill -0 24019 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24019 found at Fri Jan 8 18:13:51 EST 2016 selfserv_9159 with PID 24019 started at Fri Jan 8 18:13:51 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 18:13:51 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:13:52 EST 2016 ssl.sh: #13595: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 24019 at Fri Jan 8 18:13:52 EST 2016 kill -USR1 24019 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24019 killed at Fri Jan 8 18:13:52 EST 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping -c_100_-C_A_-N_-n_TestUser Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 18:13:52 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:13:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:13:58 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13596: Waiting for Server - FAILED kill -0 24127 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24127 found at Fri Jan 8 18:13:58 EST 2016 selfserv_9159 with PID 24127 started at Fri Jan 8 18:13:58 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Fri Jan 8 18:13:58 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:13:59 EST 2016 ssl.sh: #13597: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 24127 at Fri Jan 8 18:13:59 EST 2016 kill -USR1 24127 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24127 killed at Fri Jan 8 18:13:59 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 18:13:59 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:13:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:14:05 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13598: Waiting for Server - FAILED kill -0 24207 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24207 found at Fri Jan 8 18:14:05 EST 2016 selfserv_9159 with PID 24207 started at Fri Jan 8 18:14:05 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Fri Jan 8 18:14:05 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:14:06 EST 2016 ssl.sh: #13599: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 24207 at Fri Jan 8 18:14:06 EST 2016 kill -USR1 24207 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24207 killed at Fri Jan 8 18:14:06 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9159 starting at Fri Jan 8 18:14:06 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:14:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:14:12 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13600: Waiting for Server - FAILED kill -0 24286 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24286 found at Fri Jan 8 18:14:12 EST 2016 selfserv_9159 with PID 24286 started at Fri Jan 8 18:14:12 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Fri Jan 8 18:14:12 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:14:13 EST 2016 ssl.sh: #13601: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 24286 at Fri Jan 8 18:14:13 EST 2016 kill -USR1 24286 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24286 killed at Fri Jan 8 18:14:13 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9159 starting at Fri Jan 8 18:14:14 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:14:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:14:19 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13602: Waiting for Server - FAILED kill -0 24365 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24365 found at Fri Jan 8 18:14:19 EST 2016 selfserv_9159 with PID 24365 started at Fri Jan 8 18:14:19 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Fri Jan 8 18:14:20 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:14:20 EST 2016 ssl.sh: #13603: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 24365 at Fri Jan 8 18:14:20 EST 2016 kill -USR1 24365 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24365 killed at Fri Jan 8 18:14:21 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9159 starting at Fri Jan 8 18:14:21 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:14:21 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:14:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13604: Waiting for Server - FAILED kill -0 24445 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24445 found at Fri Jan 8 18:14:27 EST 2016 selfserv_9159 with PID 24445 started at Fri Jan 8 18:14:27 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 18:14:27 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:14:27 EST 2016 ssl.sh: #13605: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 24445 at Fri Jan 8 18:14:27 EST 2016 kill -USR1 24445 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24445 killed at Fri Jan 8 18:14:28 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9159 starting at Fri Jan 8 18:14:28 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:14:28 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:14:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13606: Waiting for Server - FAILED kill -0 24524 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24524 found at Fri Jan 8 18:14:34 EST 2016 selfserv_9159 with PID 24524 started at Fri Jan 8 18:14:34 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Fri Jan 8 18:14:34 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:14:34 EST 2016 ssl.sh: #13607: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 24524 at Fri Jan 8 18:14:34 EST 2016 kill -USR1 24524 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24524 killed at Fri Jan 8 18:14:35 EST 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9159 starting at Fri Jan 8 18:14:35 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:14:35 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:14:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13608: Waiting for Server - FAILED kill -0 24603 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24603 found at Fri Jan 8 18:14:41 EST 2016 selfserv_9159 with PID 24603 started at Fri Jan 8 18:14:41 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Fri Jan 8 18:14:41 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:14:41 EST 2016 ssl.sh: #13609: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 24603 at Fri Jan 8 18:14:41 EST 2016 kill -USR1 24603 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24603 killed at Fri Jan 8 18:14:42 EST 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 18:14:42 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:14:42 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:14:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13610: Waiting for Server - FAILED kill -0 24712 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24712 found at Fri Jan 8 18:14:48 EST 2016 selfserv_9159 with PID 24712 started at Fri Jan 8 18:14:48 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Fri Jan 8 18:14:48 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:14:49 EST 2016 ssl.sh: #13611: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 24712 at Fri Jan 8 18:14:49 EST 2016 kill -USR1 24712 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24712 killed at Fri Jan 8 18:14:49 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 18:14:49 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:14:49 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:14:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13612: Waiting for Server - FAILED kill -0 24791 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24791 found at Fri Jan 8 18:14:55 EST 2016 selfserv_9159 with PID 24791 started at Fri Jan 8 18:14:55 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Fri Jan 8 18:14:55 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:14:56 EST 2016 ssl.sh: #13613: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 24791 at Fri Jan 8 18:14:56 EST 2016 kill -USR1 24791 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24791 killed at Fri Jan 8 18:14:56 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9159 starting at Fri Jan 8 18:14:56 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:14:56 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:15:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13614: Waiting for Server - FAILED kill -0 24872 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24872 found at Fri Jan 8 18:15:02 EST 2016 selfserv_9159 with PID 24872 started at Fri Jan 8 18:15:02 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Fri Jan 8 18:15:02 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:15:03 EST 2016 ssl.sh: #13615: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 24872 at Fri Jan 8 18:15:03 EST 2016 kill -USR1 24872 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24872 killed at Fri Jan 8 18:15:03 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 18:15:03 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:15:03 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:15:09 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13616: Waiting for Server - FAILED kill -0 24952 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 24952 found at Fri Jan 8 18:15:09 EST 2016 selfserv_9159 with PID 24952 started at Fri Jan 8 18:15:09 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Fri Jan 8 18:15:09 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:15:10 EST 2016 ssl.sh: #13617: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 24952 at Fri Jan 8 18:15:10 EST 2016 kill -USR1 24952 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 24952 killed at Fri Jan 8 18:15:10 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 18:15:10 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:15:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:15:16 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13618: Waiting for Server - FAILED kill -0 25033 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25033 found at Fri Jan 8 18:15:16 EST 2016 selfserv_9159 with PID 25033 started at Fri Jan 8 18:15:16 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Fri Jan 8 18:15:16 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:15:17 EST 2016 ssl.sh: #13619: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 25033 at Fri Jan 8 18:15:17 EST 2016 kill -USR1 25033 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25033 killed at Fri Jan 8 18:15:17 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9159 starting at Fri Jan 8 18:15:18 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:15:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:15:23 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13620: Waiting for Server - FAILED kill -0 25112 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25112 found at Fri Jan 8 18:15:23 EST 2016 selfserv_9159 with PID 25112 started at Fri Jan 8 18:15:23 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Fri Jan 8 18:15:23 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:15:24 EST 2016 ssl.sh: #13621: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 25112 at Fri Jan 8 18:15:24 EST 2016 kill -USR1 25112 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25112 killed at Fri Jan 8 18:15:25 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9159 starting at Fri Jan 8 18:15:25 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:15:25 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:15:30 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13622: Waiting for Server - FAILED kill -0 25194 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25194 found at Fri Jan 8 18:15:31 EST 2016 selfserv_9159 with PID 25194 started at Fri Jan 8 18:15:31 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Fri Jan 8 18:15:31 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:15:31 EST 2016 ssl.sh: #13623: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 25194 at Fri Jan 8 18:15:31 EST 2016 kill -USR1 25194 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25194 killed at Fri Jan 8 18:15:32 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9159 starting at Fri Jan 8 18:15:32 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:15:32 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:15:37 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13624: Waiting for Server - FAILED kill -0 25274 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25274 found at Fri Jan 8 18:15:38 EST 2016 selfserv_9159 with PID 25274 started at Fri Jan 8 18:15:38 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Fri Jan 8 18:15:38 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:15:38 EST 2016 ssl.sh: #13625: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 25274 at Fri Jan 8 18:15:38 EST 2016 kill -USR1 25274 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25274 killed at Fri Jan 8 18:15:39 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9159 starting at Fri Jan 8 18:15:39 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:15:39 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:15:44 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13626: Waiting for Server - FAILED kill -0 25354 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25354 found at Fri Jan 8 18:15:45 EST 2016 selfserv_9159 with PID 25354 started at Fri Jan 8 18:15:45 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Fri Jan 8 18:15:45 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:15:45 EST 2016 ssl.sh: #13627: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 25354 at Fri Jan 8 18:15:45 EST 2016 kill -USR1 25354 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25354 killed at Fri Jan 8 18:15:46 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9159 starting at Fri Jan 8 18:15:46 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:15:46 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:15:51 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13628: Waiting for Server - FAILED kill -0 25433 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25433 found at Fri Jan 8 18:15:52 EST 2016 selfserv_9159 with PID 25433 started at Fri Jan 8 18:15:52 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Fri Jan 8 18:15:52 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:15:52 EST 2016 ssl.sh: #13629: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 25433 at Fri Jan 8 18:15:52 EST 2016 kill -USR1 25433 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25433 killed at Fri Jan 8 18:15:53 EST 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 18:15:53 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:15:53 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:15:59 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13630: Waiting for Server - FAILED kill -0 25533 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25533 found at Fri Jan 8 18:15:59 EST 2016 selfserv_9159 with PID 25533 started at Fri Jan 8 18:15:59 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C009 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 18:15:59 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:16:00 EST 2016 ssl.sh: #13631: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 25533 at Fri Jan 8 18:16:00 EST 2016 kill -USR1 25533 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25533 killed at Fri Jan 8 18:16:00 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9159 starting at Fri Jan 8 18:16:00 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:16:00 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:16:06 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13632: Waiting for Server - FAILED kill -0 25613 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25613 found at Fri Jan 8 18:16:06 EST 2016 selfserv_9159 with PID 25613 started at Fri Jan 8 18:16:06 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 18:16:06 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:16:07 EST 2016 ssl.sh: #13633: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 25613 at Fri Jan 8 18:16:07 EST 2016 kill -USR1 25613 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25613 killed at Fri Jan 8 18:16:07 EST 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 18:16:07 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:16:07 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:16:13 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13634: Waiting for Server - FAILED kill -0 25692 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25692 found at Fri Jan 8 18:16:13 EST 2016 selfserv_9159 with PID 25692 started at Fri Jan 8 18:16:13 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C004 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 18:16:13 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:16:14 EST 2016 ssl.sh: #13635: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 25692 at Fri Jan 8 18:16:14 EST 2016 kill -USR1 25692 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25692 killed at Fri Jan 8 18:16:14 EST 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 18:16:14 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:16:14 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:16:20 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13636: Waiting for Server - FAILED kill -0 25771 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25771 found at Fri Jan 8 18:16:20 EST 2016 selfserv_9159 with PID 25771 started at Fri Jan 8 18:16:20 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \ localhost.localdomain strsclnt started at Fri Jan 8 18:16:20 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:16:21 EST 2016 ssl.sh: #13637: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 25771 at Fri Jan 8 18:16:21 EST 2016 kill -USR1 25771 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25771 killed at Fri Jan 8 18:16:21 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9159 starting at Fri Jan 8 18:16:21 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:16:22 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:16:27 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13638: Waiting for Server - FAILED kill -0 25851 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25851 found at Fri Jan 8 18:16:27 EST 2016 selfserv_9159 with PID 25851 started at Fri Jan 8 18:16:27 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Fri Jan 8 18:16:27 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:16:28 EST 2016 ssl.sh: #13639: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 25851 at Fri Jan 8 18:16:28 EST 2016 kill -USR1 25851 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25851 killed at Fri Jan 8 18:16:28 EST 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9159 starting at Fri Jan 8 18:16:29 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:16:29 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:16:34 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13640: Waiting for Server - FAILED kill -0 25930 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 25930 found at Fri Jan 8 18:16:35 EST 2016 selfserv_9159 with PID 25930 started at Fri Jan 8 18:16:35 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \ localhost.localdomain strsclnt started at Fri Jan 8 18:16:35 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:16:35 EST 2016 ssl.sh: #13641: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 25930 at Fri Jan 8 18:16:35 EST 2016 kill -USR1 25930 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 25930 killed at Fri Jan 8 18:16:36 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 18:16:36 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:16:36 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:16:41 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13642: Waiting for Server - FAILED kill -0 26030 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26030 found at Fri Jan 8 18:16:42 EST 2016 selfserv_9159 with PID 26030 started at Fri Jan 8 18:16:42 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Fri Jan 8 18:16:42 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:16:42 EST 2016 ssl.sh: #13643: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 26030 at Fri Jan 8 18:16:42 EST 2016 kill -USR1 26030 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26030 killed at Fri Jan 8 18:16:43 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9159 starting at Fri Jan 8 18:16:43 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:16:43 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:16:48 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13644: Waiting for Server - FAILED kill -0 26110 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26110 found at Fri Jan 8 18:16:49 EST 2016 selfserv_9159 with PID 26110 started at Fri Jan 8 18:16:49 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Fri Jan 8 18:16:49 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:16:49 EST 2016 ssl.sh: #13645: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 26110 at Fri Jan 8 18:16:49 EST 2016 kill -USR1 26110 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26110 killed at Fri Jan 8 18:16:50 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 18:16:50 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:16:50 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:16:55 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13646: Waiting for Server - FAILED kill -0 26189 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26189 found at Fri Jan 8 18:16:56 EST 2016 selfserv_9159 with PID 26189 started at Fri Jan 8 18:16:56 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Fri Jan 8 18:16:56 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:16:56 EST 2016 ssl.sh: #13647: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 26189 at Fri Jan 8 18:16:57 EST 2016 kill -USR1 26189 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26189 killed at Fri Jan 8 18:16:57 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 18:16:57 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:16:57 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:17:02 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13648: Waiting for Server - FAILED kill -0 26268 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26268 found at Fri Jan 8 18:17:03 EST 2016 selfserv_9159 with PID 26268 started at Fri Jan 8 18:17:03 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Fri Jan 8 18:17:03 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:17:04 EST 2016 ssl.sh: #13649: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 26268 at Fri Jan 8 18:17:04 EST 2016 kill -USR1 26268 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26268 killed at Fri Jan 8 18:17:04 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9159 starting at Fri Jan 8 18:17:04 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:17:04 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:17:10 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13650: Waiting for Server - FAILED kill -0 26362 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26362 found at Fri Jan 8 18:17:10 EST 2016 selfserv_9159 with PID 26362 started at Fri Jan 8 18:17:10 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Fri Jan 8 18:17:10 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:17:11 EST 2016 ssl.sh: #13651: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 26362 at Fri Jan 8 18:17:11 EST 2016 kill -USR1 26362 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26362 killed at Fri Jan 8 18:17:11 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9159 starting at Fri Jan 8 18:17:11 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:17:11 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:17:17 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13652: Waiting for Server - FAILED kill -0 26455 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26455 found at Fri Jan 8 18:17:17 EST 2016 selfserv_9159 with PID 26455 started at Fri Jan 8 18:17:17 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Fri Jan 8 18:17:17 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:17:18 EST 2016 ssl.sh: #13653: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 26455 at Fri Jan 8 18:17:18 EST 2016 kill -USR1 26455 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26455 killed at Fri Jan 8 18:17:18 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 18:17:18 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:17:18 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:17:24 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13654: Waiting for Server - FAILED kill -0 26534 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26534 found at Fri Jan 8 18:17:24 EST 2016 selfserv_9159 with PID 26534 started at Fri Jan 8 18:17:24 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Fri Jan 8 18:17:24 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:17:25 EST 2016 ssl.sh: #13655: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 26534 at Fri Jan 8 18:17:25 EST 2016 kill -USR1 26534 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26534 killed at Fri Jan 8 18:17:25 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9159 starting at Fri Jan 8 18:17:26 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:17:26 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:17:31 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13656: Waiting for Server - FAILED kill -0 26614 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26614 found at Fri Jan 8 18:17:31 EST 2016 selfserv_9159 with PID 26614 started at Fri Jan 8 18:17:31 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Fri Jan 8 18:17:31 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:17:32 EST 2016 ssl.sh: #13657: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 26614 at Fri Jan 8 18:17:32 EST 2016 kill -USR1 26614 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26614 killed at Fri Jan 8 18:17:32 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 18:17:33 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:17:33 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:17:38 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13658: Waiting for Server - FAILED kill -0 26714 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26714 found at Fri Jan 8 18:17:39 EST 2016 selfserv_9159 with PID 26714 started at Fri Jan 8 18:17:39 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 18:17:39 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:17:39 EST 2016 ssl.sh: #13659: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 26714 at Fri Jan 8 18:17:39 EST 2016 kill -USR1 26714 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26714 killed at Fri Jan 8 18:17:40 EST 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9159 starting at Fri Jan 8 18:17:40 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:17:40 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:17:45 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13660: Waiting for Server - FAILED kill -0 26793 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26793 found at Fri Jan 8 18:17:46 EST 2016 selfserv_9159 with PID 26793 started at Fri Jan 8 18:17:46 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \ localhost.localdomain strsclnt started at Fri Jan 8 18:17:46 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:17:46 EST 2016 ssl.sh: #13661: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9159 with PID 26793 at Fri Jan 8 18:17:46 EST 2016 kill -USR1 26793 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26793 killed at Fri Jan 8 18:17:47 EST 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9159 starting at Fri Jan 8 18:17:47 EST 2016 selfserv_9159 -D -p 9159 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.27064\ -H 1 -V ssl3: & trying to connect to selfserv_9159 at Fri Jan 8 18:17:47 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9159 at Fri Jan 8 18:17:52 EST 2016 tstclnt -p 9159 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.19.1/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ./ssl.sh: line 155: [: too many arguments ssl.sh: #13662: Waiting for Server - FAILED kill -0 26887 >/dev/null 2>/dev/null ./ssl.sh: line 128: [: too many arguments selfserv_9159 with PID 26887 found at Fri Jan 8 18:17:53 EST 2016 selfserv_9159 with PID 26887 started at Fri Jan 8 18:17:53 EST 2016 strsclnt -q -p 9159 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Fri Jan 8 18:17:53 EST 2016 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: SSL2 - 0 server certificates tested. strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Jan 8 18:17:53 EST 2016 ssl.sh: #13663: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9159 with PID 26887 at Fri Jan 8 18:17:54 EST 2016 kill -USR1 26887 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9159 -b -p 9159 2>/dev/null; selfserv_9159 with PID 26887 killed at Fri Jan 8 18:17:54 EST 2016 TIMESTAMP ssl END: Fri Jan 8 18:17:54 EST 2016 Running tests for merge TIMESTAMP merge BEGIN: Fri Jan 8 18:17:54 EST 2016 sdr.sh: SDR Tests =============================== sdr.sh: Creating an SDR key/SDR Encrypt - Value 1 sdrtest -d . -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests.v1.27064 -t "Test1" sdr.sh: #13664: Creating SDR Key/Encrypt - Value 1 - PASSED sdr.sh: SDR Encrypt - Value 2 sdrtest -d . -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests.v2.27064 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #13665: Encrypt - Value 2 - PASSED sdr.sh: SDR Encrypt - Value 3 sdrtest -d . -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests.v3.27064 -t "1234567" sdr.sh: #13666: Encrypt - Value 3 - PASSED sdr.sh: SDR Decrypt - Value 1 sdrtest -d . -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests.v1.27064 -t "Test1" sdr.sh: #13667: Decrypt - Value 1 - PASSED sdr.sh: SDR Decrypt - Value 2 sdrtest -d . -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests.v2.27064 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #13668: Decrypt - Value 2 - PASSED sdr.sh: SDR Decrypt - Value 3 sdrtest -d . -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests.v3.27064 -t "1234567" sdr.sh: #13669: Decrypt - Value 3 - PASSED merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests.v3.27064 -t Test2 -f ../tests.pw merge.sh: #13670: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw merge.sh: #13671: Merging Dave - PASSED merge.sh: Merging in new user certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw merge.sh: #13672: Merging server - PASSED merge.sh: Merging in new chain certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw merge.sh: #13673: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #13674: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #13675: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:34:43 2016 Not After : Fri Jan 08 22:34:43 2021 Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:fe:ec:7c:93:5a:40:be:8e:99:04:7b:29:84:c5:64: 2a:72:04:58:aa:93:bd:95:6b:97:1c:e3:39:f6:48:12: 16:0a:b3:fe:ea:3e:fd:cb:19:dd:d4:f3:1c:21:5f:82: 13:d6:f5:02:41:c1:c1:f5:7a:a1:e4:2b:a9:62:28:3e: 92:99:fd:03:6d:f0:b2:15:5e:58:e5:c0:5d:d8:22:33: 6b:ad:31:74:17:c1:f5:9d:27:86:aa:06:65:b0:91:b7: d3:34:61:6f:55:71:7a:4c:58:cc:4a:83:f5:d2:c4:1f: 24:08:eb:20:cf:b8:6b:7f:e0:1a:66:e5:26:2a:1c:6e: 13:b5:54:cb:fb:9d:0b:39:7d:33:fe:b2:ae:d6:ab:d7: de:3f:31:58:47:4c:58:24:6a:c0:d4:55:4a:28:9d:a6: e6:4e:89:4e:1d:d0:b3:46:bf:57:d0:96:5e:df:71:3f: 9a:2d:ed:c7:68:df:85:c3:a6:85:12:46:94:5d:c7:7f: 58:78:bc:5e:49:d5:a0:08:47:6e:4a:65:01:60:8b:65: 2b:de:44:17:b6:c3:ec:78:e9:80:0a:3a:92:10:4a:bc: 1a:17:34:ec:ba:35:a0:d2:26:09:7b:d2:ff:19:59:5d: da:bd:3c:c5:a7:d7:08:17:30:2a:fc:dd:33:82:63:53 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:a9:05:6a:77:75:e9:f8:98:f1:da:48:26:7b:a3:ad: b2:20:4c:c5:21:c1:66:50:f7:75:41:30:14:b0:c2:d7: 02:87:4e:e2:20:50:bb:dd:7c:b1:57:13:33:0c:8b:d8: e4:a4:fd:68:9c:76:c0:99:a4:86:5c:9c:0c:50:a8:b3: 87:2c:98:3c:94:52:74:6b:8f:2c:c6:ed:80:84:2e:c8: 09:3e:d4:da:5f:d4:e9:4e:02:1b:5a:96:96:67:19:c2: ac:4c:f5:c4:c7:d9:aa:67:8f:89:94:8b:99:81:9a:94: da:41:3e:60:75:2a:38:d5:b0:93:25:b7:9d:ac:d8:81: e2:e6:24:66:d2:87:03:bc:9c:3e:64:52:31:8a:8e:7c: 5d:0a:5a:60:2b:63:4f:02:63:62:dc:8f:cd:a4:2f:69: 54:70:00:4f:2c:c1:c6:26:52:e2:33:3f:83:53:28:bf: 3d:cd:90:44:27:43:dc:89:dc:05:15:75:8c:e0:8e:ef: 6a:b6:4a:59:a4:3f:b4:2e:db:8a:8f:76:54:37:87:a5: 6d:60:67:2b:1a:df:80:dc:d8:7d:c1:ad:eb:f1:c6:18: 50:09:d2:c5:da:03:75:0b:58:9e:64:1c:1a:aa:52:ba: 84:fa:a9:60:3d:f1:d6:e7:5a:7d:16:bd:cf:34:b3:de Fingerprint (SHA-256): 95:30:10:DD:F1:71:00:81:43:36:42:04:9F:DC:86:9D:91:B4:A2:AC:78:EB:68:E2:73:82:21:D2:FD:A0:64:D0 Fingerprint (SHA1): 4C:D1:71:B0:C4:C6:7D:EA:32:1E:1B:C9:CB:0A:D8:C0:D9:D1:96:59 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #13676: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Jan 08 22:35:01 2016 Not After : Fri Jan 08 22:35:01 2021 Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:10:3f:53:6e:34:d9:22:df:be:d5:fa:de:c2:b2:95: 48:4e:95:d5:d3:28:2d:2c:74:e1:2d:99:d3:7c:b0:6a: a7:e8:3b:b5:5d:96:00:35:ce:ba:c4:64:e0:16:72:de: ab:93:ee:d2:9b:09:38:c6:59:60:70:ef:7f:dd:71:35: f1:8e:82:47:74:0d:55:2d:74:b4:59:da:c7:aa:e9:3e: c4:0f:61:11:c3:fb:ad:68:c9:41:0e:83:e8:f7:17:66: 17:cf:15:ee:f8:fa:ce:f0:31:a8:74:33:7c:26:ac:80: e1:4a:48:50:b3:db:89:2a:79:01:97:37:28:cf:77:a0: 5e:22:88:ae:61:8e:bc:dd:11:2a:00:31:a7:46:39:28: cb:bd:2c:86:18:a4:d9:79:25:17:1f:bb:bc:61:4f:08: 4e:c5:0f:d1:c4:72:6d:f4:1f:a0:46:ee:0e:80:2a:4e: 2d:28:8c:33:0e:fb:83:ad:78:55:4d:52:d8:e3:4d:9e: ec:3f:86:93:81:bb:43:f7:4c:ca:e8:16:e4:46:aa:6b: 2b:09:d9:75:5d:96:9a:b4:7b:6d:62:66:d3:87:e6:a7: 85:3f:f4:c9:87:ca:a0:06:42:9d:7b:b5:eb:58:e1:1d: ff:bc:0d:d0:36:75:99:80:44:b8:0e:47:57:02:66:69 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:31:cf:67:a4:b8:06:65:8d:cf:0e:a5:19:1c:9d:84: 7b:0e:50:82:09:53:56:b4:24:3d:b3:e5:02:44:b4:3e: 8e:52:95:af:93:7f:e0:88:1a:31:e9:20:74:8a:6d:9b: 20:c6:cb:7b:f6:5a:f1:cd:67:6a:33:8f:db:ca:34:17: 15:4f:37:aa:b6:32:1f:be:8d:8a:5d:8d:0b:b7:fe:b5: 95:14:98:31:04:d2:b6:28:70:93:44:75:85:bd:83:59: cb:2b:e4:2b:bb:25:3b:24:6b:8e:22:71:06:de:e8:17: ad:6f:a3:18:98:ee:06:7a:d5:d4:76:95:eb:be:72:c6: 97:15:0d:a5:98:df:9c:4a:c6:93:d8:96:3e:bc:b2:a2: 7f:68:82:2e:11:67:bd:1b:07:6d:71:22:6d:e4:1b:a2: 65:1f:92:b4:cd:0a:71:a5:9b:f8:75:a4:39:48:5a:37: 10:ad:0e:be:7f:ba:84:16:21:04:7a:36:a2:d2:56:2d: 6f:04:90:8d:9b:22:e3:87:ce:37:a1:bb:47:55:b9:9b: 71:6a:af:0a:96:91:97:33:f6:5c:04:22:1d:7e:01:8b: d4:ef:97:be:00:66:e7:dc:0c:63:4f:a7:85:cb:a6:c7: 24:46:f3:a6:71:61:86:2d:d7:d0:08:c1:ea:54:07:f7 Fingerprint (SHA-256): 84:49:2B:12:E7:72:8D:A1:0F:11:5F:C5:9E:91:BB:FC:8B:86:C4:56:9C:EB:BB:F6:23:FA:C7:5A:66:8C:7D:63 Fingerprint (SHA1): 24:C7:C0:0D:D0:02:EC:16:4C:BF:95:B9:AE:E7:49:90:9D:E2:80:DB Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #13677: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw merge.sh: #13678: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI TestCA CT,C,C TestCA-dsa CT,C,C TestCA-ec CT,C,C Alice u,u,u Alice-dsa u,u,u Alice-dsamixed u,u,u Alice-ec u,u,u Alice-ecmixed u,u,u bob@bogus.com ,, Dave u,u,u eve@bogus.com ,, bob-ec@bogus.com ,, Dave-ec u,u,u Dave-dsa u,u,u Dave-dsamixed u,u,u Dave-ecmixed u,u,u localhost.localdomain u,u,u localhost.localdomain-dsa u,u,u localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u localhost.localdomain-ecmixed u,u,u localhost-sni.localdomain u,u,u localhost-sni.localdomain-dsa u,u,u localhost-sni.localdomain-dsamixed u,u,u localhost-sni.localdomain-ec u,u,u localhost-sni.localdomain-ecmixed u,u,u ExtendedSSLUser u,u,u serverCA C,C,C ExtendedSSLUser-dsa u,u,u serverCA-dsa C,C,C ExtendedSSLUser-dsamixed u,u,u ExtendedSSLUser-ec u,u,u serverCA-ec C,C,C ExtendedSSLUser-ecmixed u,u,u chain-2-clientCA-dsa ,, clientCA-dsa T,C,C chain-1-clientCA-dsa ,, clientCA T,C,C chain-2-clientCA-ec ,, chain-2-clientCA ,, chain-1-clientCA ,, chain-1-clientCA-ec ,, clientCA-ec T,C,C Alice #2 ,, Alice #1 ,, Alice #99 ,, Alice #3 ,, Alice #4 ,, Alice #100 ,, CRL names CRL Type TestCA CRL TestCA-ec CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests.v3.27064 -t Test2 -f ../tests.pw merge.sh: #13679: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests.v1.27064 -t Test1 -f ../tests.pw merge.sh: #13680: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #13681: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. merge.sh: #13682: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #13683: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Fri Jan 08 22:37:02 2016 Entry 1 (0x1): Serial Number: 40 (0x28) Revocation Date: Fri Jan 08 22:20:31 2016 Entry Extensions: Name: CRL reason code Entry 2 (0x2): Serial Number: 42 (0x2a) Revocation Date: Fri Jan 08 22:36:55 2016 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #13684: Verifying TestCA CRL - PASSED TIMESTAMP merge END: Fri Jan 8 18:18:27 EST 2016 Running tests for chains TIMESTAMP chains BEGIN: Fri Jan 8 18:18:27 EST 2016 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #13685: OCSPD: Creating DB OCSPRootDB - PASSED chains.sh: Creating Root CA OCSPRoot certutil -s "CN=OCSPRoot ROOT CA, O=OCSPRoot, C=US" -S -n OCSPRoot -t CTu,CTu,CTu -v 600 -x -d OCSPRootDB -1 -2 -5 -f OCSPRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181828 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13686: OCSPD: Creating Root CA OCSPRoot - PASSED chains.sh: Exporting Root CA OCSPRoot.der certutil -L -d OCSPRootDB -r -n OCSPRoot -o OCSPRoot.der chains.sh: #13687: OCSPD: Exporting Root CA OCSPRoot.der - PASSED chains.sh: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPRootDB -o OCSPRoot.p12 -n OCSPRoot -k OCSPRootDB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #13688: OCSPD: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #13689: OCSPD: Creating DB OCSPCA1DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA1Req.der certutil -s "CN=OCSPCA1 Intermediate, O=OCSPCA1, C=US" -R -2 -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPCA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13690: OCSPD: Creating Intermediate certifiate request OCSPCA1Req.der - PASSED chains.sh: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA1Req.der -o OCSPCA1OCSPRoot.der -f OCSPRootDB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9169/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13691: OCSPD: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database certutil -A -n OCSPCA1 -t u,u,u -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -i OCSPCA1OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13692: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database - PASSED chains.sh: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA1DB -o OCSPCA1.p12 -n OCSPCA1 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #13693: OCSPD: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database - PASSED chains.sh: Creating DB OCSPCA2DB certutil -N -d OCSPCA2DB -f OCSPCA2DB/dbpasswd chains.sh: #13694: OCSPD: Creating DB OCSPCA2DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA2Req.der certutil -s "CN=OCSPCA2 Intermediate, O=OCSPCA2, C=US" -R -2 -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPCA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13695: OCSPD: Creating Intermediate certifiate request OCSPCA2Req.der - PASSED chains.sh: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA2Req.der -o OCSPCA2OCSPRoot.der -f OCSPRootDB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9169/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13696: OCSPD: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database certutil -A -n OCSPCA2 -t u,u,u -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -i OCSPCA2OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13697: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database - PASSED chains.sh: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA2DB -o OCSPCA2.p12 -n OCSPCA2 -k OCSPCA2DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #13698: OCSPD: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database - PASSED chains.sh: Creating DB OCSPCA3DB certutil -N -d OCSPCA3DB -f OCSPCA3DB/dbpasswd chains.sh: #13699: OCSPD: Creating DB OCSPCA3DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA3Req.der certutil -s "CN=OCSPCA3 Intermediate, O=OCSPCA3, C=US" -R -2 -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPCA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13700: OCSPD: Creating Intermediate certifiate request OCSPCA3Req.der - PASSED chains.sh: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA3Req.der -o OCSPCA3OCSPRoot.der -f OCSPRootDB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9170 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13701: OCSPD: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database certutil -A -n OCSPCA3 -t u,u,u -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -i OCSPCA3OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13702: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database - PASSED chains.sh: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA3DB -o OCSPCA3.p12 -n OCSPCA3 -k OCSPCA3DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #13703: OCSPD: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database - PASSED chains.sh: Creating DB OCSPEE11DB certutil -N -d OCSPEE11DB -f OCSPEE11DB/dbpasswd chains.sh: #13704: OCSPD: Creating DB OCSPEE11DB - PASSED chains.sh: Creating EE certifiate request OCSPEE11Req.der certutil -s "CN=OCSPEE11 EE, O=OCSPEE11, C=US" -R -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE11Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13705: OCSPD: Creating EE certifiate request OCSPEE11Req.der - PASSED chains.sh: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE11Req.der -o OCSPEE11OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9169/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13706: OCSPD: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database certutil -A -n OCSPEE11 -t u,u,u -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -i OCSPEE11OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13707: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database - PASSED chains.sh: Creating DB OCSPEE12DB certutil -N -d OCSPEE12DB -f OCSPEE12DB/dbpasswd chains.sh: #13708: OCSPD: Creating DB OCSPEE12DB - PASSED chains.sh: Creating EE certifiate request OCSPEE12Req.der certutil -s "CN=OCSPEE12 EE, O=OCSPEE12, C=US" -R -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13709: OCSPD: Creating EE certifiate request OCSPEE12Req.der - PASSED chains.sh: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE12Req.der -o OCSPEE12OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9169/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13710: OCSPD: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database certutil -A -n OCSPEE12 -t u,u,u -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -i OCSPEE12OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13711: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database - PASSED chains.sh: Creating DB OCSPEE13DB certutil -N -d OCSPEE13DB -f OCSPEE13DB/dbpasswd chains.sh: #13712: OCSPD: Creating DB OCSPEE13DB - PASSED chains.sh: Creating EE certifiate request OCSPEE13Req.der certutil -s "CN=OCSPEE13 EE, O=OCSPEE13, C=US" -R -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE13Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13713: OCSPD: Creating EE certifiate request OCSPEE13Req.der - PASSED chains.sh: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE13Req.der -o OCSPEE13OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9169/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13714: OCSPD: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database certutil -A -n OCSPEE13 -t u,u,u -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -i OCSPEE13OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13715: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database - PASSED chains.sh: Creating DB OCSPEE14DB certutil -N -d OCSPEE14DB -f OCSPEE14DB/dbpasswd chains.sh: #13716: OCSPD: Creating DB OCSPEE14DB - PASSED chains.sh: Creating EE certifiate request OCSPEE14Req.der certutil -s "CN=OCSPEE14 EE, O=OCSPEE14, C=US" -R -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE14Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13717: OCSPD: Creating EE certifiate request OCSPEE14Req.der - PASSED chains.sh: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE14Req.der -o OCSPEE14OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 4 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9169/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13718: OCSPD: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database certutil -A -n OCSPEE14 -t u,u,u -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -i OCSPEE14OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13719: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database - PASSED chains.sh: Creating DB OCSPEE15DB certutil -N -d OCSPEE15DB -f OCSPEE15DB/dbpasswd chains.sh: #13720: OCSPD: Creating DB OCSPEE15DB - PASSED chains.sh: Creating EE certifiate request OCSPEE15Req.der certutil -s "CN=OCSPEE15 EE, O=OCSPEE15, C=US" -R -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE15Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13721: OCSPD: Creating EE certifiate request OCSPEE15Req.der - PASSED chains.sh: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE15Req.der -o OCSPEE15OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 5 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9170 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13722: OCSPD: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database certutil -A -n OCSPEE15 -t u,u,u -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -i OCSPEE15OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13723: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database - PASSED chains.sh: Creating DB OCSPEE21DB certutil -N -d OCSPEE21DB -f OCSPEE21DB/dbpasswd chains.sh: #13724: OCSPD: Creating DB OCSPEE21DB - PASSED chains.sh: Creating EE certifiate request OCSPEE21Req.der certutil -s "CN=OCSPEE21 EE, O=OCSPEE21, C=US" -R -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13725: OCSPD: Creating EE certifiate request OCSPEE21Req.der - PASSED chains.sh: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE21Req.der -o OCSPEE21OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9169/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13726: OCSPD: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database certutil -A -n OCSPEE21 -t u,u,u -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -i OCSPEE21OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13727: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database - PASSED chains.sh: Creating DB OCSPEE22DB certutil -N -d OCSPEE22DB -f OCSPEE22DB/dbpasswd chains.sh: #13728: OCSPD: Creating DB OCSPEE22DB - PASSED chains.sh: Creating EE certifiate request OCSPEE22Req.der certutil -s "CN=OCSPEE22 EE, O=OCSPEE22, C=US" -R -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE22Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13729: OCSPD: Creating EE certifiate request OCSPEE22Req.der - PASSED chains.sh: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE22Req.der -o OCSPEE22OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9169/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13730: OCSPD: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database certutil -A -n OCSPEE22 -t u,u,u -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -i OCSPEE22OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13731: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database - PASSED chains.sh: Creating DB OCSPEE23DB certutil -N -d OCSPEE23DB -f OCSPEE23DB/dbpasswd chains.sh: #13732: OCSPD: Creating DB OCSPEE23DB - PASSED chains.sh: Creating EE certifiate request OCSPEE23Req.der certutil -s "CN=OCSPEE23 EE, O=OCSPEE23, C=US" -R -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE23Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13733: OCSPD: Creating EE certifiate request OCSPEE23Req.der - PASSED chains.sh: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE23Req.der -o OCSPEE23OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9170 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13734: OCSPD: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database certutil -A -n OCSPEE23 -t u,u,u -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -i OCSPEE23OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13735: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database - PASSED chains.sh: Creating DB OCSPEE31DB certutil -N -d OCSPEE31DB -f OCSPEE31DB/dbpasswd chains.sh: #13736: OCSPD: Creating DB OCSPEE31DB - PASSED chains.sh: Creating EE certifiate request OCSPEE31Req.der certutil -s "CN=OCSPEE31 EE, O=OCSPEE31, C=US" -R -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE31Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13737: OCSPD: Creating EE certifiate request OCSPEE31Req.der - PASSED chains.sh: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE31Req.der -o OCSPEE31OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9169/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13738: OCSPD: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database certutil -A -n OCSPEE31 -t u,u,u -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -i OCSPEE31OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13739: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database - PASSED chains.sh: Creating DB OCSPEE32DB certutil -N -d OCSPEE32DB -f OCSPEE32DB/dbpasswd chains.sh: #13740: OCSPD: Creating DB OCSPEE32DB - PASSED chains.sh: Creating EE certifiate request OCSPEE32Req.der certutil -s "CN=OCSPEE32 EE, O=OCSPEE32, C=US" -R -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE32Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13741: OCSPD: Creating EE certifiate request OCSPEE32Req.der - PASSED chains.sh: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE32Req.der -o OCSPEE32OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9169/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13742: OCSPD: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database certutil -A -n OCSPEE32 -t u,u,u -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -i OCSPEE32OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13743: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database - PASSED chains.sh: Creating DB OCSPEE33DB certutil -N -d OCSPEE33DB -f OCSPEE33DB/dbpasswd chains.sh: #13744: OCSPD: Creating DB OCSPEE33DB - PASSED chains.sh: Creating EE certifiate request OCSPEE33Req.der certutil -s "CN=OCSPEE33 EE, O=OCSPEE33, C=US" -R -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE33Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13745: OCSPD: Creating EE certifiate request OCSPEE33Req.der - PASSED chains.sh: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE33Req.der -o OCSPEE33OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9170 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13746: OCSPD: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database certutil -A -n OCSPEE33 -t u,u,u -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -i OCSPEE33OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13747: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database - PASSED chains.sh: Create CRL for OCSPRootDB crlutil -G -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20160108232156Z nextupdate=20170108232156Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Fri Jan 08 23:21:56 2016 Next Update: Sun Jan 08 23:21:56 2017 CRL Extensions: chains.sh: #13748: OCSPD: Create CRL for OCSPRootDB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPRoot crlutil -M -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20160108232157Z addcert 2 20160108232157Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Fri Jan 08 23:21:57 2016 Next Update: Sun Jan 08 23:21:56 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 23:21:57 2016 CRL Extensions: chains.sh: #13749: OCSPD: Revoking certificate with SN 2 issued by OCSPRoot - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20160108232158Z nextupdate=20170108232158Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Jan 08 23:21:58 2016 Next Update: Sun Jan 08 23:21:58 2017 CRL Extensions: chains.sh: #13750: OCSPD: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20160108232159Z addcert 2 20160108232159Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Jan 08 23:21:59 2016 Next Update: Sun Jan 08 23:21:58 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 23:21:59 2016 CRL Extensions: chains.sh: #13751: OCSPD: Revoking certificate with SN 2 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20160108232200Z addcert 4 20160108232200Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Jan 08 23:22:00 2016 Next Update: Sun Jan 08 23:21:58 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 23:21:59 2016 Entry 2 (0x2): Serial Number: 4 (0x4) Revocation Date: Fri Jan 08 23:22:00 2016 CRL Extensions: chains.sh: #13752: OCSPD: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Create CRL for OCSPCA2DB crlutil -G -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20160108232201Z nextupdate=20170108232201Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Jan 08 23:22:01 2016 Next Update: Sun Jan 08 23:22:01 2017 CRL Extensions: chains.sh: #13753: OCSPD: Create CRL for OCSPCA2DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20160108232202Z addcert 2 20160108232202Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Jan 08 23:22:02 2016 Next Update: Sun Jan 08 23:22:01 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 23:22:02 2016 CRL Extensions: chains.sh: #13754: OCSPD: Revoking certificate with SN 2 issued by OCSPCA2 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20160108232203Z addcert 3 20160108232203Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Jan 08 23:22:03 2016 Next Update: Sun Jan 08 23:22:01 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 23:22:02 2016 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Fri Jan 08 23:22:03 2016 CRL Extensions: chains.sh: #13755: OCSPD: Revoking certificate with SN 3 issued by OCSPCA2 - PASSED chains.sh: Create CRL for OCSPCA3DB crlutil -G -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20160108232204Z nextupdate=20170108232204Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Jan 08 23:22:04 2016 Next Update: Sun Jan 08 23:22:04 2017 CRL Extensions: chains.sh: #13756: OCSPD: Create CRL for OCSPCA3DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20160108232205Z addcert 2 20160108232205Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Jan 08 23:22:05 2016 Next Update: Sun Jan 08 23:22:04 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 23:22:05 2016 CRL Extensions: chains.sh: #13757: OCSPD: Revoking certificate with SN 2 issued by OCSPCA3 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20160108232206Z addcert 3 20160108232206Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Jan 08 23:22:06 2016 Next Update: Sun Jan 08 23:22:04 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Jan 08 23:22:05 2016 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Fri Jan 08 23:22:06 2016 CRL Extensions: chains.sh: #13758: OCSPD: Revoking certificate with SN 3 issued by OCSPCA3 - PASSED chains.sh: Creating DB ServerDB certutil -N -d ServerDB -f ServerDB/dbpasswd chains.sh: #13759: OCSPD: Creating DB ServerDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ServerDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.der chains.sh: #13760: OCSPD: Importing certificate OCSPRoot.der to ServerDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ServerDB database crlutil -I -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.crl chains.sh: #13761: OCSPD: Importing CRL OCSPRoot.crl to ServerDB database - PASSED chains.sh: Importing p12 key OCSPRoot.p12 to ServerDB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPRoot.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #13762: OCSPD: Importing p12 key OCSPRoot.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to ServerDB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA1.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #13763: OCSPD: Importing p12 key OCSPCA1.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA2.p12 to ServerDB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA2.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #13764: OCSPD: Importing p12 key OCSPCA2.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA3.p12 to ServerDB database /builddir/build/BUILD/nss-3.19.1/dist/Linux3.19_arm_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA3.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #13765: OCSPD: Importing p12 key OCSPCA3.p12 to ServerDB database - PASSED chains.sh: Creating DB ClientDB certutil -N -d ClientDB -f ClientDB/dbpasswd chains.sh: #13766: OCSPD: Creating DB ClientDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ClientDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.der chains.sh: #13767: OCSPD: Importing certificate OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ClientDB database crlutil -I -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.crl chains.sh: #13768: OCSPD: Importing CRL OCSPRoot.crl to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database certutil -A -n OCSPCA1OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA1OCSPRoot.der chains.sh: #13769: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database certutil -A -n OCSPCA2OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA2OCSPRoot.der chains.sh: #13770: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database certutil -A -n OCSPCA3OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA3OCSPRoot.der chains.sh: #13771: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database certutil -A -n OCSPEE11OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE11OCSPCA1.der chains.sh: #13772: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database certutil -A -n OCSPEE12OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE12OCSPCA1.der chains.sh: #13773: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database certutil -A -n OCSPEE13OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE13OCSPCA1.der chains.sh: #13774: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database certutil -A -n OCSPEE14OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE14OCSPCA1.der chains.sh: #13775: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database certutil -A -n OCSPEE15OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE15OCSPCA1.der chains.sh: #13776: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database certutil -A -n OCSPEE21OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE21OCSPCA2.der chains.sh: #13777: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database certutil -A -n OCSPEE22OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE22OCSPCA2.der chains.sh: #13778: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database certutil -A -n OCSPEE23OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE23OCSPCA2.der chains.sh: #13779: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database certutil -A -n OCSPEE31OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE31OCSPCA3.der chains.sh: #13780: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database certutil -A -n OCSPEE32OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE32OCSPCA3.der chains.sh: #13781: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database certutil -A -n OCSPEE33OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE33OCSPCA3.der chains.sh: #13782: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database - PASSED httpserv starting at Fri Jan 8 18:22:25 EST 2016 httpserv -D -p 9169 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O get -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.27064 & trying to connect to httpserv at Fri Jan 8 18:22:25 EST 2016 tstclnt -p 9169 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to httpserv at Fri Jan 8 18:22:31 EST 2016 tstclnt -p 9169 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #13783: Waiting for Server - FAILED kill -0 28578 >/dev/null 2>/dev/null httpserv with PID 28578 found at Fri Jan 8 18:22:31 EST 2016 httpserv with PID 28578 started at Fri Jan 8 18:22:31 EST 2016 tstclnt -h localhost.localdomain -p 9169 -q -t 20 tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #13784: Test that OCSP server is reachable - FAILED trying to kill httpserv with PID 28578 at Fri Jan 8 18:22:32 EST 2016 kill -USR1 28578 httpserv: normal termination httpserv -b -p 9169 2>/dev/null; httpserv with PID 28578 killed at Fri Jan 8 18:22:33 EST 2016 httpserv starting at Fri Jan 8 18:22:33 EST 2016 httpserv -D -p 9169 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O post -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.27064 & trying to connect to httpserv at Fri Jan 8 18:22:33 EST 2016 tstclnt -p 9169 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to httpserv at Fri Jan 8 18:22:38 EST 2016 tstclnt -p 9169 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #13785: Waiting for Server - FAILED kill -0 28664 >/dev/null 2>/dev/null httpserv with PID 28664 found at Fri Jan 8 18:22:39 EST 2016 httpserv with PID 28664 started at Fri Jan 8 18:22:39 EST 2016 tstclnt -h localhost.localdomain -p 9169 -q -t 20 tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #13786: Test that OCSP server is reachable - FAILED trying to kill httpserv with PID 28664 at Fri Jan 8 18:22:40 EST 2016 kill -USR1 28664 httpserv: normal termination httpserv -b -p 9169 2>/dev/null; httpserv with PID 28664 killed at Fri Jan 8 18:22:41 EST 2016 httpserv starting at Fri Jan 8 18:22:41 EST 2016 httpserv -D -p 9169 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.27064 & trying to connect to httpserv at Fri Jan 8 18:22:41 EST 2016 tstclnt -p 9169 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to httpserv at Fri Jan 8 18:22:46 EST 2016 tstclnt -p 9169 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #13787: Waiting for Server - FAILED kill -0 28749 >/dev/null 2>/dev/null httpserv with PID 28749 found at Fri Jan 8 18:22:47 EST 2016 httpserv with PID 28749 started at Fri Jan 8 18:22:47 EST 2016 chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #13788: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181829 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13789: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #13790: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #13791: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181830 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13792: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #13793: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #13794: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13795: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108181831 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13796: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13797: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108181832 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13798: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13799: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #13800: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #13801: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13802: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 108181833 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13803: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13804: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #13805: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #13806: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #13807: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181830 (0x672b946) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 23:23:02 2016 Not After : Fri Jan 08 23:23:02 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 95:54:c9:73:2b:d0:ec:7d:0e:8e:81:7d:65:12:16:e3: 24:ea:86:2c:59:16:2c:c2:18:cf:41:7e:76:60:52:5e: 01:d5:86:04:94:da:14:68:23:ae:93:fd:cd:90:7c:2d: 1e:d4:2d:64:c0:88:52:96:9b:ff:69:e7:71:b4:c1:e2: d1:f2:b4:e5:cb:fc:36:05:7d:0b:71:5d:37:70:2e:c6: bb:1a:88:ca:0e:a5:2b:72:11:1c:cd:cb:92:0b:be:be: f2:80:c4:2a:42:ec:fe:99:36:fe:e5:1f:f9:97:ae:70: 70:a6:6f:6a:bd:28:73:d1:6a:2e:05:01:f2:b0:65:88: d0:f0:00:55:60:66:4f:ef:6d:60:22:7d:7f:3f:3c:da: 19:c9:9f:2a:61:b2:dc:a8:10:e2:19:49:97:9d:0a:f1: 45:76:8e:e5:49:dc:05:83:3a:32:65:99:b1:67:16:3d: da:76:36:8f:9a:df:e0:b1:22:d0:b1:c3:93:c9:82:e7: f5:db:0e:1e:2d:87:8e:5b:64:6f:45:eb:3c:70:e1:0a: 0f:a4:94:f5:4f:4d:26:ee:5a:c9:c6:95:a2:08:aa:1e: de:c0:b6:ee:e3:19:d0:97:33:eb:12:96:bd:99:3d:8f: f3:d6:fa:e1:2f:74:5e:82:39:6f:07:c8:da:7a:e0:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:33:21:55:fe:56:b4:29:ac:73:61:e2:92:fd:b7:92: db:23:f1:e6:06:b3:f8:a0:65:75:67:8c:51:ab:80:c1: ab:99:8b:5e:ad:2a:75:e3:a3:cd:d8:a1:b8:30:7f:f6: 5e:83:2a:e3:72:b8:ab:d0:f8:84:08:f2:81:cf:57:37: 2d:26:24:c5:cc:fa:60:5a:71:0b:27:f4:62:fe:3c:33: 0e:b9:03:2d:f7:57:7d:a6:cb:9b:08:6f:34:f8:84:86: d8:3a:a5:9e:a4:8a:b4:34:94:c3:6f:6e:9e:bd:ee:32: 62:56:4f:50:9e:6c:a5:41:7d:7d:96:ea:e4:2d:57:1b: e2:fa:00:6e:b7:b1:5c:9a:4c:f0:49:3b:ff:69:9e:9f: 67:2a:1f:b9:f2:4a:fa:5a:4d:20:3c:a6:21:d5:b8:8f: 08:25:4b:cd:fa:22:c0:ba:b4:34:27:8c:72:32:2f:1f: 2e:21:ed:24:59:cb:5d:12:d9:d0:87:80:77:ee:57:85: 08:52:87:12:99:0f:7a:db:36:a1:57:25:5f:7d:fd:9b: 96:79:33:a7:97:d8:8f:b8:15:4b:33:9b:8d:08:61:9f: 90:40:a3:44:e9:a5:3b:1e:60:b1:14:87:87:54:82:5c: 26:9d:f5:8a:8e:62:3b:a7:50:3b:28:d7:7a:27:ff:e5 Fingerprint (SHA-256): F5:D6:45:1C:84:99:74:8D:E1:1E:7A:01:24:F6:21:16:DD:1A:88:5D:DA:ED:8D:98:B9:F8:71:25:A8:1B:68:52 Fingerprint (SHA1): 60:63:82:5C:AE:DE:B9:94:47:89:BE:EF:87:4D:C1:89:C4:41:9A:79 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13808: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181829 (0x672b945) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 23:22:57 2016 Not After : Fri Jan 08 23:22:57 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:5d:2a:0f:47:72:55:99:64:55:18:a8:99:53:25:55: 8c:c5:fd:8d:75:22:ad:64:c2:6b:d8:7d:da:8d:8b:7f: 1a:48:9c:ba:4e:41:de:d5:f2:07:6c:b0:2a:7a:bd:df: c1:09:70:89:ee:56:8a:3b:d0:7b:09:0c:b2:4b:27:9e: a0:36:f4:16:9f:e5:9f:ee:93:c0:3e:d1:fa:2e:2d:4e: 37:92:a2:6d:e8:c4:25:03:f1:45:f0:bf:83:67:99:46: e7:f4:89:4a:ee:1c:b0:bd:1c:20:f6:4f:0b:52:d5:5a: 06:6e:72:4e:b9:6f:6d:b2:4a:c4:7e:08:3d:af:27:4f: 33:47:8d:57:fb:68:a7:75:6b:20:51:5e:ee:1f:bc:20: 9d:10:24:10:44:8e:12:ce:9e:57:61:a3:12:e0:11:c1: cb:a2:d4:08:fb:0c:c1:b5:6c:0a:eb:ab:e5:c3:e3:49: 58:c8:24:24:b8:eb:6b:fd:dd:b8:18:d9:85:8f:c5:33: ec:54:56:93:f8:e3:ce:b7:f0:14:78:3e:bb:a6:7b:4e: 1a:0c:e2:52:5c:d4:b9:2e:e7:c2:87:74:cd:e9:84:eb: 65:a6:d1:ff:fc:42:c6:7a:e2:55:5c:48:74:00:29:ac: 98:11:2f:68:7d:44:81:85:13:06:18:2d:2a:80:2f:bd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:91:c5:b9:1b:4b:ed:da:99:e7:cd:48:27:7b:e1:07: 93:c1:ff:1c:e4:58:54:ff:25:74:40:3f:b3:39:8e:13: ba:5c:7c:4f:14:e0:f4:4d:44:2f:1f:d5:1b:2d:eb:9b: 06:47:cd:0b:fd:d6:45:24:7e:42:a6:df:0c:ef:f6:2b: 85:0c:bd:1e:ce:f1:56:11:e9:1a:7c:39:1c:3c:21:5f: 5e:37:bd:11:4c:9a:1f:2e:a2:38:86:18:ba:09:b0:b3: 95:42:94:80:1e:fa:7d:ef:10:2f:73:a0:8d:00:dd:a9: 50:2a:9e:e6:06:f6:68:51:eb:e5:93:07:14:1b:e2:71: c4:16:e9:49:f9:81:5a:09:b9:56:53:b9:1c:64:59:cb: 6a:d3:f0:73:cd:05:4a:7f:24:bf:c0:a4:e6:81:fb:d9: e8:96:0d:7e:20:b6:5c:ae:77:77:02:88:b7:df:20:31: c6:ca:3e:1c:36:59:28:0a:97:70:b9:98:9b:f3:1c:13: 09:9f:1d:91:55:fe:88:75:fc:15:fb:51:fa:71:ef:3a: 05:20:c5:76:53:4c:7c:3e:bd:06:4e:3d:0e:ea:bc:fc: 80:ca:fa:0f:bc:e7:1b:f7:18:03:96:74:78:6b:69:74: 40:bf:90:4a:cb:be:46:06:a9:b4:a0:e2:24:09:4b:e4 Fingerprint (SHA-256): 04:7A:43:DC:6A:83:D5:6E:37:8D:0D:ED:ED:85:D6:09:18:FD:58:77:16:54:7D:79:3E:11:9E:49:EC:BD:37:61 Fingerprint (SHA1): D8:44:45:2A:F7:3A:D6:F6:FD:9B:FA:B2:04:BC:DA:4A:74:B6:B6:89 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13809: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #13810: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #13811: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #13812: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181829 (0x672b945) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 23:22:57 2016 Not After : Fri Jan 08 23:22:57 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:5d:2a:0f:47:72:55:99:64:55:18:a8:99:53:25:55: 8c:c5:fd:8d:75:22:ad:64:c2:6b:d8:7d:da:8d:8b:7f: 1a:48:9c:ba:4e:41:de:d5:f2:07:6c:b0:2a:7a:bd:df: c1:09:70:89:ee:56:8a:3b:d0:7b:09:0c:b2:4b:27:9e: a0:36:f4:16:9f:e5:9f:ee:93:c0:3e:d1:fa:2e:2d:4e: 37:92:a2:6d:e8:c4:25:03:f1:45:f0:bf:83:67:99:46: e7:f4:89:4a:ee:1c:b0:bd:1c:20:f6:4f:0b:52:d5:5a: 06:6e:72:4e:b9:6f:6d:b2:4a:c4:7e:08:3d:af:27:4f: 33:47:8d:57:fb:68:a7:75:6b:20:51:5e:ee:1f:bc:20: 9d:10:24:10:44:8e:12:ce:9e:57:61:a3:12:e0:11:c1: cb:a2:d4:08:fb:0c:c1:b5:6c:0a:eb:ab:e5:c3:e3:49: 58:c8:24:24:b8:eb:6b:fd:dd:b8:18:d9:85:8f:c5:33: ec:54:56:93:f8:e3:ce:b7:f0:14:78:3e:bb:a6:7b:4e: 1a:0c:e2:52:5c:d4:b9:2e:e7:c2:87:74:cd:e9:84:eb: 65:a6:d1:ff:fc:42:c6:7a:e2:55:5c:48:74:00:29:ac: 98:11:2f:68:7d:44:81:85:13:06:18:2d:2a:80:2f:bd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:91:c5:b9:1b:4b:ed:da:99:e7:cd:48:27:7b:e1:07: 93:c1:ff:1c:e4:58:54:ff:25:74:40:3f:b3:39:8e:13: ba:5c:7c:4f:14:e0:f4:4d:44:2f:1f:d5:1b:2d:eb:9b: 06:47:cd:0b:fd:d6:45:24:7e:42:a6:df:0c:ef:f6:2b: 85:0c:bd:1e:ce:f1:56:11:e9:1a:7c:39:1c:3c:21:5f: 5e:37:bd:11:4c:9a:1f:2e:a2:38:86:18:ba:09:b0:b3: 95:42:94:80:1e:fa:7d:ef:10:2f:73:a0:8d:00:dd:a9: 50:2a:9e:e6:06:f6:68:51:eb:e5:93:07:14:1b:e2:71: c4:16:e9:49:f9:81:5a:09:b9:56:53:b9:1c:64:59:cb: 6a:d3:f0:73:cd:05:4a:7f:24:bf:c0:a4:e6:81:fb:d9: e8:96:0d:7e:20:b6:5c:ae:77:77:02:88:b7:df:20:31: c6:ca:3e:1c:36:59:28:0a:97:70:b9:98:9b:f3:1c:13: 09:9f:1d:91:55:fe:88:75:fc:15:fb:51:fa:71:ef:3a: 05:20:c5:76:53:4c:7c:3e:bd:06:4e:3d:0e:ea:bc:fc: 80:ca:fa:0f:bc:e7:1b:f7:18:03:96:74:78:6b:69:74: 40:bf:90:4a:cb:be:46:06:a9:b4:a0:e2:24:09:4b:e4 Fingerprint (SHA-256): 04:7A:43:DC:6A:83:D5:6E:37:8D:0D:ED:ED:85:D6:09:18:FD:58:77:16:54:7D:79:3E:11:9E:49:EC:BD:37:61 Fingerprint (SHA1): D8:44:45:2A:F7:3A:D6:F6:FD:9B:FA:B2:04:BC:DA:4A:74:B6:B6:89 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13813: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181830 (0x672b946) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 23:23:02 2016 Not After : Fri Jan 08 23:23:02 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 95:54:c9:73:2b:d0:ec:7d:0e:8e:81:7d:65:12:16:e3: 24:ea:86:2c:59:16:2c:c2:18:cf:41:7e:76:60:52:5e: 01:d5:86:04:94:da:14:68:23:ae:93:fd:cd:90:7c:2d: 1e:d4:2d:64:c0:88:52:96:9b:ff:69:e7:71:b4:c1:e2: d1:f2:b4:e5:cb:fc:36:05:7d:0b:71:5d:37:70:2e:c6: bb:1a:88:ca:0e:a5:2b:72:11:1c:cd:cb:92:0b:be:be: f2:80:c4:2a:42:ec:fe:99:36:fe:e5:1f:f9:97:ae:70: 70:a6:6f:6a:bd:28:73:d1:6a:2e:05:01:f2:b0:65:88: d0:f0:00:55:60:66:4f:ef:6d:60:22:7d:7f:3f:3c:da: 19:c9:9f:2a:61:b2:dc:a8:10:e2:19:49:97:9d:0a:f1: 45:76:8e:e5:49:dc:05:83:3a:32:65:99:b1:67:16:3d: da:76:36:8f:9a:df:e0:b1:22:d0:b1:c3:93:c9:82:e7: f5:db:0e:1e:2d:87:8e:5b:64:6f:45:eb:3c:70:e1:0a: 0f:a4:94:f5:4f:4d:26:ee:5a:c9:c6:95:a2:08:aa:1e: de:c0:b6:ee:e3:19:d0:97:33:eb:12:96:bd:99:3d:8f: f3:d6:fa:e1:2f:74:5e:82:39:6f:07:c8:da:7a:e0:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:33:21:55:fe:56:b4:29:ac:73:61:e2:92:fd:b7:92: db:23:f1:e6:06:b3:f8:a0:65:75:67:8c:51:ab:80:c1: ab:99:8b:5e:ad:2a:75:e3:a3:cd:d8:a1:b8:30:7f:f6: 5e:83:2a:e3:72:b8:ab:d0:f8:84:08:f2:81:cf:57:37: 2d:26:24:c5:cc:fa:60:5a:71:0b:27:f4:62:fe:3c:33: 0e:b9:03:2d:f7:57:7d:a6:cb:9b:08:6f:34:f8:84:86: d8:3a:a5:9e:a4:8a:b4:34:94:c3:6f:6e:9e:bd:ee:32: 62:56:4f:50:9e:6c:a5:41:7d:7d:96:ea:e4:2d:57:1b: e2:fa:00:6e:b7:b1:5c:9a:4c:f0:49:3b:ff:69:9e:9f: 67:2a:1f:b9:f2:4a:fa:5a:4d:20:3c:a6:21:d5:b8:8f: 08:25:4b:cd:fa:22:c0:ba:b4:34:27:8c:72:32:2f:1f: 2e:21:ed:24:59:cb:5d:12:d9:d0:87:80:77:ee:57:85: 08:52:87:12:99:0f:7a:db:36:a1:57:25:5f:7d:fd:9b: 96:79:33:a7:97:d8:8f:b8:15:4b:33:9b:8d:08:61:9f: 90:40:a3:44:e9:a5:3b:1e:60:b1:14:87:87:54:82:5c: 26:9d:f5:8a:8e:62:3b:a7:50:3b:28:d7:7a:27:ff:e5 Fingerprint (SHA-256): F5:D6:45:1C:84:99:74:8D:E1:1E:7A:01:24:F6:21:16:DD:1A:88:5D:DA:ED:8D:98:B9:F8:71:25:A8:1B:68:52 Fingerprint (SHA1): 60:63:82:5C:AE:DE:B9:94:47:89:BE:EF:87:4D:C1:89:C4:41:9A:79 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13814: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #13815: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #13816: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #13817: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #13818: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #13819: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181830 (0x672b946) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 23:23:02 2016 Not After : Fri Jan 08 23:23:02 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 95:54:c9:73:2b:d0:ec:7d:0e:8e:81:7d:65:12:16:e3: 24:ea:86:2c:59:16:2c:c2:18:cf:41:7e:76:60:52:5e: 01:d5:86:04:94:da:14:68:23:ae:93:fd:cd:90:7c:2d: 1e:d4:2d:64:c0:88:52:96:9b:ff:69:e7:71:b4:c1:e2: d1:f2:b4:e5:cb:fc:36:05:7d:0b:71:5d:37:70:2e:c6: bb:1a:88:ca:0e:a5:2b:72:11:1c:cd:cb:92:0b:be:be: f2:80:c4:2a:42:ec:fe:99:36:fe:e5:1f:f9:97:ae:70: 70:a6:6f:6a:bd:28:73:d1:6a:2e:05:01:f2:b0:65:88: d0:f0:00:55:60:66:4f:ef:6d:60:22:7d:7f:3f:3c:da: 19:c9:9f:2a:61:b2:dc:a8:10:e2:19:49:97:9d:0a:f1: 45:76:8e:e5:49:dc:05:83:3a:32:65:99:b1:67:16:3d: da:76:36:8f:9a:df:e0:b1:22:d0:b1:c3:93:c9:82:e7: f5:db:0e:1e:2d:87:8e:5b:64:6f:45:eb:3c:70:e1:0a: 0f:a4:94:f5:4f:4d:26:ee:5a:c9:c6:95:a2:08:aa:1e: de:c0:b6:ee:e3:19:d0:97:33:eb:12:96:bd:99:3d:8f: f3:d6:fa:e1:2f:74:5e:82:39:6f:07:c8:da:7a:e0:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:33:21:55:fe:56:b4:29:ac:73:61:e2:92:fd:b7:92: db:23:f1:e6:06:b3:f8:a0:65:75:67:8c:51:ab:80:c1: ab:99:8b:5e:ad:2a:75:e3:a3:cd:d8:a1:b8:30:7f:f6: 5e:83:2a:e3:72:b8:ab:d0:f8:84:08:f2:81:cf:57:37: 2d:26:24:c5:cc:fa:60:5a:71:0b:27:f4:62:fe:3c:33: 0e:b9:03:2d:f7:57:7d:a6:cb:9b:08:6f:34:f8:84:86: d8:3a:a5:9e:a4:8a:b4:34:94:c3:6f:6e:9e:bd:ee:32: 62:56:4f:50:9e:6c:a5:41:7d:7d:96:ea:e4:2d:57:1b: e2:fa:00:6e:b7:b1:5c:9a:4c:f0:49:3b:ff:69:9e:9f: 67:2a:1f:b9:f2:4a:fa:5a:4d:20:3c:a6:21:d5:b8:8f: 08:25:4b:cd:fa:22:c0:ba:b4:34:27:8c:72:32:2f:1f: 2e:21:ed:24:59:cb:5d:12:d9:d0:87:80:77:ee:57:85: 08:52:87:12:99:0f:7a:db:36:a1:57:25:5f:7d:fd:9b: 96:79:33:a7:97:d8:8f:b8:15:4b:33:9b:8d:08:61:9f: 90:40:a3:44:e9:a5:3b:1e:60:b1:14:87:87:54:82:5c: 26:9d:f5:8a:8e:62:3b:a7:50:3b:28:d7:7a:27:ff:e5 Fingerprint (SHA-256): F5:D6:45:1C:84:99:74:8D:E1:1E:7A:01:24:F6:21:16:DD:1A:88:5D:DA:ED:8D:98:B9:F8:71:25:A8:1B:68:52 Fingerprint (SHA1): 60:63:82:5C:AE:DE:B9:94:47:89:BE:EF:87:4D:C1:89:C4:41:9A:79 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13820: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181830 (0x672b946) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 23:23:02 2016 Not After : Fri Jan 08 23:23:02 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 95:54:c9:73:2b:d0:ec:7d:0e:8e:81:7d:65:12:16:e3: 24:ea:86:2c:59:16:2c:c2:18:cf:41:7e:76:60:52:5e: 01:d5:86:04:94:da:14:68:23:ae:93:fd:cd:90:7c:2d: 1e:d4:2d:64:c0:88:52:96:9b:ff:69:e7:71:b4:c1:e2: d1:f2:b4:e5:cb:fc:36:05:7d:0b:71:5d:37:70:2e:c6: bb:1a:88:ca:0e:a5:2b:72:11:1c:cd:cb:92:0b:be:be: f2:80:c4:2a:42:ec:fe:99:36:fe:e5:1f:f9:97:ae:70: 70:a6:6f:6a:bd:28:73:d1:6a:2e:05:01:f2:b0:65:88: d0:f0:00:55:60:66:4f:ef:6d:60:22:7d:7f:3f:3c:da: 19:c9:9f:2a:61:b2:dc:a8:10:e2:19:49:97:9d:0a:f1: 45:76:8e:e5:49:dc:05:83:3a:32:65:99:b1:67:16:3d: da:76:36:8f:9a:df:e0:b1:22:d0:b1:c3:93:c9:82:e7: f5:db:0e:1e:2d:87:8e:5b:64:6f:45:eb:3c:70:e1:0a: 0f:a4:94:f5:4f:4d:26:ee:5a:c9:c6:95:a2:08:aa:1e: de:c0:b6:ee:e3:19:d0:97:33:eb:12:96:bd:99:3d:8f: f3:d6:fa:e1:2f:74:5e:82:39:6f:07:c8:da:7a:e0:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:33:21:55:fe:56:b4:29:ac:73:61:e2:92:fd:b7:92: db:23:f1:e6:06:b3:f8:a0:65:75:67:8c:51:ab:80:c1: ab:99:8b:5e:ad:2a:75:e3:a3:cd:d8:a1:b8:30:7f:f6: 5e:83:2a:e3:72:b8:ab:d0:f8:84:08:f2:81:cf:57:37: 2d:26:24:c5:cc:fa:60:5a:71:0b:27:f4:62:fe:3c:33: 0e:b9:03:2d:f7:57:7d:a6:cb:9b:08:6f:34:f8:84:86: d8:3a:a5:9e:a4:8a:b4:34:94:c3:6f:6e:9e:bd:ee:32: 62:56:4f:50:9e:6c:a5:41:7d:7d:96:ea:e4:2d:57:1b: e2:fa:00:6e:b7:b1:5c:9a:4c:f0:49:3b:ff:69:9e:9f: 67:2a:1f:b9:f2:4a:fa:5a:4d:20:3c:a6:21:d5:b8:8f: 08:25:4b:cd:fa:22:c0:ba:b4:34:27:8c:72:32:2f:1f: 2e:21:ed:24:59:cb:5d:12:d9:d0:87:80:77:ee:57:85: 08:52:87:12:99:0f:7a:db:36:a1:57:25:5f:7d:fd:9b: 96:79:33:a7:97:d8:8f:b8:15:4b:33:9b:8d:08:61:9f: 90:40:a3:44:e9:a5:3b:1e:60:b1:14:87:87:54:82:5c: 26:9d:f5:8a:8e:62:3b:a7:50:3b:28:d7:7a:27:ff:e5 Fingerprint (SHA-256): F5:D6:45:1C:84:99:74:8D:E1:1E:7A:01:24:F6:21:16:DD:1A:88:5D:DA:ED:8D:98:B9:F8:71:25:A8:1B:68:52 Fingerprint (SHA1): 60:63:82:5C:AE:DE:B9:94:47:89:BE:EF:87:4D:C1:89:C4:41:9A:79 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13821: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #13822: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #13823: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #13824: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #13825: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #13826: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181829 (0x672b945) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 23:22:57 2016 Not After : Fri Jan 08 23:22:57 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:5d:2a:0f:47:72:55:99:64:55:18:a8:99:53:25:55: 8c:c5:fd:8d:75:22:ad:64:c2:6b:d8:7d:da:8d:8b:7f: 1a:48:9c:ba:4e:41:de:d5:f2:07:6c:b0:2a:7a:bd:df: c1:09:70:89:ee:56:8a:3b:d0:7b:09:0c:b2:4b:27:9e: a0:36:f4:16:9f:e5:9f:ee:93:c0:3e:d1:fa:2e:2d:4e: 37:92:a2:6d:e8:c4:25:03:f1:45:f0:bf:83:67:99:46: e7:f4:89:4a:ee:1c:b0:bd:1c:20:f6:4f:0b:52:d5:5a: 06:6e:72:4e:b9:6f:6d:b2:4a:c4:7e:08:3d:af:27:4f: 33:47:8d:57:fb:68:a7:75:6b:20:51:5e:ee:1f:bc:20: 9d:10:24:10:44:8e:12:ce:9e:57:61:a3:12:e0:11:c1: cb:a2:d4:08:fb:0c:c1:b5:6c:0a:eb:ab:e5:c3:e3:49: 58:c8:24:24:b8:eb:6b:fd:dd:b8:18:d9:85:8f:c5:33: ec:54:56:93:f8:e3:ce:b7:f0:14:78:3e:bb:a6:7b:4e: 1a:0c:e2:52:5c:d4:b9:2e:e7:c2:87:74:cd:e9:84:eb: 65:a6:d1:ff:fc:42:c6:7a:e2:55:5c:48:74:00:29:ac: 98:11:2f:68:7d:44:81:85:13:06:18:2d:2a:80:2f:bd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:91:c5:b9:1b:4b:ed:da:99:e7:cd:48:27:7b:e1:07: 93:c1:ff:1c:e4:58:54:ff:25:74:40:3f:b3:39:8e:13: ba:5c:7c:4f:14:e0:f4:4d:44:2f:1f:d5:1b:2d:eb:9b: 06:47:cd:0b:fd:d6:45:24:7e:42:a6:df:0c:ef:f6:2b: 85:0c:bd:1e:ce:f1:56:11:e9:1a:7c:39:1c:3c:21:5f: 5e:37:bd:11:4c:9a:1f:2e:a2:38:86:18:ba:09:b0:b3: 95:42:94:80:1e:fa:7d:ef:10:2f:73:a0:8d:00:dd:a9: 50:2a:9e:e6:06:f6:68:51:eb:e5:93:07:14:1b:e2:71: c4:16:e9:49:f9:81:5a:09:b9:56:53:b9:1c:64:59:cb: 6a:d3:f0:73:cd:05:4a:7f:24:bf:c0:a4:e6:81:fb:d9: e8:96:0d:7e:20:b6:5c:ae:77:77:02:88:b7:df:20:31: c6:ca:3e:1c:36:59:28:0a:97:70:b9:98:9b:f3:1c:13: 09:9f:1d:91:55:fe:88:75:fc:15:fb:51:fa:71:ef:3a: 05:20:c5:76:53:4c:7c:3e:bd:06:4e:3d:0e:ea:bc:fc: 80:ca:fa:0f:bc:e7:1b:f7:18:03:96:74:78:6b:69:74: 40:bf:90:4a:cb:be:46:06:a9:b4:a0:e2:24:09:4b:e4 Fingerprint (SHA-256): 04:7A:43:DC:6A:83:D5:6E:37:8D:0D:ED:ED:85:D6:09:18:FD:58:77:16:54:7D:79:3E:11:9E:49:EC:BD:37:61 Fingerprint (SHA1): D8:44:45:2A:F7:3A:D6:F6:FD:9B:FA:B2:04:BC:DA:4A:74:B6:B6:89 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13827: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181829 (0x672b945) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 23:22:57 2016 Not After : Fri Jan 08 23:22:57 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:5d:2a:0f:47:72:55:99:64:55:18:a8:99:53:25:55: 8c:c5:fd:8d:75:22:ad:64:c2:6b:d8:7d:da:8d:8b:7f: 1a:48:9c:ba:4e:41:de:d5:f2:07:6c:b0:2a:7a:bd:df: c1:09:70:89:ee:56:8a:3b:d0:7b:09:0c:b2:4b:27:9e: a0:36:f4:16:9f:e5:9f:ee:93:c0:3e:d1:fa:2e:2d:4e: 37:92:a2:6d:e8:c4:25:03:f1:45:f0:bf:83:67:99:46: e7:f4:89:4a:ee:1c:b0:bd:1c:20:f6:4f:0b:52:d5:5a: 06:6e:72:4e:b9:6f:6d:b2:4a:c4:7e:08:3d:af:27:4f: 33:47:8d:57:fb:68:a7:75:6b:20:51:5e:ee:1f:bc:20: 9d:10:24:10:44:8e:12:ce:9e:57:61:a3:12:e0:11:c1: cb:a2:d4:08:fb:0c:c1:b5:6c:0a:eb:ab:e5:c3:e3:49: 58:c8:24:24:b8:eb:6b:fd:dd:b8:18:d9:85:8f:c5:33: ec:54:56:93:f8:e3:ce:b7:f0:14:78:3e:bb:a6:7b:4e: 1a:0c:e2:52:5c:d4:b9:2e:e7:c2:87:74:cd:e9:84:eb: 65:a6:d1:ff:fc:42:c6:7a:e2:55:5c:48:74:00:29:ac: 98:11:2f:68:7d:44:81:85:13:06:18:2d:2a:80:2f:bd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:91:c5:b9:1b:4b:ed:da:99:e7:cd:48:27:7b:e1:07: 93:c1:ff:1c:e4:58:54:ff:25:74:40:3f:b3:39:8e:13: ba:5c:7c:4f:14:e0:f4:4d:44:2f:1f:d5:1b:2d:eb:9b: 06:47:cd:0b:fd:d6:45:24:7e:42:a6:df:0c:ef:f6:2b: 85:0c:bd:1e:ce:f1:56:11:e9:1a:7c:39:1c:3c:21:5f: 5e:37:bd:11:4c:9a:1f:2e:a2:38:86:18:ba:09:b0:b3: 95:42:94:80:1e:fa:7d:ef:10:2f:73:a0:8d:00:dd:a9: 50:2a:9e:e6:06:f6:68:51:eb:e5:93:07:14:1b:e2:71: c4:16:e9:49:f9:81:5a:09:b9:56:53:b9:1c:64:59:cb: 6a:d3:f0:73:cd:05:4a:7f:24:bf:c0:a4:e6:81:fb:d9: e8:96:0d:7e:20:b6:5c:ae:77:77:02:88:b7:df:20:31: c6:ca:3e:1c:36:59:28:0a:97:70:b9:98:9b:f3:1c:13: 09:9f:1d:91:55:fe:88:75:fc:15:fb:51:fa:71:ef:3a: 05:20:c5:76:53:4c:7c:3e:bd:06:4e:3d:0e:ea:bc:fc: 80:ca:fa:0f:bc:e7:1b:f7:18:03:96:74:78:6b:69:74: 40:bf:90:4a:cb:be:46:06:a9:b4:a0:e2:24:09:4b:e4 Fingerprint (SHA-256): 04:7A:43:DC:6A:83:D5:6E:37:8D:0D:ED:ED:85:D6:09:18:FD:58:77:16:54:7D:79:3E:11:9E:49:EC:BD:37:61 Fingerprint (SHA1): D8:44:45:2A:F7:3A:D6:F6:FD:9B:FA:B2:04:BC:DA:4A:74:B6:B6:89 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13828: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #13829: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181834 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13830: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #13831: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #13832: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181835 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13833: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #13834: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #13835: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181836 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13836: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #13837: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #13838: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181837 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13839: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #13840: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #13841: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181838 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13842: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #13843: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #13844: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181839 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13845: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #13846: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #13847: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181840 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13848: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #13849: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #13850: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181841 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13851: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #13852: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #13853: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181842 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13854: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #13855: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #13856: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13857: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 108181843 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13858: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13859: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 108181844 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13860: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13861: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 108181845 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13862: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13863: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #13864: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #13865: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13866: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 108181846 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13867: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13868: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 108181847 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13869: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13870: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 108181848 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13871: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13872: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #13873: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #13874: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13875: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 108181849 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13876: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13877: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 108181850 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13878: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13879: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 108181851 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13880: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13881: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #13882: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #13883: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13884: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 108181852 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13885: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13886: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 108181853 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13887: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13888: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 108181854 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13889: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13890: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #13891: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #13892: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13893: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 108181855 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13894: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13895: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #13896: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13897: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108181856 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13898: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13899: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181834 (0x672b94a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Fri Jan 08 23:24:08 2016 Not After : Fri Jan 08 23:24:08 2066 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:15:6a:81:2d:94:61:80:e5:cf:5f:d3:b8:46:14:e8: cf:c3:0f:68:01:4d:db:50:f4:d6:8b:1a:1e:d6:1c:de: 35:bc:95:85:5a:82:68:ab:f9:50:98:3f:6c:6a:54:32: 02:5b:17:a7:1d:62:a9:e4:97:4c:94:dd:a3:d0:d0:b2: 7a:1e:00:d3:74:3a:a2:57:42:2c:a2:02:a3:29:a4:02: de:9d:58:6a:4d:e3:3c:bd:03:06:04:19:79:9c:fb:36: ad:9a:3a:25:80:44:11:f7:59:c5:0b:21:84:76:a7:20: 81:ca:1c:3a:42:7a:48:d1:35:0b:51:50:e4:3a:ce:b8: 96:f0:c3:fe:e3:94:75:37:b5:b7:f2:fe:30:94:43:d2: 31:5c:a7:7f:28:3c:a6:1a:be:bd:e2:4e:70:51:bf:b3: df:d9:9a:25:8a:06:cc:0d:47:3b:22:ea:7d:18:f9:c1: 2f:6e:8a:b7:e3:df:b4:78:fc:aa:dc:84:4a:15:71:84: 69:da:a2:99:11:4f:18:d8:a6:d4:5f:84:dc:08:c0:2b: e1:91:18:7c:2a:b2:d4:94:01:db:a2:44:66:35:4a:06: f9:3c:81:55:d9:81:e0:63:9e:95:df:6c:fd:2c:b0:68: 9a:83:2a:9c:77:41:42:6f:2e:01:9d:98:53:6f:ad:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 55:cf:34:d7:42:df:8e:a9:9a:71:16:db:29:6d:a6:ba: 34:d7:8a:56:25:29:c3:7f:fd:87:ef:25:69:20:ea:e5: bc:7e:7e:f9:da:34:cd:50:87:a1:3e:ea:72:d6:99:68: c7:d2:2d:2d:94:58:9b:b8:ef:a1:45:ba:1b:3f:d6:39: ba:a1:20:da:c0:0b:2f:13:bc:f2:66:38:c3:59:53:84: 62:20:8d:8a:20:d6:8b:8a:40:4f:5e:eb:03:fe:83:41: 1d:11:4d:a4:fd:49:9f:37:53:1e:9d:77:ea:13:9a:f2: 50:5c:84:28:ef:1e:ae:d8:90:dd:75:d2:c7:ea:70:14: 0e:20:50:f0:41:91:94:ee:e1:f8:72:c7:3e:b1:10:0c: 6f:45:67:7d:0b:fb:31:f4:9f:6a:f8:4d:b3:9e:6c:36: 0c:9e:16:17:70:d2:6c:de:3c:9b:cc:da:ed:8d:5e:f4: 22:f5:9b:45:7c:56:ed:a1:e7:e6:4e:3d:f4:e6:ed:22: 9b:7f:9b:3e:8b:dc:b8:78:2d:70:e8:cf:36:f2:8d:fe: 4e:d8:02:1a:0e:74:3e:d6:66:81:d0:ab:05:ed:74:a5: 3f:ac:da:2a:d1:bf:d4:28:9c:0c:34:17:d7:79:63:6c: 4a:39:e9:21:40:04:ec:8d:bc:d5:47:c8:dd:30:a7:5d Fingerprint (SHA-256): 55:A5:4A:CF:CB:7E:73:05:CA:00:EF:82:B4:6A:5E:C4:4B:26:93:6A:5D:29:E7:5E:19:9F:5C:85:B5:8B:07:01 Fingerprint (SHA1): 50:DB:CB:59:73:06:37:0E:FD:99:08:2B:DC:4B:7D:AA:97:D5:95:2C Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #13900: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181835 (0x672b94b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Fri Jan 08 23:24:19 2016 Not After : Fri Jan 08 23:24:19 2066 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:11:c8:28:35:93:f2:0a:19:c9:64:78:e6:d1:f9:05: ec:47:19:ea:9f:4f:fd:7f:a9:9d:22:a2:45:fe:95:1c: 83:70:2b:05:3e:df:bc:22:e3:5a:f4:8c:10:ab:89:f1: 31:34:3f:39:8f:ef:50:c2:2c:b5:a9:1f:58:5b:60:01: b0:12:75:53:8e:e3:fa:6f:b0:2d:fd:27:4e:95:7a:40: 85:bf:58:de:91:c6:d8:ec:30:06:3e:ee:99:f7:d8:0d: 6e:44:dc:22:c4:a6:60:ff:1a:80:b3:a5:87:76:40:fa: 10:83:f1:98:05:73:ea:6b:98:22:ba:02:9e:0a:e5:aa: 4e:3f:73:a2:3b:20:89:31:9a:2b:03:00:4b:01:23:0c: 5f:2b:f5:e3:03:20:9a:59:f8:a3:09:47:0c:33:b2:8e: 24:4a:76:86:50:a9:8a:16:52:ba:d3:b9:df:65:ec:45: b1:62:b8:8d:8a:ce:2e:f9:d8:49:df:82:26:44:6c:28: 49:2a:e3:cb:27:69:41:08:6e:bc:77:a5:b1:67:77:52: c7:3b:29:0e:35:ef:9b:85:3a:fb:73:df:aa:f1:1e:75: d5:d6:c9:c3:0a:ce:43:28:a8:3f:1d:2f:e4:e4:dc:6b: 12:49:72:e8:4c:68:3b:7b:f7:fc:49:0f:98:06:8c:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:fc:95:88:c0:3c:30:bb:92:df:8c:20:d8:7d:8e:02: 62:21:40:d0:d6:14:ed:60:98:38:db:93:d5:c5:64:34: 67:eb:4f:2a:79:ef:56:cf:3e:9b:1b:d5:b2:15:5d:6b: 66:c7:6f:98:34:fe:f4:24:71:98:72:9f:b9:f5:16:dd: 45:6a:b4:54:5a:4f:13:d6:ba:d9:1e:5b:f8:11:d5:7d: be:25:ec:fc:05:da:55:c2:19:b4:6e:a6:37:82:71:fb: 81:50:e3:38:8e:2a:d8:7b:39:47:32:09:88:b1:71:78: 6e:ff:0b:5d:92:93:e3:3c:a6:fb:2c:1a:b3:fe:f7:ca: 24:1f:c9:42:32:74:df:4c:f6:50:49:73:db:9b:95:6a: fd:d7:f3:84:c4:67:62:ec:d0:02:26:94:a6:35:86:76: fa:da:2f:68:a9:42:b9:b6:09:3b:cd:87:dd:e8:f2:92: a0:37:96:a3:f6:2d:f9:1e:0f:63:88:fc:ed:5f:a6:df: fc:0a:60:42:44:96:38:e1:6b:ee:94:58:80:bf:92:ce: af:0c:3a:ce:a4:80:11:08:8f:39:63:68:31:25:b2:a9: 54:fb:2b:61:5d:a0:57:f3:0c:4f:64:7d:6a:a8:79:8a: 93:28:69:ad:38:c4:ca:27:f3:40:ab:35:9e:61:94:a5 Fingerprint (SHA-256): 2E:D5:84:B4:02:3E:57:C8:47:80:1B:9F:67:56:54:1C:C2:01:B8:FD:B9:69:64:ED:6D:69:72:75:3C:88:32:98 Fingerprint (SHA1): 3A:E1:32:08:77:20:6D:65:86:B3:CE:03:9D:77:12:AB:4A:6E:0D:B0 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #13901: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181836 (0x672b94c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Fri Jan 08 23:24:26 2016 Not After : Fri Jan 08 23:24:26 2066 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:51:57:a1:dc:e6:27:c4:e9:f1:3b:b9:55:57:2d:96: 56:64:27:46:39:c1:e4:03:37:c0:4d:86:5f:04:4d:24: 0e:66:0d:64:0b:49:1d:e8:5e:e5:5a:af:fb:c4:0a:04: 5a:84:8b:d4:6e:ae:6a:35:d4:a6:2a:e4:13:77:67:58: e3:cd:38:19:c3:33:58:97:76:0a:91:ee:0a:38:a2:fc: 09:ab:1d:c2:3e:32:88:56:3a:eb:7b:1d:7d:2e:db:a3: b9:0e:91:eb:88:e9:68:c1:8a:28:41:14:bf:19:be:00: e7:be:38:2a:87:5c:07:59:f9:0b:2a:cd:5e:5e:2a:23: 54:59:a2:6d:ad:45:7f:b0:cd:46:76:83:39:34:08:53: 56:61:af:6c:15:7e:9a:08:0e:11:cc:80:e3:c9:13:4c: 46:3d:b6:ad:ac:a6:5d:16:7c:e2:5d:33:19:82:b9:5f: ca:33:ec:99:8b:c7:42:10:04:fb:bb:65:83:33:11:8d: 1c:de:b3:1c:e0:34:f4:c3:9d:2a:a1:eb:9e:c8:d6:90: dd:3f:da:ed:8f:84:28:b8:10:b8:2c:47:b1:8c:59:97: d7:01:91:71:ee:f7:31:f4:32:ce:6c:82:a7:d2:17:33: 98:f6:4a:26:41:1a:d4:8b:09:61:5c:78:c0:c2:34:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:1c:1f:62:a5:84:73:5d:47:fb:5b:41:33:a8:f6:7b: e7:71:36:ab:52:61:92:27:82:0f:4c:57:80:69:03:da: f9:a6:93:ac:87:09:a9:7f:3c:82:91:e3:2f:63:f4:5a: 5b:8a:ff:4e:cb:9d:55:33:ce:41:ac:61:1d:38:5f:3f: 13:f4:a1:dc:93:d9:71:88:40:35:55:3c:79:54:cb:72: 48:a7:5a:bb:bd:c8:07:32:00:b1:13:83:08:27:00:a5: 48:11:4b:9c:49:a9:21:a2:89:9a:2d:f3:23:bb:12:ba: 8e:c6:dd:88:49:c9:0a:c8:17:44:e7:85:e1:8a:1d:c2: 27:10:0c:32:e8:21:4f:c2:b9:2d:c7:07:45:95:15:21: 0e:00:7c:50:a1:53:37:41:a2:7b:e7:69:e2:d4:ad:f4: a9:ae:2b:db:41:f2:4f:ee:de:ee:0d:1f:f0:4b:35:7d: db:7e:5e:e2:0f:cf:96:b1:ed:3c:40:81:e7:7a:e7:e1: c9:1e:dd:f8:f2:82:a8:02:4c:b1:70:bb:6b:07:7a:6c: 83:14:66:31:d2:76:f6:d6:28:49:9d:9d:37:87:6a:d3: af:7f:43:6e:aa:5f:c2:12:a3:85:31:72:8a:b5:f8:15: 01:e0:ed:9d:bb:01:bb:79:f9:59:ef:ef:7d:df:ed:03 Fingerprint (SHA-256): 69:AC:30:47:D9:16:0C:F8:B7:1A:CA:5D:9D:49:C4:0B:C9:98:55:CA:07:87:3D:74:E1:22:EF:C3:C6:D4:EC:93 Fingerprint (SHA1): 70:CF:6B:B2:05:B2:88:33:DC:43:C7:52:FF:8C:3C:07:14:EE:E6:02 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #13902: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181837 (0x672b94d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Fri Jan 08 23:24:45 2016 Not After : Fri Jan 08 23:24:45 2066 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:42:b5:04:7a:0c:ed:af:0e:df:a7:ec:b6:cf:08:58: 78:c2:c1:21:73:b3:5c:1d:c8:b5:36:01:1b:8e:60:10: 49:90:11:bd:92:50:e7:08:e5:4d:88:8a:88:cc:61:9a: 95:aa:da:06:8c:e1:af:c5:c9:54:18:30:03:b0:cc:54: c2:71:b6:6a:21:ab:19:89:0d:4a:a8:0c:3c:8d:fa:6b: 7c:66:7d:73:98:d7:d0:39:ea:5a:20:e2:a9:8e:96:51: d7:94:75:00:fb:35:42:86:08:99:4c:31:3e:2e:58:ba: 6b:69:12:b1:1b:58:b5:85:e7:d7:13:53:4f:bb:d7:e4: 2a:4a:ad:61:d5:68:8b:a5:70:a1:69:a1:84:e2:6e:5b: 43:27:64:af:3a:22:22:02:6f:18:27:a6:b0:be:d6:36: 26:86:a3:b2:4f:5b:21:c2:78:b3:c7:a8:b3:26:8a:41: a0:4a:1a:75:3f:6b:64:c0:4a:b1:dd:03:8d:ec:0e:ee: 9a:f7:05:35:1f:8f:a0:1d:b3:b6:04:3d:71:02:7c:5f: d0:6d:72:f6:e0:3e:cf:ff:9f:1e:24:b5:c4:db:24:c6: 2f:3a:00:0b:72:58:05:bf:aa:ee:90:45:45:f7:1c:38: 79:04:7d:6f:b4:66:8b:7d:df:28:fc:56:c4:f2:7d:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:37:b9:5a:62:69:2b:1b:e0:4a:f1:2a:76:e7:f6: 4f:6f:93:16:fa:3b:21:1f:4d:43:8e:38:8c:1a:09:cc: dd:09:47:0d:94:24:f6:1c:5c:59:32:ca:21:6f:e4:a0: 6e:89:f6:7a:95:03:70:00:67:c0:45:ac:55:04:7d:ff: 2f:16:7b:82:2b:1e:48:ff:50:ad:97:31:e7:66:df:22: 9b:6a:d8:ca:8b:07:24:2f:62:04:45:fd:0b:e6:f7:23: a8:2c:5d:f5:e2:07:a3:27:60:b0:0d:ae:40:7d:0a:12: e8:99:8e:19:7a:99:64:17:d1:55:66:ab:bc:5e:b5:19: 3b:3c:03:f6:cb:cc:a4:e8:14:fa:8f:91:b4:52:57:5a: b1:d4:0c:65:be:e9:84:4c:12:73:4e:e3:b1:f9:6e:69: 61:64:33:61:fe:2a:b3:e6:ca:9e:d4:9d:19:1e:4c:64: 17:74:31:17:c1:ca:01:8e:98:7c:a6:64:99:8c:0e:3c: 72:ac:8c:4e:7b:1c:77:19:8e:04:58:a8:b1:f8:2b:17: 5b:51:da:c0:2c:b0:d1:55:79:94:4e:30:1e:df:d0:d7: e5:25:f7:01:89:5f:7a:d5:4e:c3:2e:08:fc:5b:b1:b5: 70:59:ad:42:a5:9a:c3:18:fb:7e:0f:e6:e5:16:1a:97 Fingerprint (SHA-256): 68:B7:CD:C8:8A:53:6D:C9:9D:3E:9D:E9:05:5B:51:77:1A:FD:0C:80:C4:EF:A1:F9:CF:5E:8A:40:44:87:B7:E3 Fingerprint (SHA1): 89:D9:DC:D4:7F:0D:AD:00:8E:BB:F6:2E:60:0F:3B:37:1A:3E:73:52 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #13903: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181838 (0x672b94e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Fri Jan 08 23:24:52 2016 Not After : Fri Jan 08 23:24:52 2066 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:af:15:7c:3b:01:fc:88:87:cb:66:82:3a:ec:03:03: 91:be:0e:3a:cb:16:b1:4b:e3:90:4c:90:72:d3:a3:13: b5:39:7f:5d:aa:f7:fe:1a:14:ad:4f:89:64:30:76:72: 04:f6:cf:2d:fb:c2:98:9d:c2:3f:51:9c:be:3d:2e:3a: 5d:c8:c5:08:14:6a:36:8a:98:79:ea:16:62:0d:65:69: 93:15:9c:e9:c0:65:bb:72:4e:13:20:29:8a:4a:21:00: 8e:83:97:d6:15:9b:7d:c9:b7:0d:f4:16:50:22:e2:12: a4:f9:18:a0:1f:f3:18:c2:3d:7b:d1:6f:fe:02:ec:64: 07:f1:c6:2d:9f:b7:63:de:da:15:18:c6:00:8a:77:7b: 40:bd:01:0f:69:9e:a3:97:b5:2f:63:6b:b1:83:20:be: 4a:23:0d:38:4d:87:c4:ba:3b:23:3a:37:37:a1:fa:a0: 78:11:dc:82:b1:e2:55:7d:d4:b0:57:09:47:b4:7a:44: be:1d:20:6f:e0:76:86:4a:f6:5e:46:2b:e7:4d:07:bd: d7:6b:1d:de:fd:1c:4b:15:3b:55:e5:55:58:5e:43:0f: a3:6f:be:7d:c5:d3:4d:12:f7:2a:d2:49:e3:69:11:fc: 4d:57:4a:2a:90:93:29:92:a0:c6:e3:db:ee:e5:9f:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 50:2a:91:ab:37:79:ff:39:f9:6e:84:22:b0:a5:f9:52: da:14:36:fd:81:e6:b7:89:c1:95:00:09:eb:89:2c:fa: 35:33:4a:35:10:d9:9b:a9:6b:c9:c5:d1:e4:2b:6c:b8: b0:38:88:63:15:fa:ea:c2:b3:cc:49:b1:6c:a1:80:35: 50:5d:b0:f6:36:8f:fc:32:40:f8:c4:7e:cb:eb:fc:3b: f6:cf:9b:21:de:2d:10:b7:c1:2e:e2:df:86:20:34:d3: b6:40:c4:42:6f:ce:d8:2c:ac:91:fa:81:e2:de:94:d3: 60:1c:99:b5:a9:ab:a1:c6:fa:99:d9:f0:e5:8d:2c:54: 05:ef:56:b0:8e:9a:80:98:ef:98:6e:9f:71:28:28:a5: 32:92:88:89:91:b3:36:24:1b:b8:da:53:d5:25:86:20: fb:ff:a3:6a:7b:6b:f4:47:94:92:ed:bf:81:8c:4e:7f: b9:cf:ac:2d:12:40:04:3c:b1:6a:ed:b8:aa:22:8d:df: 92:25:3a:3c:f8:2c:85:93:36:99:b6:22:a8:2d:4c:2e: d2:b3:81:13:fa:f1:46:44:0d:ab:9b:79:bc:fb:00:f0: b4:e1:6d:d9:9d:2c:b4:7a:8c:cf:06:be:94:d5:0c:4f: 58:c8:36:ef:1e:0a:10:1b:55:15:a2:56:56:8b:8c:c0 Fingerprint (SHA-256): 3D:DF:A2:7F:A9:53:29:08:AA:EF:78:C9:E6:F2:DA:75:F9:17:84:2C:BD:43:5F:A8:B4:14:A1:05:43:8E:95:3C Fingerprint (SHA1): 0C:CA:17:55:99:3A:0D:02:94:BA:3B:F7:A0:F3:F0:AF:B4:F5:EE:A5 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #13904: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181839 (0x672b94f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Fri Jan 08 23:25:04 2016 Not After : Fri Jan 08 23:25:04 2066 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:9b:35:dc:4e:1e:18:cb:53:96:eb:8f:20:ab:3c:4e: 81:50:35:9c:f0:32:b1:46:c1:8f:66:c6:ff:be:8d:e2: 55:e2:2f:cc:7e:99:27:f9:a4:1a:78:91:77:9e:5e:3e: 70:ce:7d:b3:11:a4:75:56:d2:0b:f2:35:ab:d0:7e:ed: d3:62:ba:96:f5:86:0c:23:0d:ae:1b:1b:64:86:f0:26: c8:81:bb:1d:e5:86:0c:e4:5d:09:dd:88:09:fd:41:2b: a8:22:8a:76:67:6f:11:3c:a8:e8:53:62:d4:8c:b1:47: 14:82:b3:26:ab:8d:c4:6f:94:4b:a7:41:9d:0a:84:71: 33:65:fb:f2:75:98:d7:d8:34:c3:a8:a4:ce:48:6b:a9: 25:7b:b7:81:94:e8:53:8c:c4:ee:29:a1:96:af:71:ff: 37:82:bb:11:31:29:79:8a:67:2d:99:33:b9:4b:d3:77: a0:55:9e:8c:e1:d9:a5:c6:d6:29:48:3e:ec:40:78:1b: ad:80:d2:cb:41:e8:37:a9:14:e1:f2:77:62:9b:0c:81: 74:b5:08:9b:d7:68:54:0c:33:af:cb:1c:2a:08:fb:85: cc:6f:1f:d9:d4:b5:5a:cc:0d:6c:07:a1:39:4e:88:6c: 92:4f:fd:a7:de:fd:7b:17:5a:7f:ca:f8:9a:2a:ee:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e7:70:9c:4c:5b:4e:df:43:b2:bf:16:be:04:f8:23: 7f:6c:a2:31:cd:24:bc:84:73:13:fa:30:23:dd:4a:97: 93:68:fb:69:bf:d6:24:0a:7a:6b:00:68:a9:06:47:ae: 01:c6:39:37:79:d5:81:f6:42:bb:2f:94:53:a4:27:c6: 41:fc:65:ea:12:ca:be:4f:bb:7d:73:e0:19:2d:e7:38: d9:9b:62:8d:be:18:d6:33:41:21:ac:22:c1:ae:b2:d8: c1:e6:e1:9e:18:05:88:fd:20:ca:66:89:7e:04:51:ad: 9c:a3:ab:a0:ff:e2:b7:f3:a3:6e:d3:80:a5:ad:47:0b: b3:bd:48:5a:a6:d0:01:54:d3:6d:3b:b3:71:37:81:a2: 4b:cc:12:da:f8:94:97:98:ad:5c:cb:2d:da:49:5f:78: f2:60:6e:0f:5f:a5:d2:2a:55:99:62:f5:f4:91:7c:bb: 5a:b3:1b:a7:b5:5c:db:e2:65:1d:2a:a8:4f:50:74:0c: 43:49:ba:ef:47:e3:4a:61:c7:0c:04:db:6f:44:08:b5: 29:aa:31:c5:25:60:a5:82:36:ee:ba:63:20:f6:99:de: 73:9a:91:2e:77:22:94:3e:dd:c8:a9:82:24:5a:0b:ac: 77:20:39:db:0f:7a:ea:33:c6:54:eb:0b:be:8d:f3:b9 Fingerprint (SHA-256): 0B:63:29:DD:25:6C:BD:0E:DC:1F:23:38:6F:94:F2:12:64:99:54:3D:EA:A1:90:3B:79:A0:3B:98:AE:47:6B:3D Fingerprint (SHA1): E3:1B:10:19:5C:4C:26:FB:24:91:83:98:F4:26:FD:58:0A:37:1F:00 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #13905: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181840 (0x672b950) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Fri Jan 08 23:25:15 2016 Not After : Fri Jan 08 23:25:15 2066 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:34:01:84:10:f2:07:d9:9a:89:c4:a1:24:4b:bf:ce: cd:b5:6f:21:ef:3c:04:d9:af:3a:0d:41:28:f0:76:73: 17:b6:40:d6:87:78:8d:bd:52:31:3c:99:47:a7:ea:5d: f2:f3:a0:7f:5f:f9:30:c9:ff:f0:81:0e:22:44:a8:c2: 94:e8:dc:94:c5:a6:2c:5d:af:0d:d6:bb:43:d1:83:7d: af:e2:61:ae:d2:83:34:73:67:1f:75:d0:c2:b5:99:6a: 49:a4:e3:0a:da:a0:1b:a9:69:89:93:f5:f6:d1:e0:c8: 77:0b:17:78:9a:8d:94:e8:ab:5c:8a:a1:72:40:d0:df: ab:e3:b0:36:4d:7b:86:7d:33:ae:08:91:ac:1d:3a:16: 8a:78:6f:4c:f1:6a:aa:06:67:80:c1:b9:05:de:4c:b5: 63:c0:0c:d0:05:f2:f0:39:91:a5:3d:2a:0c:d3:c5:a3: ab:9d:da:2c:06:12:c2:12:3a:54:a2:2e:0d:af:ed:23: 3a:e8:d1:31:56:80:5c:3c:d3:9d:13:ff:0e:67:59:61: 9f:d2:c2:4b:91:5e:07:23:64:59:cd:91:d0:57:ea:79: 7a:2a:37:03:fa:ab:92:33:c3:4a:87:e7:b5:8b:bf:b1: 51:0b:e6:cc:e7:51:47:06:3a:5b:93:b4:80:31:7c:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:f4:58:ba:f4:0c:e7:1e:bd:7e:54:6b:de:04:4b:9b: 7d:29:91:03:16:e5:18:09:8a:05:21:bc:c0:31:56:2a: dc:82:c0:32:6c:80:24:b1:e1:cf:73:6f:c9:09:c1:7f: f7:23:b0:be:50:55:e7:41:36:a5:c5:6b:93:3b:be:1b: 8b:7f:4d:34:26:99:c5:df:90:b7:08:7b:f7:6d:1a:a5: 63:0b:44:a1:47:72:7a:b0:f6:c1:ff:74:19:d4:6a:5c: 4b:da:c3:8e:1d:e0:86:df:18:64:d1:05:9e:8e:f1:c2: f8:b4:61:48:83:5b:15:28:b5:fd:69:96:86:23:bf:68: 86:9a:5d:66:51:5b:2b:a4:49:a7:a8:54:79:db:d3:c8: fa:bf:f6:7e:d9:61:8e:7c:62:e7:4d:41:9c:18:b3:9e: 61:f0:0c:63:da:ae:18:54:f9:71:77:c9:7b:a3:fd:48: 6c:b6:c4:58:7b:92:6d:52:9b:ab:06:3e:14:79:67:a8: 69:66:a2:ba:7b:b0:e7:b2:03:38:ed:a8:8b:cd:00:36: 0d:b6:db:19:a8:22:28:80:e1:15:d8:08:9d:a2:be:89: 18:33:bc:4f:46:20:07:b2:b4:35:7b:b7:46:9a:b0:ad: f8:44:13:29:19:1f:00:70:17:a3:1e:24:6b:84:e9:1c Fingerprint (SHA-256): D3:B9:6E:77:26:31:D9:E8:67:F5:C9:A9:89:28:30:78:C1:E7:5F:E8:0F:7E:93:58:1F:16:FB:44:4F:5B:9D:04 Fingerprint (SHA1): C8:AE:5B:65:60:32:54:26:F1:2B:DE:19:D5:B2:00:EB:16:64:F9:3D Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #13906: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181841 (0x672b951) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Fri Jan 08 23:25:19 2016 Not After : Fri Jan 08 23:25:19 2066 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:89:7e:3f:62:08:69:00:50:bc:3a:7e:82:37:78:46: a1:ab:f9:f5:f5:7c:ba:28:0f:ba:3e:67:12:02:6b:2f: 7d:ec:53:4e:b4:56:d8:01:3f:69:24:bb:17:57:25:11: eb:2e:35:c0:bf:17:d7:d2:92:53:cc:9f:d0:69:21:02: 80:f9:a2:37:bb:b2:5d:18:00:fc:e8:95:c6:f2:13:8d: f8:a2:27:89:de:0b:1e:63:e2:a3:1f:b2:82:21:8e:7f: ef:d5:0c:f6:15:8d:50:ad:7a:02:41:a4:34:60:a6:23: 22:ac:b0:f0:3e:08:89:c8:17:62:cd:0d:59:b5:39:cb: be:89:da:8b:c1:54:0f:76:7f:19:a9:17:64:2c:00:92: 45:2f:08:bb:c4:bd:96:e2:04:7e:f6:a4:a0:cd:d4:39: c7:be:54:26:85:a4:69:fa:41:0d:ff:cf:a7:b3:48:83: 78:f3:f1:c2:bc:a4:f7:32:4c:3d:62:32:fd:cc:af:e5: 26:7f:9b:6d:06:a9:4d:06:1c:29:1a:22:8b:39:0f:9f: c1:c9:a7:e7:a6:21:28:bd:bc:f2:6a:82:e4:02:f8:3a: d6:36:4a:d0:83:44:30:5b:8c:e0:0c:79:d4:f4:dc:0a: f8:f5:41:da:98:e0:d6:f5:fa:c7:5f:3f:77:e8:92:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5a:27:41:de:09:0d:fa:9e:e8:dd:14:83:b9:b0:17:b5: c7:c7:cc:78:50:dd:d8:1f:2a:5f:2c:ed:75:ae:3c:fd: 7c:f5:9c:70:74:c7:3b:5d:3d:9a:61:04:73:ec:26:52: 58:cd:70:a3:35:78:d0:92:86:9a:5d:2f:e4:ac:ef:b9: 6f:33:f2:35:c2:ae:18:7a:41:b0:f6:3d:b7:33:32:99: 60:b6:39:62:7d:8f:80:cd:b2:04:df:4b:b3:38:10:3d: 55:73:b5:ff:31:6e:43:1f:dc:a1:1f:5b:97:a9:fc:c3: d1:13:06:b6:b6:95:3c:cd:07:15:b4:12:aa:08:9f:c0: 85:e7:45:7c:f3:7d:34:3f:bf:da:5b:a8:03:fc:ff:c6: 47:54:f4:db:39:2f:c5:cf:f5:0c:de:1f:45:a2:53:9a: 32:87:5b:cc:9f:c0:6a:d8:25:74:6b:48:77:32:58:64: e7:fb:a4:7d:d4:a8:b4:cb:48:bc:a1:69:e8:bf:fa:77: 5b:87:f0:ea:64:99:cb:69:a0:83:78:4d:3d:c0:62:1c: 84:13:f8:f2:a7:8b:d9:08:5b:14:32:65:89:7d:ab:3c: 7b:9e:54:a2:4d:76:54:06:a4:45:7b:71:bc:d8:ff:5f: b9:b1:9a:a6:90:1e:d9:f4:fc:08:d1:26:cb:3b:16:37 Fingerprint (SHA-256): B5:9E:A8:11:C0:1F:41:E9:6A:8C:4B:E2:08:D0:19:9E:44:3B:D3:86:C9:CD:A9:3C:FF:AF:8F:11:7A:D8:7A:7D Fingerprint (SHA1): 0C:68:A1:6D:91:BB:93:42:3C:67:3D:A9:D0:E4:BE:FE:8A:FE:F0:01 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #13907: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181842 (0x672b952) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Fri Jan 08 23:25:28 2016 Not After : Fri Jan 08 23:25:28 2066 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:be:e1:a4:45:58:cc:b5:9e:7d:70:28:23:f4:00:fc: 51:ae:5c:d3:8f:66:4d:d7:36:ed:02:e6:d0:2f:f7:1f: 54:ab:63:0f:63:48:cb:ce:2f:d6:bb:15:3c:02:97:30: fd:f2:2e:82:34:33:4a:33:5e:8f:05:a9:c2:10:ad:fb: fb:a1:d5:47:42:19:70:7a:da:65:90:45:8d:17:1b:b1: 3e:39:b8:ec:c6:2b:ce:b1:08:61:58:19:80:58:86:19: 8e:6d:ff:c6:2f:cf:9f:cc:82:9e:65:68:99:ca:9a:8e: 96:68:b2:b0:83:df:a3:51:aa:e2:c4:46:99:2d:3d:26: ad:cc:27:71:f4:3a:30:fb:92:a7:f4:6f:02:d2:26:eb: 5d:00:62:a2:00:0d:f4:97:bb:57:13:8a:26:91:99:ed: 2e:fa:bb:9e:59:2d:43:f5:e4:90:90:db:3f:ad:b6:27: 77:b3:cb:bf:e8:03:41:0b:e3:76:13:4a:26:fa:6d:e9: ca:3c:80:7a:c9:d5:4b:46:5f:a0:30:9c:3a:30:a6:2e: e0:ea:49:a2:1d:ed:72:ef:7f:33:e5:cf:fb:17:19:8d: a6:91:ee:b9:5c:56:50:6e:b6:87:39:04:94:51:1d:1d: 26:b2:cb:d2:18:d4:b6:1c:92:07:2d:6e:fd:35:43:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:76:ea:d8:dc:d9:69:33:0c:0d:8d:c1:e4:aa:43:59: 3e:51:d2:dc:0c:5d:d3:e0:ee:6e:1e:b7:c3:3e:6e:6a: de:76:b7:11:0b:a0:42:e0:ab:ae:a3:23:10:c7:2a:a5: b0:f2:e3:a0:cb:d1:3c:2b:37:3a:a3:2e:99:49:87:72: b9:55:93:82:26:dd:2e:63:ea:b2:26:1e:59:86:dd:aa: 1c:5c:76:25:4f:07:fb:83:72:fc:41:3d:17:b9:20:0b: 8c:ca:bb:0d:b8:dc:28:98:ed:57:0b:97:47:08:f5:c5: f9:ef:bb:b1:2f:76:5b:79:21:25:e2:3f:c9:ed:2d:81: a5:a6:3c:68:3e:5f:61:05:73:46:e6:f2:cf:6a:4b:94: e6:b0:21:81:47:9a:d6:23:1e:3b:e8:ee:b4:be:13:0d: 4f:09:7a:27:d0:55:9c:2c:b6:a5:45:7e:92:23:42:a7: 22:46:e0:e1:5b:f5:a2:41:21:2e:e2:4a:eb:92:28:0f: 7b:ec:bb:50:19:86:a9:ad:4f:93:c4:9a:bb:27:87:78: 42:29:d1:07:d3:67:f7:9a:a2:8c:f7:f9:7d:d5:b3:b5: a9:cb:d0:88:9c:1b:36:01:ed:67:d2:99:b1:d9:a8:bc: 07:dc:93:78:dc:9c:14:36:73:a3:7e:75:e3:f7:cc:37 Fingerprint (SHA-256): A5:78:33:C3:0C:92:C3:C9:70:37:4B:90:DC:BC:32:3C:2A:43:A1:94:2D:5A:F0:00:88:0D:30:7A:28:D9:A3:1A Fingerprint (SHA1): 1D:BF:BB:4C:7F:20:94:DE:4F:C2:F2:2D:F9:4D:FA:20:F3:E8:3B:26 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #13908: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #13909: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181857 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13910: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #13911: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #13912: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13913: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108181858 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13914: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13915: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #13916: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13917: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108181859 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13918: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13919: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #13920: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13921: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108181860 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13922: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13923: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #13924: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181857 (0x672b961) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:27:50 2016 Not After : Fri Jan 08 23:27:50 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:98:06:2f:97:a1:22:df:97:0f:ce:3a:14:76:31:c6: da:d4:a3:7c:70:ba:74:56:2b:ff:62:6f:82:10:3f:31: fd:28:95:b1:9d:02:f8:c5:fe:a5:89:43:3c:30:56:7a: 6f:25:09:58:f9:72:ff:bd:67:ad:d0:11:29:bc:b0:9c: e6:49:aa:77:76:85:b8:96:b9:11:6f:4b:52:b7:7c:9d: 1c:35:f0:f7:1c:2c:65:c9:7a:70:28:25:48:90:29:25: 66:0f:81:59:8a:e8:23:db:75:e1:81:b7:3f:f2:d7:94: 38:75:fe:0b:32:68:3c:3a:1f:c3:aa:4f:c7:e9:7d:48: 3a:4f:17:8b:5d:20:66:72:b3:78:5c:70:dc:8d:0d:a4: 9c:61:9b:18:85:7d:c2:ce:10:f5:b6:4f:e5:75:e0:82: ce:0e:fd:ab:9e:7d:5c:67:10:ec:62:06:fa:24:a8:68: 7f:4b:55:f1:58:a5:c4:7b:d6:a5:3e:44:9e:58:1f:e5: 65:a2:81:41:57:f4:91:8d:23:22:6f:ee:a5:9a:e4:f3: 46:28:4b:95:28:9c:51:71:e1:e8:34:62:99:31:83:3c: 37:b0:bb:a2:1c:fc:cc:ec:00:0c:43:8e:ca:08:44:b9: 3b:e5:90:f0:f1:09:27:b7:f0:37:c7:73:17:db:eb:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:82:33:c9:bd:00:dc:68:de:fb:55:c7:6e:0a:8e:ac: 3e:d5:4b:05:db:8c:ec:e0:6e:48:fb:08:80:1e:35:32: 99:99:fd:21:3c:77:53:2c:ea:93:75:6c:3a:8f:2c:fa: d6:45:e5:c4:ca:0f:24:f5:20:84:ee:b1:3b:21:1c:6d: a6:04:d2:86:35:14:e1:cf:cd:ec:02:32:b3:0b:83:da: 12:3e:e0:bd:4f:9e:39:45:08:bd:09:f1:16:16:60:db: 81:03:ba:48:ef:0d:49:b5:42:4e:cb:fe:c4:99:ce:de: db:6f:e8:76:b2:39:b0:a4:7d:bc:65:11:2d:c2:07:ea: 36:1e:f4:74:d6:18:8d:da:01:2b:42:3f:2f:39:f1:21: 40:64:d3:52:73:96:c7:dd:7a:72:bc:53:29:77:5b:ab: dd:79:84:94:93:15:da:aa:37:7d:7b:e2:19:e3:c1:06: 96:75:11:e3:97:6a:3a:0a:fc:63:a0:fa:5e:0a:89:d8: 7b:d6:fa:ee:f8:8f:35:54:b3:0f:95:8e:5b:8d:42:95: 25:34:3f:7e:b5:35:f1:b7:43:50:96:70:f1:df:44:c7: 6d:75:01:35:d2:5a:45:1e:9d:d3:1e:3c:3b:7a:d5:8c: 03:32:d8:7b:f4:e1:96:4f:04:3c:e9:34:74:40:4c:d7 Fingerprint (SHA-256): 60:D7:AA:14:A1:51:C1:EC:3B:FA:2B:63:7C:6F:A0:2F:A0:1C:2C:CF:E4:A9:B9:A7:6A:74:B0:07:E9:4F:3A:EF Fingerprint (SHA1): D2:13:4F:CC:CB:1B:DB:5F:97:91:51:E8:96:E6:16:6C:03:A6:53:58 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #13925: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13926: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181858 (0x672b962) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:28:08 2016 Not After : Fri Jan 08 23:28:08 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:56:3d:0b:96:57:c5:d8:66:dc:73:9d:f1:f7:e8:7e: 81:b3:ea:f9:b8:e1:63:06:e0:d3:00:f7:46:59:ef:9a: b1:73:64:1f:04:19:9b:77:00:bb:e5:b1:75:b2:79:79: ba:de:44:db:ca:99:ab:a0:5a:d4:e2:81:04:86:a2:8c: 79:3f:7f:bf:4d:2d:36:70:9f:c1:46:b1:a4:65:ca:56: 49:b6:18:8c:c5:e8:90:62:6b:cd:80:83:3e:75:9c:67: 32:39:e7:75:84:c2:79:20:fe:b9:60:d5:c4:d4:5f:bf: e6:c8:82:ca:3e:d1:7e:db:b7:fe:13:c6:48:b6:f5:a8: 03:f6:53:f3:ec:f5:55:1c:2b:08:39:d2:c7:cc:ae:55: ff:92:15:ec:71:f5:08:68:1f:22:06:97:f9:4c:e4:2e: 86:7f:11:24:05:3c:39:57:75:d3:cc:55:78:90:f9:ec: 95:a7:00:26:55:a4:82:9c:53:6b:c5:6c:47:24:87:a7: ae:aa:b7:86:b2:9f:b9:bd:7a:b3:76:d6:76:79:b7:bc: 46:11:a0:53:44:63:06:79:33:1c:2a:05:03:ad:dc:cf: 7a:30:f1:99:2f:30:3d:ba:64:cc:44:3a:67:7d:e4:52: 88:d8:3b:8d:74:63:46:a7:54:4c:48:8b:bb:e7:b3:d1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: aa:5c:3b:8d:4d:27:43:4f:4c:26:33:e8:f9:f6:4e:b8: ee:53:b2:8c:ad:c4:6e:bd:d4:4b:b0:b5:e4:6d:6d:3f: 88:db:85:f3:22:e2:83:33:47:82:5f:87:f6:ca:ab:b8: d8:47:95:c2:22:f6:10:4d:12:57:1f:06:5a:45:8c:50: 8e:10:a8:74:26:53:fe:b5:e2:c9:ad:49:f5:b0:7f:63: 71:ab:9b:b9:a0:4c:c1:c1:c9:f8:09:b5:a4:66:6d:3b: 05:ad:4b:e8:13:64:f4:9a:2e:e5:16:06:12:36:68:29: 02:e1:e0:08:3a:d7:ae:68:60:44:30:dc:d7:c9:23:4a: e6:8f:a3:c3:97:12:05:14:7f:02:01:b6:07:6e:52:5a: cb:fb:be:23:d0:8b:3d:d3:2c:5f:d3:e6:bd:7d:eb:23: bc:65:85:f4:d6:8d:5c:c9:ec:aa:29:90:c1:dc:c4:b9: 3b:db:11:38:5a:fa:a2:50:a5:56:ed:c5:5f:58:99:20: fb:d5:83:c2:05:9d:25:e5:97:05:2d:7d:59:2d:c7:06: 85:b1:f1:be:28:68:e1:fd:c7:17:7b:df:0e:59:91:9f: 71:81:87:d4:67:c9:31:96:74:07:d6:e2:3e:d4:64:fe: 87:1c:bd:a6:a5:7d:13:48:1c:f2:06:83:db:48:85:cb Fingerprint (SHA-256): 3A:BF:A3:F6:F3:09:AC:FE:28:3E:A2:0C:C3:47:E6:B7:41:20:5F:F3:92:B1:4E:FC:0E:14:C5:C4:B9:D2:CE:A6 Fingerprint (SHA1): 26:2B:89:0C:B2:A6:98:A1:C2:FB:20:A3:B4:5C:03:B9:97:01:66:B9 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #13927: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13928: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181859 (0x672b963) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 23:28:18 2016 Not After : Fri Jan 08 23:28:18 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:66:e6:37:ba:67:96:c7:e1:a4:9d:a6:68:7a:e6:6a: 10:0d:20:be:f7:79:04:77:c5:0c:83:61:dd:55:7e:fc: ab:d9:77:fa:4b:c6:63:ec:88:8b:a9:41:45:ad:18:15: bf:78:59:5d:58:a3:e5:15:e5:18:c7:d0:04:43:b8:4a: 01:60:79:f5:0f:57:b2:c4:f4:98:92:7f:0b:7f:a6:9d: f9:84:2f:03:87:3d:f6:55:16:b1:cc:e0:d3:ab:20:99: 0c:9f:ca:ea:9e:a0:76:c0:76:1f:dc:cd:5c:58:b2:21: e1:f7:82:97:00:aa:5d:f5:18:5c:fa:64:e6:29:c5:a0: 32:8c:4a:c6:32:22:1a:ec:ea:70:4e:f0:84:be:63:c6: af:3d:0c:58:57:0d:c9:60:18:60:16:42:2d:3b:ea:22: 66:b8:dc:95:a5:60:22:ad:ca:97:e0:25:3b:19:b5:56: 82:76:bb:bd:4a:ad:1e:12:60:cd:00:97:48:78:69:d4: 82:4d:1e:e6:92:7d:0c:67:46:98:1e:ac:75:eb:d0:52: e3:8e:69:b5:ea:39:3c:cb:a3:61:70:a0:1a:0e:e0:9c: 0d:1e:d0:80:3f:1a:90:45:82:3b:ea:be:11:e6:3a:b7: 67:ba:f6:23:a8:38:38:60:7f:ff:c0:6d:12:14:a6:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ed:f5:bf:69:95:9b:da:4a:55:5e:51:56:cd:13:c8:9c: 57:71:88:ca:d3:a2:bd:ee:e3:3a:f8:8a:05:1e:45:41: 68:0f:ba:d1:e8:42:4a:62:ba:36:2b:79:e8:0a:2f:28: b4:bb:7f:0a:20:de:84:b8:92:54:16:58:9b:3a:f0:73: 79:2e:10:bb:1f:c7:ca:1f:12:7c:fa:79:43:03:dc:6c: ae:66:e1:79:62:c5:91:3a:35:7c:32:ed:eb:8d:e9:f4: 81:9e:3b:63:94:23:45:18:9f:7a:3a:1f:9f:7f:33:a0: 6e:5c:59:4f:bf:31:bc:5c:c9:ab:72:bc:4c:10:95:9f: 40:6a:98:20:1b:59:e0:68:40:a4:35:44:95:7c:a2:2e: 3f:56:36:af:29:aa:1b:50:72:4b:b7:61:96:33:e4:af: 4b:c7:09:9b:34:2b:af:07:46:a8:b2:3a:36:43:91:82: 3f:5f:ef:b3:1a:5d:48:a1:a1:98:58:5c:78:2e:3b:24: 22:22:c5:d3:5c:04:e4:28:fa:fc:51:10:92:c0:8b:f5: c7:90:9c:10:83:ba:4f:50:26:0f:d7:3d:c8:0b:5b:5c: 4c:ce:3d:7f:89:6e:75:9e:c3:0e:3c:8a:62:26:d3:eb: d7:c9:69:5f:61:86:33:79:5d:4a:55:6f:64:63:29:5b Fingerprint (SHA-256): 11:DE:B6:3C:CA:B6:CD:0F:58:DC:9D:DB:47:30:D1:A4:9F:4C:0F:B8:5C:53:BE:39:7A:E1:EB:30:A6:CA:21:6F Fingerprint (SHA1): 21:3D:25:26:60:37:41:D1:E5:8E:1F:20:0C:7A:0E:BA:BB:85:90:A8 Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #13929: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13930: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #13931: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #13932: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #13933: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181857 (0x672b961) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:27:50 2016 Not After : Fri Jan 08 23:27:50 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:98:06:2f:97:a1:22:df:97:0f:ce:3a:14:76:31:c6: da:d4:a3:7c:70:ba:74:56:2b:ff:62:6f:82:10:3f:31: fd:28:95:b1:9d:02:f8:c5:fe:a5:89:43:3c:30:56:7a: 6f:25:09:58:f9:72:ff:bd:67:ad:d0:11:29:bc:b0:9c: e6:49:aa:77:76:85:b8:96:b9:11:6f:4b:52:b7:7c:9d: 1c:35:f0:f7:1c:2c:65:c9:7a:70:28:25:48:90:29:25: 66:0f:81:59:8a:e8:23:db:75:e1:81:b7:3f:f2:d7:94: 38:75:fe:0b:32:68:3c:3a:1f:c3:aa:4f:c7:e9:7d:48: 3a:4f:17:8b:5d:20:66:72:b3:78:5c:70:dc:8d:0d:a4: 9c:61:9b:18:85:7d:c2:ce:10:f5:b6:4f:e5:75:e0:82: ce:0e:fd:ab:9e:7d:5c:67:10:ec:62:06:fa:24:a8:68: 7f:4b:55:f1:58:a5:c4:7b:d6:a5:3e:44:9e:58:1f:e5: 65:a2:81:41:57:f4:91:8d:23:22:6f:ee:a5:9a:e4:f3: 46:28:4b:95:28:9c:51:71:e1:e8:34:62:99:31:83:3c: 37:b0:bb:a2:1c:fc:cc:ec:00:0c:43:8e:ca:08:44:b9: 3b:e5:90:f0:f1:09:27:b7:f0:37:c7:73:17:db:eb:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:82:33:c9:bd:00:dc:68:de:fb:55:c7:6e:0a:8e:ac: 3e:d5:4b:05:db:8c:ec:e0:6e:48:fb:08:80:1e:35:32: 99:99:fd:21:3c:77:53:2c:ea:93:75:6c:3a:8f:2c:fa: d6:45:e5:c4:ca:0f:24:f5:20:84:ee:b1:3b:21:1c:6d: a6:04:d2:86:35:14:e1:cf:cd:ec:02:32:b3:0b:83:da: 12:3e:e0:bd:4f:9e:39:45:08:bd:09:f1:16:16:60:db: 81:03:ba:48:ef:0d:49:b5:42:4e:cb:fe:c4:99:ce:de: db:6f:e8:76:b2:39:b0:a4:7d:bc:65:11:2d:c2:07:ea: 36:1e:f4:74:d6:18:8d:da:01:2b:42:3f:2f:39:f1:21: 40:64:d3:52:73:96:c7:dd:7a:72:bc:53:29:77:5b:ab: dd:79:84:94:93:15:da:aa:37:7d:7b:e2:19:e3:c1:06: 96:75:11:e3:97:6a:3a:0a:fc:63:a0:fa:5e:0a:89:d8: 7b:d6:fa:ee:f8:8f:35:54:b3:0f:95:8e:5b:8d:42:95: 25:34:3f:7e:b5:35:f1:b7:43:50:96:70:f1:df:44:c7: 6d:75:01:35:d2:5a:45:1e:9d:d3:1e:3c:3b:7a:d5:8c: 03:32:d8:7b:f4:e1:96:4f:04:3c:e9:34:74:40:4c:d7 Fingerprint (SHA-256): 60:D7:AA:14:A1:51:C1:EC:3B:FA:2B:63:7C:6F:A0:2F:A0:1C:2C:CF:E4:A9:B9:A7:6A:74:B0:07:E9:4F:3A:EF Fingerprint (SHA1): D2:13:4F:CC:CB:1B:DB:5F:97:91:51:E8:96:E6:16:6C:03:A6:53:58 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #13934: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13935: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181858 (0x672b962) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:28:08 2016 Not After : Fri Jan 08 23:28:08 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:56:3d:0b:96:57:c5:d8:66:dc:73:9d:f1:f7:e8:7e: 81:b3:ea:f9:b8:e1:63:06:e0:d3:00:f7:46:59:ef:9a: b1:73:64:1f:04:19:9b:77:00:bb:e5:b1:75:b2:79:79: ba:de:44:db:ca:99:ab:a0:5a:d4:e2:81:04:86:a2:8c: 79:3f:7f:bf:4d:2d:36:70:9f:c1:46:b1:a4:65:ca:56: 49:b6:18:8c:c5:e8:90:62:6b:cd:80:83:3e:75:9c:67: 32:39:e7:75:84:c2:79:20:fe:b9:60:d5:c4:d4:5f:bf: e6:c8:82:ca:3e:d1:7e:db:b7:fe:13:c6:48:b6:f5:a8: 03:f6:53:f3:ec:f5:55:1c:2b:08:39:d2:c7:cc:ae:55: ff:92:15:ec:71:f5:08:68:1f:22:06:97:f9:4c:e4:2e: 86:7f:11:24:05:3c:39:57:75:d3:cc:55:78:90:f9:ec: 95:a7:00:26:55:a4:82:9c:53:6b:c5:6c:47:24:87:a7: ae:aa:b7:86:b2:9f:b9:bd:7a:b3:76:d6:76:79:b7:bc: 46:11:a0:53:44:63:06:79:33:1c:2a:05:03:ad:dc:cf: 7a:30:f1:99:2f:30:3d:ba:64:cc:44:3a:67:7d:e4:52: 88:d8:3b:8d:74:63:46:a7:54:4c:48:8b:bb:e7:b3:d1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: aa:5c:3b:8d:4d:27:43:4f:4c:26:33:e8:f9:f6:4e:b8: ee:53:b2:8c:ad:c4:6e:bd:d4:4b:b0:b5:e4:6d:6d:3f: 88:db:85:f3:22:e2:83:33:47:82:5f:87:f6:ca:ab:b8: d8:47:95:c2:22:f6:10:4d:12:57:1f:06:5a:45:8c:50: 8e:10:a8:74:26:53:fe:b5:e2:c9:ad:49:f5:b0:7f:63: 71:ab:9b:b9:a0:4c:c1:c1:c9:f8:09:b5:a4:66:6d:3b: 05:ad:4b:e8:13:64:f4:9a:2e:e5:16:06:12:36:68:29: 02:e1:e0:08:3a:d7:ae:68:60:44:30:dc:d7:c9:23:4a: e6:8f:a3:c3:97:12:05:14:7f:02:01:b6:07:6e:52:5a: cb:fb:be:23:d0:8b:3d:d3:2c:5f:d3:e6:bd:7d:eb:23: bc:65:85:f4:d6:8d:5c:c9:ec:aa:29:90:c1:dc:c4:b9: 3b:db:11:38:5a:fa:a2:50:a5:56:ed:c5:5f:58:99:20: fb:d5:83:c2:05:9d:25:e5:97:05:2d:7d:59:2d:c7:06: 85:b1:f1:be:28:68:e1:fd:c7:17:7b:df:0e:59:91:9f: 71:81:87:d4:67:c9:31:96:74:07:d6:e2:3e:d4:64:fe: 87:1c:bd:a6:a5:7d:13:48:1c:f2:06:83:db:48:85:cb Fingerprint (SHA-256): 3A:BF:A3:F6:F3:09:AC:FE:28:3E:A2:0C:C3:47:E6:B7:41:20:5F:F3:92:B1:4E:FC:0E:14:C5:C4:B9:D2:CE:A6 Fingerprint (SHA1): 26:2B:89:0C:B2:A6:98:A1:C2:FB:20:A3:B4:5C:03:B9:97:01:66:B9 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #13936: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13937: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181859 (0x672b963) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 23:28:18 2016 Not After : Fri Jan 08 23:28:18 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:66:e6:37:ba:67:96:c7:e1:a4:9d:a6:68:7a:e6:6a: 10:0d:20:be:f7:79:04:77:c5:0c:83:61:dd:55:7e:fc: ab:d9:77:fa:4b:c6:63:ec:88:8b:a9:41:45:ad:18:15: bf:78:59:5d:58:a3:e5:15:e5:18:c7:d0:04:43:b8:4a: 01:60:79:f5:0f:57:b2:c4:f4:98:92:7f:0b:7f:a6:9d: f9:84:2f:03:87:3d:f6:55:16:b1:cc:e0:d3:ab:20:99: 0c:9f:ca:ea:9e:a0:76:c0:76:1f:dc:cd:5c:58:b2:21: e1:f7:82:97:00:aa:5d:f5:18:5c:fa:64:e6:29:c5:a0: 32:8c:4a:c6:32:22:1a:ec:ea:70:4e:f0:84:be:63:c6: af:3d:0c:58:57:0d:c9:60:18:60:16:42:2d:3b:ea:22: 66:b8:dc:95:a5:60:22:ad:ca:97:e0:25:3b:19:b5:56: 82:76:bb:bd:4a:ad:1e:12:60:cd:00:97:48:78:69:d4: 82:4d:1e:e6:92:7d:0c:67:46:98:1e:ac:75:eb:d0:52: e3:8e:69:b5:ea:39:3c:cb:a3:61:70:a0:1a:0e:e0:9c: 0d:1e:d0:80:3f:1a:90:45:82:3b:ea:be:11:e6:3a:b7: 67:ba:f6:23:a8:38:38:60:7f:ff:c0:6d:12:14:a6:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ed:f5:bf:69:95:9b:da:4a:55:5e:51:56:cd:13:c8:9c: 57:71:88:ca:d3:a2:bd:ee:e3:3a:f8:8a:05:1e:45:41: 68:0f:ba:d1:e8:42:4a:62:ba:36:2b:79:e8:0a:2f:28: b4:bb:7f:0a:20:de:84:b8:92:54:16:58:9b:3a:f0:73: 79:2e:10:bb:1f:c7:ca:1f:12:7c:fa:79:43:03:dc:6c: ae:66:e1:79:62:c5:91:3a:35:7c:32:ed:eb:8d:e9:f4: 81:9e:3b:63:94:23:45:18:9f:7a:3a:1f:9f:7f:33:a0: 6e:5c:59:4f:bf:31:bc:5c:c9:ab:72:bc:4c:10:95:9f: 40:6a:98:20:1b:59:e0:68:40:a4:35:44:95:7c:a2:2e: 3f:56:36:af:29:aa:1b:50:72:4b:b7:61:96:33:e4:af: 4b:c7:09:9b:34:2b:af:07:46:a8:b2:3a:36:43:91:82: 3f:5f:ef:b3:1a:5d:48:a1:a1:98:58:5c:78:2e:3b:24: 22:22:c5:d3:5c:04:e4:28:fa:fc:51:10:92:c0:8b:f5: c7:90:9c:10:83:ba:4f:50:26:0f:d7:3d:c8:0b:5b:5c: 4c:ce:3d:7f:89:6e:75:9e:c3:0e:3c:8a:62:26:d3:eb: d7:c9:69:5f:61:86:33:79:5d:4a:55:6f:64:63:29:5b Fingerprint (SHA-256): 11:DE:B6:3C:CA:B6:CD:0F:58:DC:9D:DB:47:30:D1:A4:9F:4C:0F:B8:5C:53:BE:39:7A:E1:EB:30:A6:CA:21:6F Fingerprint (SHA1): 21:3D:25:26:60:37:41:D1:E5:8E:1F:20:0C:7A:0E:BA:BB:85:90:A8 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #13938: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13939: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #13940: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181861 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13941: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #13942: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #13943: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13944: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108181862 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13945: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13946: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #13947: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13948: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108181863 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13949: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13950: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #13951: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13952: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 108181864 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13953: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13954: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #13955: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13956: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 108181865 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13957: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13958: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #13959: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181861 (0x672b965) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:28:44 2016 Not After : Fri Jan 08 23:28:44 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:0f:43:27:b8:bf:e3:4c:49:40:5f:85:84:96:08:bb: 6c:57:bf:20:24:ae:85:c1:1c:13:b3:5b:5b:fa:96:9c: 19:e2:04:65:21:8e:94:b2:36:c5:04:f9:c6:bc:73:70: bf:fc:23:b8:6e:3e:1b:60:d4:c1:01:63:da:cb:09:d7: 88:42:35:71:e8:bb:cd:b9:d5:fc:24:4f:2e:d7:3b:91: 31:e3:1c:22:96:7d:ee:6d:16:c9:15:07:5a:85:99:bd: 90:7a:ca:81:0b:52:c9:1f:39:39:a1:6e:1c:c9:d6:9d: a9:09:c8:a5:42:0b:b3:d1:ec:f0:18:3a:b7:d1:dd:87: 1e:7c:07:67:69:c9:67:e8:13:8d:0a:58:e0:c7:e0:1d: a1:1f:1d:e5:24:1b:d0:16:1b:85:2f:29:30:74:6a:5e: 39:11:a6:69:52:16:15:bf:cd:d0:30:16:27:ad:ac:67: 82:09:d1:6d:d4:d8:c3:cf:a1:09:ec:f3:98:ac:29:91: f1:06:52:51:27:40:a5:0b:68:36:76:c2:02:6a:a9:11: d7:58:ea:00:15:64:5b:8b:cc:b4:f7:1c:5b:ab:fa:93: a8:6b:a0:13:93:04:43:04:9b:f0:99:f2:5e:99:45:63: 69:86:37:14:b3:80:8e:b8:26:94:ad:0d:d8:b1:5c:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:6d:2f:8d:20:2a:aa:e1:c9:85:06:fd:b5:1f:44:e5: 77:30:7a:bd:05:53:53:b7:40:47:12:75:ca:93:53:44: 96:17:d8:aa:7a:70:ef:a5:75:26:fc:0d:cf:1b:cb:cb: b1:a8:f1:1f:aa:d0:95:e9:cd:0b:f2:95:94:a1:10:48: ab:4a:e7:c6:50:91:50:fa:6b:0b:36:8c:b7:b0:45:57: 7a:39:d4:ef:47:09:40:4b:70:96:b0:4a:20:9d:d3:ad: ca:6c:9d:57:e3:e4:3f:d1:ee:e0:6e:9e:45:05:f1:d6: e9:80:dd:ba:38:c5:94:31:e7:db:8e:88:7e:4d:14:22: da:5f:ac:13:66:f2:84:86:b7:1d:1d:77:cf:72:10:2f: 04:81:79:c1:28:ec:80:8f:67:19:f7:9b:5b:3d:e6:4b: 9f:48:5c:92:2d:56:6f:1b:84:ca:bc:06:12:6d:22:b9: fa:41:6c:e8:e5:8d:b6:aa:04:51:ea:dc:5b:ac:82:da: 57:aa:28:b3:c8:69:cf:d1:51:14:ff:da:3e:81:c4:08: a9:52:7d:f8:ff:d3:40:93:66:26:4a:ff:7e:1f:6c:06: 69:5b:b7:fd:8f:17:fb:5c:39:69:85:2c:f0:3c:84:fe: 97:ef:63:41:c9:b7:bc:94:b7:33:01:12:b9:fb:2a:17 Fingerprint (SHA-256): C3:B0:36:B5:74:02:50:AE:BD:F3:10:51:54:93:1A:B5:94:AA:94:64:A6:8A:73:4F:0D:50:67:09:03:32:59:13 Fingerprint (SHA1): DF:41:60:C2:10:91:9A:6D:C7:DF:68:47:C3:22:CB:57:98:D4:72:91 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #13960: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13961: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181862 (0x672b966) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:28:54 2016 Not After : Fri Jan 08 23:28:54 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:45:81:a0:0b:1a:f2:ff:37:a7:f8:77:ac:f7:8b:0a: 65:9a:69:25:af:fb:dd:c1:33:a8:30:b0:e0:bb:42:fe: 00:6a:5e:58:e5:37:b4:4e:03:f9:c5:4b:8a:a0:26:7a: ed:87:c8:ef:06:ca:1c:af:0d:bb:07:07:5c:85:ca:8d: 15:81:81:18:d8:ac:6a:a4:2d:d5:df:84:5b:e4:34:57: 9c:b0:d7:66:42:ad:6d:f7:12:91:40:af:e2:4f:c0:8c: 7a:73:9c:07:c9:76:4e:af:76:f3:67:f7:a9:4d:e3:bb: ad:3a:f2:ac:5b:45:9a:44:5a:fc:8d:f2:f6:73:bb:42: 26:51:a9:17:63:ea:a2:66:ea:8d:48:dc:56:65:f9:5f: ab:2a:ad:01:ef:ff:f3:f0:b5:03:59:56:17:2c:a5:12: a3:49:27:4c:9a:f8:b8:4e:8c:8a:59:e4:8b:32:b2:ab: d1:7d:20:f0:65:14:61:3c:d3:70:68:fd:07:4b:49:2d: b5:5f:f6:f5:5f:2d:d3:05:87:64:b4:de:66:45:ac:93: 10:b1:9a:0a:0e:b7:6d:03:ee:d8:05:d4:ba:31:39:9f: c0:92:fe:30:8f:80:6b:b0:76:f3:da:09:6f:9f:e7:3b: 00:af:8d:23:8f:86:17:28:fc:0c:6e:6b:60:09:e6:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8e:63:b5:dc:b6:8c:84:c3:ee:4c:01:38:da:bb:b5:be: 59:b8:02:9a:fb:93:27:21:95:5e:0c:d2:dc:e4:4b:e6: 04:68:d2:6a:13:c3:9c:0b:e1:65:a2:6f:11:bf:d8:2e: f6:e0:5e:f8:c3:c2:44:8b:35:95:f2:e3:d7:38:7c:4b: 1c:2f:96:8b:50:12:7d:1b:32:86:9f:7e:88:1c:39:ed: 4d:90:f3:c7:83:73:c1:33:8c:7f:ed:85:4e:aa:eb:3a: 86:b0:9e:ee:2a:b4:b1:1b:fe:ec:c7:4f:ec:29:14:7a: 77:86:81:b4:7e:d6:de:71:61:13:a1:d6:3f:c4:d0:eb: 55:42:bf:e6:35:48:e6:9a:df:dd:3f:6a:54:17:0e:e6: 55:a2:c5:c8:80:aa:91:5f:fe:25:cd:aa:7b:c0:2c:34: f3:52:3e:8c:9d:6d:46:26:54:55:22:89:60:22:4d:16: 78:5f:fc:97:f1:03:cc:7c:99:ef:76:bc:5c:7c:33:7a: 0a:3e:15:af:e2:05:31:ad:0c:43:a0:e3:fc:42:b4:69: aa:e8:89:f5:e9:8d:e1:fe:ee:45:a7:b0:76:a2:a0:4b: e9:30:57:79:3f:f3:7d:5d:e4:6f:42:ac:02:0e:90:3e: 89:5d:36:cb:ae:3c:ce:69:0e:4d:87:3f:3b:c1:90:40 Fingerprint (SHA-256): 7E:EB:0A:9F:40:0C:24:38:FE:DF:FD:5C:F2:EE:96:34:2F:81:BA:B2:25:99:1A:0B:C0:87:9F:23:53:44:43:DE Fingerprint (SHA1): AB:0A:03:10:22:E0:9F:AB:EB:53:5F:7E:08:07:0B:78:51:3D:72:27 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #13962: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13963: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181863 (0x672b967) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 23:29:05 2016 Not After : Fri Jan 08 23:29:05 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:45:ab:72:98:8a:41:6d:0c:f5:1b:b0:8f:02:b9:8d: 4f:d1:cc:9c:9a:18:dc:a4:4d:35:2c:78:a8:1f:84:60: ee:75:3a:aa:06:8b:de:ca:83:33:a7:29:23:7f:80:56: 08:f4:a0:02:48:37:4d:4b:eb:4a:3c:58:f7:2f:53:7f: b6:89:90:a4:7d:08:43:06:b3:85:2c:48:f6:a8:b6:14: dd:32:ba:f7:44:29:f4:70:69:cd:88:e0:29:06:18:a0: c6:e7:33:19:50:3b:b7:43:99:4e:17:68:8f:68:66:94: 85:fc:9f:3d:55:d3:72:1c:81:c3:6c:30:ca:14:77:b3: 84:6d:e7:ab:3a:3a:3c:98:54:ab:86:e7:21:c6:6c:8a: ca:bb:e8:e9:dc:b6:d5:7b:fd:2c:60:85:d4:c1:60:d5: 90:be:66:f1:f4:23:9e:8d:8f:fd:32:53:f0:10:0e:46: 55:70:cb:e5:f3:85:c9:1b:60:38:61:7c:67:6f:81:70: 3b:9c:2f:df:ce:da:9c:b8:65:e3:ec:e2:c1:5c:95:3f: 32:7f:08:b3:d7:43:56:fc:84:5a:dc:50:81:5d:77:da: 1b:22:6f:3f:1b:92:db:fc:43:4f:ee:b2:b1:ea:37:58: 67:36:76:78:b1:28:b5:9c:3e:59:16:a7:4f:f9:82:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 17:3f:b1:73:c2:e7:5c:73:af:67:bd:43:e5:84:a8:1b: d6:72:c4:bd:f8:2a:c6:1b:0a:19:97:10:6d:17:be:85: 9f:c0:63:05:2e:0d:a2:96:b9:95:e8:af:24:4e:03:28: 59:e3:7e:09:8c:b7:f6:ca:e7:1f:ed:39:2c:e2:f8:c8: d2:7a:5d:0e:6e:75:c1:35:e9:7f:11:cd:da:8e:2e:b2: a9:44:3b:ae:70:70:3f:af:63:45:30:dc:1b:60:e9:e2: a5:75:91:02:c1:34:9d:a3:c5:83:d9:90:49:54:ab:e8: f8:7c:a5:ab:d6:51:4e:df:54:58:c8:53:69:65:db:37: d9:d6:a6:38:e9:72:31:ba:e1:0d:20:a3:37:5c:b0:a5: 93:70:9a:74:31:e5:9a:3f:b0:ef:41:f0:d3:3f:47:ef: a3:14:ee:a2:e4:98:53:10:01:cd:ce:94:11:f2:2f:64: 08:20:24:8c:be:06:ab:4d:1e:82:2a:e8:7e:66:5c:9d: 3c:b9:d5:8e:f0:5a:e4:61:c4:44:4e:75:01:8e:8e:4e: ae:fe:75:81:56:97:04:9f:d9:86:ef:5e:85:be:c8:3b: 20:24:6c:4c:40:69:31:ab:29:fe:2f:be:17:5f:de:14: a3:62:32:57:72:4c:79:7e:2e:d0:a2:e4:1f:80:1b:25 Fingerprint (SHA-256): BE:5D:0D:4F:3F:66:CB:37:63:CB:E5:DE:B2:0E:10:BC:75:B9:C0:47:D2:3F:B6:B7:E1:1B:9C:A2:D7:87:40:28 Fingerprint (SHA1): 35:19:AA:C4:04:DE:DE:3B:54:1C:0F:5F:0B:BB:B8:A7:0D:F3:46:99 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #13964: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13965: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #13966: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #13967: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #13968: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181861 (0x672b965) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:28:44 2016 Not After : Fri Jan 08 23:28:44 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:0f:43:27:b8:bf:e3:4c:49:40:5f:85:84:96:08:bb: 6c:57:bf:20:24:ae:85:c1:1c:13:b3:5b:5b:fa:96:9c: 19:e2:04:65:21:8e:94:b2:36:c5:04:f9:c6:bc:73:70: bf:fc:23:b8:6e:3e:1b:60:d4:c1:01:63:da:cb:09:d7: 88:42:35:71:e8:bb:cd:b9:d5:fc:24:4f:2e:d7:3b:91: 31:e3:1c:22:96:7d:ee:6d:16:c9:15:07:5a:85:99:bd: 90:7a:ca:81:0b:52:c9:1f:39:39:a1:6e:1c:c9:d6:9d: a9:09:c8:a5:42:0b:b3:d1:ec:f0:18:3a:b7:d1:dd:87: 1e:7c:07:67:69:c9:67:e8:13:8d:0a:58:e0:c7:e0:1d: a1:1f:1d:e5:24:1b:d0:16:1b:85:2f:29:30:74:6a:5e: 39:11:a6:69:52:16:15:bf:cd:d0:30:16:27:ad:ac:67: 82:09:d1:6d:d4:d8:c3:cf:a1:09:ec:f3:98:ac:29:91: f1:06:52:51:27:40:a5:0b:68:36:76:c2:02:6a:a9:11: d7:58:ea:00:15:64:5b:8b:cc:b4:f7:1c:5b:ab:fa:93: a8:6b:a0:13:93:04:43:04:9b:f0:99:f2:5e:99:45:63: 69:86:37:14:b3:80:8e:b8:26:94:ad:0d:d8:b1:5c:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:6d:2f:8d:20:2a:aa:e1:c9:85:06:fd:b5:1f:44:e5: 77:30:7a:bd:05:53:53:b7:40:47:12:75:ca:93:53:44: 96:17:d8:aa:7a:70:ef:a5:75:26:fc:0d:cf:1b:cb:cb: b1:a8:f1:1f:aa:d0:95:e9:cd:0b:f2:95:94:a1:10:48: ab:4a:e7:c6:50:91:50:fa:6b:0b:36:8c:b7:b0:45:57: 7a:39:d4:ef:47:09:40:4b:70:96:b0:4a:20:9d:d3:ad: ca:6c:9d:57:e3:e4:3f:d1:ee:e0:6e:9e:45:05:f1:d6: e9:80:dd:ba:38:c5:94:31:e7:db:8e:88:7e:4d:14:22: da:5f:ac:13:66:f2:84:86:b7:1d:1d:77:cf:72:10:2f: 04:81:79:c1:28:ec:80:8f:67:19:f7:9b:5b:3d:e6:4b: 9f:48:5c:92:2d:56:6f:1b:84:ca:bc:06:12:6d:22:b9: fa:41:6c:e8:e5:8d:b6:aa:04:51:ea:dc:5b:ac:82:da: 57:aa:28:b3:c8:69:cf:d1:51:14:ff:da:3e:81:c4:08: a9:52:7d:f8:ff:d3:40:93:66:26:4a:ff:7e:1f:6c:06: 69:5b:b7:fd:8f:17:fb:5c:39:69:85:2c:f0:3c:84:fe: 97:ef:63:41:c9:b7:bc:94:b7:33:01:12:b9:fb:2a:17 Fingerprint (SHA-256): C3:B0:36:B5:74:02:50:AE:BD:F3:10:51:54:93:1A:B5:94:AA:94:64:A6:8A:73:4F:0D:50:67:09:03:32:59:13 Fingerprint (SHA1): DF:41:60:C2:10:91:9A:6D:C7:DF:68:47:C3:22:CB:57:98:D4:72:91 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #13969: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13970: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181862 (0x672b966) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:28:54 2016 Not After : Fri Jan 08 23:28:54 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:45:81:a0:0b:1a:f2:ff:37:a7:f8:77:ac:f7:8b:0a: 65:9a:69:25:af:fb:dd:c1:33:a8:30:b0:e0:bb:42:fe: 00:6a:5e:58:e5:37:b4:4e:03:f9:c5:4b:8a:a0:26:7a: ed:87:c8:ef:06:ca:1c:af:0d:bb:07:07:5c:85:ca:8d: 15:81:81:18:d8:ac:6a:a4:2d:d5:df:84:5b:e4:34:57: 9c:b0:d7:66:42:ad:6d:f7:12:91:40:af:e2:4f:c0:8c: 7a:73:9c:07:c9:76:4e:af:76:f3:67:f7:a9:4d:e3:bb: ad:3a:f2:ac:5b:45:9a:44:5a:fc:8d:f2:f6:73:bb:42: 26:51:a9:17:63:ea:a2:66:ea:8d:48:dc:56:65:f9:5f: ab:2a:ad:01:ef:ff:f3:f0:b5:03:59:56:17:2c:a5:12: a3:49:27:4c:9a:f8:b8:4e:8c:8a:59:e4:8b:32:b2:ab: d1:7d:20:f0:65:14:61:3c:d3:70:68:fd:07:4b:49:2d: b5:5f:f6:f5:5f:2d:d3:05:87:64:b4:de:66:45:ac:93: 10:b1:9a:0a:0e:b7:6d:03:ee:d8:05:d4:ba:31:39:9f: c0:92:fe:30:8f:80:6b:b0:76:f3:da:09:6f:9f:e7:3b: 00:af:8d:23:8f:86:17:28:fc:0c:6e:6b:60:09:e6:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8e:63:b5:dc:b6:8c:84:c3:ee:4c:01:38:da:bb:b5:be: 59:b8:02:9a:fb:93:27:21:95:5e:0c:d2:dc:e4:4b:e6: 04:68:d2:6a:13:c3:9c:0b:e1:65:a2:6f:11:bf:d8:2e: f6:e0:5e:f8:c3:c2:44:8b:35:95:f2:e3:d7:38:7c:4b: 1c:2f:96:8b:50:12:7d:1b:32:86:9f:7e:88:1c:39:ed: 4d:90:f3:c7:83:73:c1:33:8c:7f:ed:85:4e:aa:eb:3a: 86:b0:9e:ee:2a:b4:b1:1b:fe:ec:c7:4f:ec:29:14:7a: 77:86:81:b4:7e:d6:de:71:61:13:a1:d6:3f:c4:d0:eb: 55:42:bf:e6:35:48:e6:9a:df:dd:3f:6a:54:17:0e:e6: 55:a2:c5:c8:80:aa:91:5f:fe:25:cd:aa:7b:c0:2c:34: f3:52:3e:8c:9d:6d:46:26:54:55:22:89:60:22:4d:16: 78:5f:fc:97:f1:03:cc:7c:99:ef:76:bc:5c:7c:33:7a: 0a:3e:15:af:e2:05:31:ad:0c:43:a0:e3:fc:42:b4:69: aa:e8:89:f5:e9:8d:e1:fe:ee:45:a7:b0:76:a2:a0:4b: e9:30:57:79:3f:f3:7d:5d:e4:6f:42:ac:02:0e:90:3e: 89:5d:36:cb:ae:3c:ce:69:0e:4d:87:3f:3b:c1:90:40 Fingerprint (SHA-256): 7E:EB:0A:9F:40:0C:24:38:FE:DF:FD:5C:F2:EE:96:34:2F:81:BA:B2:25:99:1A:0B:C0:87:9F:23:53:44:43:DE Fingerprint (SHA1): AB:0A:03:10:22:E0:9F:AB:EB:53:5F:7E:08:07:0B:78:51:3D:72:27 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #13971: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13972: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181863 (0x672b967) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 23:29:05 2016 Not After : Fri Jan 08 23:29:05 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:45:ab:72:98:8a:41:6d:0c:f5:1b:b0:8f:02:b9:8d: 4f:d1:cc:9c:9a:18:dc:a4:4d:35:2c:78:a8:1f:84:60: ee:75:3a:aa:06:8b:de:ca:83:33:a7:29:23:7f:80:56: 08:f4:a0:02:48:37:4d:4b:eb:4a:3c:58:f7:2f:53:7f: b6:89:90:a4:7d:08:43:06:b3:85:2c:48:f6:a8:b6:14: dd:32:ba:f7:44:29:f4:70:69:cd:88:e0:29:06:18:a0: c6:e7:33:19:50:3b:b7:43:99:4e:17:68:8f:68:66:94: 85:fc:9f:3d:55:d3:72:1c:81:c3:6c:30:ca:14:77:b3: 84:6d:e7:ab:3a:3a:3c:98:54:ab:86:e7:21:c6:6c:8a: ca:bb:e8:e9:dc:b6:d5:7b:fd:2c:60:85:d4:c1:60:d5: 90:be:66:f1:f4:23:9e:8d:8f:fd:32:53:f0:10:0e:46: 55:70:cb:e5:f3:85:c9:1b:60:38:61:7c:67:6f:81:70: 3b:9c:2f:df:ce:da:9c:b8:65:e3:ec:e2:c1:5c:95:3f: 32:7f:08:b3:d7:43:56:fc:84:5a:dc:50:81:5d:77:da: 1b:22:6f:3f:1b:92:db:fc:43:4f:ee:b2:b1:ea:37:58: 67:36:76:78:b1:28:b5:9c:3e:59:16:a7:4f:f9:82:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 17:3f:b1:73:c2:e7:5c:73:af:67:bd:43:e5:84:a8:1b: d6:72:c4:bd:f8:2a:c6:1b:0a:19:97:10:6d:17:be:85: 9f:c0:63:05:2e:0d:a2:96:b9:95:e8:af:24:4e:03:28: 59:e3:7e:09:8c:b7:f6:ca:e7:1f:ed:39:2c:e2:f8:c8: d2:7a:5d:0e:6e:75:c1:35:e9:7f:11:cd:da:8e:2e:b2: a9:44:3b:ae:70:70:3f:af:63:45:30:dc:1b:60:e9:e2: a5:75:91:02:c1:34:9d:a3:c5:83:d9:90:49:54:ab:e8: f8:7c:a5:ab:d6:51:4e:df:54:58:c8:53:69:65:db:37: d9:d6:a6:38:e9:72:31:ba:e1:0d:20:a3:37:5c:b0:a5: 93:70:9a:74:31:e5:9a:3f:b0:ef:41:f0:d3:3f:47:ef: a3:14:ee:a2:e4:98:53:10:01:cd:ce:94:11:f2:2f:64: 08:20:24:8c:be:06:ab:4d:1e:82:2a:e8:7e:66:5c:9d: 3c:b9:d5:8e:f0:5a:e4:61:c4:44:4e:75:01:8e:8e:4e: ae:fe:75:81:56:97:04:9f:d9:86:ef:5e:85:be:c8:3b: 20:24:6c:4c:40:69:31:ab:29:fe:2f:be:17:5f:de:14: a3:62:32:57:72:4c:79:7e:2e:d0:a2:e4:1f:80:1b:25 Fingerprint (SHA-256): BE:5D:0D:4F:3F:66:CB:37:63:CB:E5:DE:B2:0E:10:BC:75:B9:C0:47:D2:3F:B6:B7:E1:1B:9C:A2:D7:87:40:28 Fingerprint (SHA1): 35:19:AA:C4:04:DE:DE:3B:54:1C:0F:5F:0B:BB:B8:A7:0D:F3:46:99 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #13973: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13974: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181861 (0x672b965) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:28:44 2016 Not After : Fri Jan 08 23:28:44 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:0f:43:27:b8:bf:e3:4c:49:40:5f:85:84:96:08:bb: 6c:57:bf:20:24:ae:85:c1:1c:13:b3:5b:5b:fa:96:9c: 19:e2:04:65:21:8e:94:b2:36:c5:04:f9:c6:bc:73:70: bf:fc:23:b8:6e:3e:1b:60:d4:c1:01:63:da:cb:09:d7: 88:42:35:71:e8:bb:cd:b9:d5:fc:24:4f:2e:d7:3b:91: 31:e3:1c:22:96:7d:ee:6d:16:c9:15:07:5a:85:99:bd: 90:7a:ca:81:0b:52:c9:1f:39:39:a1:6e:1c:c9:d6:9d: a9:09:c8:a5:42:0b:b3:d1:ec:f0:18:3a:b7:d1:dd:87: 1e:7c:07:67:69:c9:67:e8:13:8d:0a:58:e0:c7:e0:1d: a1:1f:1d:e5:24:1b:d0:16:1b:85:2f:29:30:74:6a:5e: 39:11:a6:69:52:16:15:bf:cd:d0:30:16:27:ad:ac:67: 82:09:d1:6d:d4:d8:c3:cf:a1:09:ec:f3:98:ac:29:91: f1:06:52:51:27:40:a5:0b:68:36:76:c2:02:6a:a9:11: d7:58:ea:00:15:64:5b:8b:cc:b4:f7:1c:5b:ab:fa:93: a8:6b:a0:13:93:04:43:04:9b:f0:99:f2:5e:99:45:63: 69:86:37:14:b3:80:8e:b8:26:94:ad:0d:d8:b1:5c:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:6d:2f:8d:20:2a:aa:e1:c9:85:06:fd:b5:1f:44:e5: 77:30:7a:bd:05:53:53:b7:40:47:12:75:ca:93:53:44: 96:17:d8:aa:7a:70:ef:a5:75:26:fc:0d:cf:1b:cb:cb: b1:a8:f1:1f:aa:d0:95:e9:cd:0b:f2:95:94:a1:10:48: ab:4a:e7:c6:50:91:50:fa:6b:0b:36:8c:b7:b0:45:57: 7a:39:d4:ef:47:09:40:4b:70:96:b0:4a:20:9d:d3:ad: ca:6c:9d:57:e3:e4:3f:d1:ee:e0:6e:9e:45:05:f1:d6: e9:80:dd:ba:38:c5:94:31:e7:db:8e:88:7e:4d:14:22: da:5f:ac:13:66:f2:84:86:b7:1d:1d:77:cf:72:10:2f: 04:81:79:c1:28:ec:80:8f:67:19:f7:9b:5b:3d:e6:4b: 9f:48:5c:92:2d:56:6f:1b:84:ca:bc:06:12:6d:22:b9: fa:41:6c:e8:e5:8d:b6:aa:04:51:ea:dc:5b:ac:82:da: 57:aa:28:b3:c8:69:cf:d1:51:14:ff:da:3e:81:c4:08: a9:52:7d:f8:ff:d3:40:93:66:26:4a:ff:7e:1f:6c:06: 69:5b:b7:fd:8f:17:fb:5c:39:69:85:2c:f0:3c:84:fe: 97:ef:63:41:c9:b7:bc:94:b7:33:01:12:b9:fb:2a:17 Fingerprint (SHA-256): C3:B0:36:B5:74:02:50:AE:BD:F3:10:51:54:93:1A:B5:94:AA:94:64:A6:8A:73:4F:0D:50:67:09:03:32:59:13 Fingerprint (SHA1): DF:41:60:C2:10:91:9A:6D:C7:DF:68:47:C3:22:CB:57:98:D4:72:91 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #13975: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181861 (0x672b965) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:28:44 2016 Not After : Fri Jan 08 23:28:44 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:0f:43:27:b8:bf:e3:4c:49:40:5f:85:84:96:08:bb: 6c:57:bf:20:24:ae:85:c1:1c:13:b3:5b:5b:fa:96:9c: 19:e2:04:65:21:8e:94:b2:36:c5:04:f9:c6:bc:73:70: bf:fc:23:b8:6e:3e:1b:60:d4:c1:01:63:da:cb:09:d7: 88:42:35:71:e8:bb:cd:b9:d5:fc:24:4f:2e:d7:3b:91: 31:e3:1c:22:96:7d:ee:6d:16:c9:15:07:5a:85:99:bd: 90:7a:ca:81:0b:52:c9:1f:39:39:a1:6e:1c:c9:d6:9d: a9:09:c8:a5:42:0b:b3:d1:ec:f0:18:3a:b7:d1:dd:87: 1e:7c:07:67:69:c9:67:e8:13:8d:0a:58:e0:c7:e0:1d: a1:1f:1d:e5:24:1b:d0:16:1b:85:2f:29:30:74:6a:5e: 39:11:a6:69:52:16:15:bf:cd:d0:30:16:27:ad:ac:67: 82:09:d1:6d:d4:d8:c3:cf:a1:09:ec:f3:98:ac:29:91: f1:06:52:51:27:40:a5:0b:68:36:76:c2:02:6a:a9:11: d7:58:ea:00:15:64:5b:8b:cc:b4:f7:1c:5b:ab:fa:93: a8:6b:a0:13:93:04:43:04:9b:f0:99:f2:5e:99:45:63: 69:86:37:14:b3:80:8e:b8:26:94:ad:0d:d8:b1:5c:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:6d:2f:8d:20:2a:aa:e1:c9:85:06:fd:b5:1f:44:e5: 77:30:7a:bd:05:53:53:b7:40:47:12:75:ca:93:53:44: 96:17:d8:aa:7a:70:ef:a5:75:26:fc:0d:cf:1b:cb:cb: b1:a8:f1:1f:aa:d0:95:e9:cd:0b:f2:95:94:a1:10:48: ab:4a:e7:c6:50:91:50:fa:6b:0b:36:8c:b7:b0:45:57: 7a:39:d4:ef:47:09:40:4b:70:96:b0:4a:20:9d:d3:ad: ca:6c:9d:57:e3:e4:3f:d1:ee:e0:6e:9e:45:05:f1:d6: e9:80:dd:ba:38:c5:94:31:e7:db:8e:88:7e:4d:14:22: da:5f:ac:13:66:f2:84:86:b7:1d:1d:77:cf:72:10:2f: 04:81:79:c1:28:ec:80:8f:67:19:f7:9b:5b:3d:e6:4b: 9f:48:5c:92:2d:56:6f:1b:84:ca:bc:06:12:6d:22:b9: fa:41:6c:e8:e5:8d:b6:aa:04:51:ea:dc:5b:ac:82:da: 57:aa:28:b3:c8:69:cf:d1:51:14:ff:da:3e:81:c4:08: a9:52:7d:f8:ff:d3:40:93:66:26:4a:ff:7e:1f:6c:06: 69:5b:b7:fd:8f:17:fb:5c:39:69:85:2c:f0:3c:84:fe: 97:ef:63:41:c9:b7:bc:94:b7:33:01:12:b9:fb:2a:17 Fingerprint (SHA-256): C3:B0:36:B5:74:02:50:AE:BD:F3:10:51:54:93:1A:B5:94:AA:94:64:A6:8A:73:4F:0D:50:67:09:03:32:59:13 Fingerprint (SHA1): DF:41:60:C2:10:91:9A:6D:C7:DF:68:47:C3:22:CB:57:98:D4:72:91 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #13976: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181862 (0x672b966) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:28:54 2016 Not After : Fri Jan 08 23:28:54 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:45:81:a0:0b:1a:f2:ff:37:a7:f8:77:ac:f7:8b:0a: 65:9a:69:25:af:fb:dd:c1:33:a8:30:b0:e0:bb:42:fe: 00:6a:5e:58:e5:37:b4:4e:03:f9:c5:4b:8a:a0:26:7a: ed:87:c8:ef:06:ca:1c:af:0d:bb:07:07:5c:85:ca:8d: 15:81:81:18:d8:ac:6a:a4:2d:d5:df:84:5b:e4:34:57: 9c:b0:d7:66:42:ad:6d:f7:12:91:40:af:e2:4f:c0:8c: 7a:73:9c:07:c9:76:4e:af:76:f3:67:f7:a9:4d:e3:bb: ad:3a:f2:ac:5b:45:9a:44:5a:fc:8d:f2:f6:73:bb:42: 26:51:a9:17:63:ea:a2:66:ea:8d:48:dc:56:65:f9:5f: ab:2a:ad:01:ef:ff:f3:f0:b5:03:59:56:17:2c:a5:12: a3:49:27:4c:9a:f8:b8:4e:8c:8a:59:e4:8b:32:b2:ab: d1:7d:20:f0:65:14:61:3c:d3:70:68:fd:07:4b:49:2d: b5:5f:f6:f5:5f:2d:d3:05:87:64:b4:de:66:45:ac:93: 10:b1:9a:0a:0e:b7:6d:03:ee:d8:05:d4:ba:31:39:9f: c0:92:fe:30:8f:80:6b:b0:76:f3:da:09:6f:9f:e7:3b: 00:af:8d:23:8f:86:17:28:fc:0c:6e:6b:60:09:e6:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8e:63:b5:dc:b6:8c:84:c3:ee:4c:01:38:da:bb:b5:be: 59:b8:02:9a:fb:93:27:21:95:5e:0c:d2:dc:e4:4b:e6: 04:68:d2:6a:13:c3:9c:0b:e1:65:a2:6f:11:bf:d8:2e: f6:e0:5e:f8:c3:c2:44:8b:35:95:f2:e3:d7:38:7c:4b: 1c:2f:96:8b:50:12:7d:1b:32:86:9f:7e:88:1c:39:ed: 4d:90:f3:c7:83:73:c1:33:8c:7f:ed:85:4e:aa:eb:3a: 86:b0:9e:ee:2a:b4:b1:1b:fe:ec:c7:4f:ec:29:14:7a: 77:86:81:b4:7e:d6:de:71:61:13:a1:d6:3f:c4:d0:eb: 55:42:bf:e6:35:48:e6:9a:df:dd:3f:6a:54:17:0e:e6: 55:a2:c5:c8:80:aa:91:5f:fe:25:cd:aa:7b:c0:2c:34: f3:52:3e:8c:9d:6d:46:26:54:55:22:89:60:22:4d:16: 78:5f:fc:97:f1:03:cc:7c:99:ef:76:bc:5c:7c:33:7a: 0a:3e:15:af:e2:05:31:ad:0c:43:a0:e3:fc:42:b4:69: aa:e8:89:f5:e9:8d:e1:fe:ee:45:a7:b0:76:a2:a0:4b: e9:30:57:79:3f:f3:7d:5d:e4:6f:42:ac:02:0e:90:3e: 89:5d:36:cb:ae:3c:ce:69:0e:4d:87:3f:3b:c1:90:40 Fingerprint (SHA-256): 7E:EB:0A:9F:40:0C:24:38:FE:DF:FD:5C:F2:EE:96:34:2F:81:BA:B2:25:99:1A:0B:C0:87:9F:23:53:44:43:DE Fingerprint (SHA1): AB:0A:03:10:22:E0:9F:AB:EB:53:5F:7E:08:07:0B:78:51:3D:72:27 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #13977: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181862 (0x672b966) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:28:54 2016 Not After : Fri Jan 08 23:28:54 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:45:81:a0:0b:1a:f2:ff:37:a7:f8:77:ac:f7:8b:0a: 65:9a:69:25:af:fb:dd:c1:33:a8:30:b0:e0:bb:42:fe: 00:6a:5e:58:e5:37:b4:4e:03:f9:c5:4b:8a:a0:26:7a: ed:87:c8:ef:06:ca:1c:af:0d:bb:07:07:5c:85:ca:8d: 15:81:81:18:d8:ac:6a:a4:2d:d5:df:84:5b:e4:34:57: 9c:b0:d7:66:42:ad:6d:f7:12:91:40:af:e2:4f:c0:8c: 7a:73:9c:07:c9:76:4e:af:76:f3:67:f7:a9:4d:e3:bb: ad:3a:f2:ac:5b:45:9a:44:5a:fc:8d:f2:f6:73:bb:42: 26:51:a9:17:63:ea:a2:66:ea:8d:48:dc:56:65:f9:5f: ab:2a:ad:01:ef:ff:f3:f0:b5:03:59:56:17:2c:a5:12: a3:49:27:4c:9a:f8:b8:4e:8c:8a:59:e4:8b:32:b2:ab: d1:7d:20:f0:65:14:61:3c:d3:70:68:fd:07:4b:49:2d: b5:5f:f6:f5:5f:2d:d3:05:87:64:b4:de:66:45:ac:93: 10:b1:9a:0a:0e:b7:6d:03:ee:d8:05:d4:ba:31:39:9f: c0:92:fe:30:8f:80:6b:b0:76:f3:da:09:6f:9f:e7:3b: 00:af:8d:23:8f:86:17:28:fc:0c:6e:6b:60:09:e6:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8e:63:b5:dc:b6:8c:84:c3:ee:4c:01:38:da:bb:b5:be: 59:b8:02:9a:fb:93:27:21:95:5e:0c:d2:dc:e4:4b:e6: 04:68:d2:6a:13:c3:9c:0b:e1:65:a2:6f:11:bf:d8:2e: f6:e0:5e:f8:c3:c2:44:8b:35:95:f2:e3:d7:38:7c:4b: 1c:2f:96:8b:50:12:7d:1b:32:86:9f:7e:88:1c:39:ed: 4d:90:f3:c7:83:73:c1:33:8c:7f:ed:85:4e:aa:eb:3a: 86:b0:9e:ee:2a:b4:b1:1b:fe:ec:c7:4f:ec:29:14:7a: 77:86:81:b4:7e:d6:de:71:61:13:a1:d6:3f:c4:d0:eb: 55:42:bf:e6:35:48:e6:9a:df:dd:3f:6a:54:17:0e:e6: 55:a2:c5:c8:80:aa:91:5f:fe:25:cd:aa:7b:c0:2c:34: f3:52:3e:8c:9d:6d:46:26:54:55:22:89:60:22:4d:16: 78:5f:fc:97:f1:03:cc:7c:99:ef:76:bc:5c:7c:33:7a: 0a:3e:15:af:e2:05:31:ad:0c:43:a0:e3:fc:42:b4:69: aa:e8:89:f5:e9:8d:e1:fe:ee:45:a7:b0:76:a2:a0:4b: e9:30:57:79:3f:f3:7d:5d:e4:6f:42:ac:02:0e:90:3e: 89:5d:36:cb:ae:3c:ce:69:0e:4d:87:3f:3b:c1:90:40 Fingerprint (SHA-256): 7E:EB:0A:9F:40:0C:24:38:FE:DF:FD:5C:F2:EE:96:34:2F:81:BA:B2:25:99:1A:0B:C0:87:9F:23:53:44:43:DE Fingerprint (SHA1): AB:0A:03:10:22:E0:9F:AB:EB:53:5F:7E:08:07:0B:78:51:3D:72:27 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #13978: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181863 (0x672b967) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 23:29:05 2016 Not After : Fri Jan 08 23:29:05 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:45:ab:72:98:8a:41:6d:0c:f5:1b:b0:8f:02:b9:8d: 4f:d1:cc:9c:9a:18:dc:a4:4d:35:2c:78:a8:1f:84:60: ee:75:3a:aa:06:8b:de:ca:83:33:a7:29:23:7f:80:56: 08:f4:a0:02:48:37:4d:4b:eb:4a:3c:58:f7:2f:53:7f: b6:89:90:a4:7d:08:43:06:b3:85:2c:48:f6:a8:b6:14: dd:32:ba:f7:44:29:f4:70:69:cd:88:e0:29:06:18:a0: c6:e7:33:19:50:3b:b7:43:99:4e:17:68:8f:68:66:94: 85:fc:9f:3d:55:d3:72:1c:81:c3:6c:30:ca:14:77:b3: 84:6d:e7:ab:3a:3a:3c:98:54:ab:86:e7:21:c6:6c:8a: ca:bb:e8:e9:dc:b6:d5:7b:fd:2c:60:85:d4:c1:60:d5: 90:be:66:f1:f4:23:9e:8d:8f:fd:32:53:f0:10:0e:46: 55:70:cb:e5:f3:85:c9:1b:60:38:61:7c:67:6f:81:70: 3b:9c:2f:df:ce:da:9c:b8:65:e3:ec:e2:c1:5c:95:3f: 32:7f:08:b3:d7:43:56:fc:84:5a:dc:50:81:5d:77:da: 1b:22:6f:3f:1b:92:db:fc:43:4f:ee:b2:b1:ea:37:58: 67:36:76:78:b1:28:b5:9c:3e:59:16:a7:4f:f9:82:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 17:3f:b1:73:c2:e7:5c:73:af:67:bd:43:e5:84:a8:1b: d6:72:c4:bd:f8:2a:c6:1b:0a:19:97:10:6d:17:be:85: 9f:c0:63:05:2e:0d:a2:96:b9:95:e8:af:24:4e:03:28: 59:e3:7e:09:8c:b7:f6:ca:e7:1f:ed:39:2c:e2:f8:c8: d2:7a:5d:0e:6e:75:c1:35:e9:7f:11:cd:da:8e:2e:b2: a9:44:3b:ae:70:70:3f:af:63:45:30:dc:1b:60:e9:e2: a5:75:91:02:c1:34:9d:a3:c5:83:d9:90:49:54:ab:e8: f8:7c:a5:ab:d6:51:4e:df:54:58:c8:53:69:65:db:37: d9:d6:a6:38:e9:72:31:ba:e1:0d:20:a3:37:5c:b0:a5: 93:70:9a:74:31:e5:9a:3f:b0:ef:41:f0:d3:3f:47:ef: a3:14:ee:a2:e4:98:53:10:01:cd:ce:94:11:f2:2f:64: 08:20:24:8c:be:06:ab:4d:1e:82:2a:e8:7e:66:5c:9d: 3c:b9:d5:8e:f0:5a:e4:61:c4:44:4e:75:01:8e:8e:4e: ae:fe:75:81:56:97:04:9f:d9:86:ef:5e:85:be:c8:3b: 20:24:6c:4c:40:69:31:ab:29:fe:2f:be:17:5f:de:14: a3:62:32:57:72:4c:79:7e:2e:d0:a2:e4:1f:80:1b:25 Fingerprint (SHA-256): BE:5D:0D:4F:3F:66:CB:37:63:CB:E5:DE:B2:0E:10:BC:75:B9:C0:47:D2:3F:B6:B7:E1:1B:9C:A2:D7:87:40:28 Fingerprint (SHA1): 35:19:AA:C4:04:DE:DE:3B:54:1C:0F:5F:0B:BB:B8:A7:0D:F3:46:99 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #13979: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181863 (0x672b967) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 23:29:05 2016 Not After : Fri Jan 08 23:29:05 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:45:ab:72:98:8a:41:6d:0c:f5:1b:b0:8f:02:b9:8d: 4f:d1:cc:9c:9a:18:dc:a4:4d:35:2c:78:a8:1f:84:60: ee:75:3a:aa:06:8b:de:ca:83:33:a7:29:23:7f:80:56: 08:f4:a0:02:48:37:4d:4b:eb:4a:3c:58:f7:2f:53:7f: b6:89:90:a4:7d:08:43:06:b3:85:2c:48:f6:a8:b6:14: dd:32:ba:f7:44:29:f4:70:69:cd:88:e0:29:06:18:a0: c6:e7:33:19:50:3b:b7:43:99:4e:17:68:8f:68:66:94: 85:fc:9f:3d:55:d3:72:1c:81:c3:6c:30:ca:14:77:b3: 84:6d:e7:ab:3a:3a:3c:98:54:ab:86:e7:21:c6:6c:8a: ca:bb:e8:e9:dc:b6:d5:7b:fd:2c:60:85:d4:c1:60:d5: 90:be:66:f1:f4:23:9e:8d:8f:fd:32:53:f0:10:0e:46: 55:70:cb:e5:f3:85:c9:1b:60:38:61:7c:67:6f:81:70: 3b:9c:2f:df:ce:da:9c:b8:65:e3:ec:e2:c1:5c:95:3f: 32:7f:08:b3:d7:43:56:fc:84:5a:dc:50:81:5d:77:da: 1b:22:6f:3f:1b:92:db:fc:43:4f:ee:b2:b1:ea:37:58: 67:36:76:78:b1:28:b5:9c:3e:59:16:a7:4f:f9:82:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 17:3f:b1:73:c2:e7:5c:73:af:67:bd:43:e5:84:a8:1b: d6:72:c4:bd:f8:2a:c6:1b:0a:19:97:10:6d:17:be:85: 9f:c0:63:05:2e:0d:a2:96:b9:95:e8:af:24:4e:03:28: 59:e3:7e:09:8c:b7:f6:ca:e7:1f:ed:39:2c:e2:f8:c8: d2:7a:5d:0e:6e:75:c1:35:e9:7f:11:cd:da:8e:2e:b2: a9:44:3b:ae:70:70:3f:af:63:45:30:dc:1b:60:e9:e2: a5:75:91:02:c1:34:9d:a3:c5:83:d9:90:49:54:ab:e8: f8:7c:a5:ab:d6:51:4e:df:54:58:c8:53:69:65:db:37: d9:d6:a6:38:e9:72:31:ba:e1:0d:20:a3:37:5c:b0:a5: 93:70:9a:74:31:e5:9a:3f:b0:ef:41:f0:d3:3f:47:ef: a3:14:ee:a2:e4:98:53:10:01:cd:ce:94:11:f2:2f:64: 08:20:24:8c:be:06:ab:4d:1e:82:2a:e8:7e:66:5c:9d: 3c:b9:d5:8e:f0:5a:e4:61:c4:44:4e:75:01:8e:8e:4e: ae:fe:75:81:56:97:04:9f:d9:86:ef:5e:85:be:c8:3b: 20:24:6c:4c:40:69:31:ab:29:fe:2f:be:17:5f:de:14: a3:62:32:57:72:4c:79:7e:2e:d0:a2:e4:1f:80:1b:25 Fingerprint (SHA-256): BE:5D:0D:4F:3F:66:CB:37:63:CB:E5:DE:B2:0E:10:BC:75:B9:C0:47:D2:3F:B6:B7:E1:1B:9C:A2:D7:87:40:28 Fingerprint (SHA1): 35:19:AA:C4:04:DE:DE:3B:54:1C:0F:5F:0B:BB:B8:A7:0D:F3:46:99 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #13980: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #13981: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181866 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13982: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #13983: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #13984: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13985: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108181867 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13986: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13987: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #13988: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13989: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108181868 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #13990: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13991: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #13992: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13993: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 108181869 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13994: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13995: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #13996: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13997: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 108181870 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13998: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13999: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #14000: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14001: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 108181871 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14002: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14003: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #14004: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14005: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 108181872 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14006: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14007: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14008: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #14009: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #14010: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #14011: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #14012: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181866 (0x672b96a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 23:29:40 2016 Not After : Fri Jan 08 23:29:40 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:cb:62:94:e1:4f:50:20:f7:b3:52:d0:73:45:d0:6b: c7:15:68:7a:d4:8c:dd:93:cf:66:7c:ee:8a:bf:a9:42: 0c:af:1e:56:7b:1a:c3:ee:f5:cb:d0:fe:b1:4e:3e:1d: 6b:3f:01:2f:e2:ed:6b:a4:95:87:0a:72:ba:91:e2:16: 21:36:99:55:8e:7d:f9:9a:15:45:48:c8:32:0a:d4:ff: ef:78:7f:a9:42:94:5e:5f:8d:49:1b:99:12:32:1e:1d: f0:a2:74:b4:5d:8a:21:33:0c:7f:e8:73:0e:63:17:37: 1b:ae:d4:e6:48:6c:46:89:63:f7:aa:5d:99:27:f1:7a: fc:d7:1a:7d:6c:dd:cf:1b:44:de:d9:fe:93:21:2c:e8: 3c:c6:f6:b8:0c:b9:80:5b:3b:d6:fe:87:4a:fc:f2:6e: 28:f6:b6:ba:c9:1d:aa:ca:11:ad:90:b7:98:40:6c:0b: b8:9a:70:28:a5:7c:1e:b5:5b:06:ae:e5:54:5f:6c:ee: 62:a7:9f:3e:10:67:21:8a:1f:ca:ef:05:ab:3b:3e:29: 1a:9b:2c:13:db:b3:c4:fb:7b:0d:fd:50:92:2a:68:51: 02:32:b5:9e:a0:e7:7e:53:36:1d:2a:69:84:8a:18:12: 4a:50:32:e5:4b:60:6d:15:25:90:f7:7a:85:96:e3:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:95:25:21:1d:de:4f:6b:89:18:09:fc:81:bd:05:26: f9:03:0f:ac:ea:dc:48:54:eb:f0:33:d3:66:ab:d9:0a: 72:82:7a:42:a3:5b:8b:aa:1c:2c:03:4f:b6:3c:e4:bc: 54:1e:e6:43:70:46:25:7d:9a:35:c2:6a:c8:cb:a4:a1: 6c:b0:59:05:fe:c5:c0:e0:9d:65:a1:5c:e1:bc:fe:7f: 53:a5:67:0a:cd:6b:cf:eb:87:43:76:68:9a:ca:f0:9a: fd:0c:54:5c:79:7e:0d:87:16:b9:2f:2e:76:59:05:a6: e9:08:4b:22:79:a8:6d:e2:83:9b:ca:b8:ac:92:ce:bb: 28:ad:16:fb:98:f1:ec:bf:eb:fc:50:a4:16:b1:bd:db: 44:eb:91:c1:d1:2e:b5:da:28:f6:58:aa:cd:9a:35:2f: 96:7d:c3:c9:82:3a:8c:43:2a:5f:e0:24:f7:4f:90:3d: 88:f6:33:3a:1a:e3:18:86:ae:63:79:a0:c3:df:b9:57: 63:97:0f:03:e1:ef:e6:2b:61:35:00:51:d4:c3:01:7b: 26:5a:ca:c2:2f:e3:f1:12:fc:64:38:8c:f7:e5:99:5f: 1e:ff:cd:50:b9:09:09:0f:cb:6f:18:49:55:8c:5a:1c: d2:be:40:a9:e2:2d:69:08:e9:ab:e3:e6:03:65:4e:25 Fingerprint (SHA-256): 29:A8:37:F7:E0:85:B8:88:D6:F0:CB:0B:7F:6F:4D:D6:68:37:DA:E6:C5:2D:D5:31:2A:10:52:EE:75:67:AA:40 Fingerprint (SHA1): FD:3A:24:18:D3:01:45:EE:22:87:C9:A3:84:9C:94:5F:31:FC:6B:C7 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14013: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14014: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14015: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14016: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181866 (0x672b96a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 23:29:40 2016 Not After : Fri Jan 08 23:29:40 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:cb:62:94:e1:4f:50:20:f7:b3:52:d0:73:45:d0:6b: c7:15:68:7a:d4:8c:dd:93:cf:66:7c:ee:8a:bf:a9:42: 0c:af:1e:56:7b:1a:c3:ee:f5:cb:d0:fe:b1:4e:3e:1d: 6b:3f:01:2f:e2:ed:6b:a4:95:87:0a:72:ba:91:e2:16: 21:36:99:55:8e:7d:f9:9a:15:45:48:c8:32:0a:d4:ff: ef:78:7f:a9:42:94:5e:5f:8d:49:1b:99:12:32:1e:1d: f0:a2:74:b4:5d:8a:21:33:0c:7f:e8:73:0e:63:17:37: 1b:ae:d4:e6:48:6c:46:89:63:f7:aa:5d:99:27:f1:7a: fc:d7:1a:7d:6c:dd:cf:1b:44:de:d9:fe:93:21:2c:e8: 3c:c6:f6:b8:0c:b9:80:5b:3b:d6:fe:87:4a:fc:f2:6e: 28:f6:b6:ba:c9:1d:aa:ca:11:ad:90:b7:98:40:6c:0b: b8:9a:70:28:a5:7c:1e:b5:5b:06:ae:e5:54:5f:6c:ee: 62:a7:9f:3e:10:67:21:8a:1f:ca:ef:05:ab:3b:3e:29: 1a:9b:2c:13:db:b3:c4:fb:7b:0d:fd:50:92:2a:68:51: 02:32:b5:9e:a0:e7:7e:53:36:1d:2a:69:84:8a:18:12: 4a:50:32:e5:4b:60:6d:15:25:90:f7:7a:85:96:e3:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:95:25:21:1d:de:4f:6b:89:18:09:fc:81:bd:05:26: f9:03:0f:ac:ea:dc:48:54:eb:f0:33:d3:66:ab:d9:0a: 72:82:7a:42:a3:5b:8b:aa:1c:2c:03:4f:b6:3c:e4:bc: 54:1e:e6:43:70:46:25:7d:9a:35:c2:6a:c8:cb:a4:a1: 6c:b0:59:05:fe:c5:c0:e0:9d:65:a1:5c:e1:bc:fe:7f: 53:a5:67:0a:cd:6b:cf:eb:87:43:76:68:9a:ca:f0:9a: fd:0c:54:5c:79:7e:0d:87:16:b9:2f:2e:76:59:05:a6: e9:08:4b:22:79:a8:6d:e2:83:9b:ca:b8:ac:92:ce:bb: 28:ad:16:fb:98:f1:ec:bf:eb:fc:50:a4:16:b1:bd:db: 44:eb:91:c1:d1:2e:b5:da:28:f6:58:aa:cd:9a:35:2f: 96:7d:c3:c9:82:3a:8c:43:2a:5f:e0:24:f7:4f:90:3d: 88:f6:33:3a:1a:e3:18:86:ae:63:79:a0:c3:df:b9:57: 63:97:0f:03:e1:ef:e6:2b:61:35:00:51:d4:c3:01:7b: 26:5a:ca:c2:2f:e3:f1:12:fc:64:38:8c:f7:e5:99:5f: 1e:ff:cd:50:b9:09:09:0f:cb:6f:18:49:55:8c:5a:1c: d2:be:40:a9:e2:2d:69:08:e9:ab:e3:e6:03:65:4e:25 Fingerprint (SHA-256): 29:A8:37:F7:E0:85:B8:88:D6:F0:CB:0B:7F:6F:4D:D6:68:37:DA:E6:C5:2D:D5:31:2A:10:52:EE:75:67:AA:40 Fingerprint (SHA1): FD:3A:24:18:D3:01:45:EE:22:87:C9:A3:84:9C:94:5F:31:FC:6B:C7 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14017: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14018: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #14019: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181873 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14020: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #14021: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14022: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14023: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108181874 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #14024: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14025: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #14026: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14027: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 108181875 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14028: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14029: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #14030: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14031: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 108181876 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14032: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14033: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #14034: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14035: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 108181877 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14036: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14037: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #14038: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14039: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 108181878 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14040: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14041: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #14042: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14043: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 108181879 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14044: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14045: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #14046: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14047: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 108181880 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14048: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14049: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #14050: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14051: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 108181881 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #14052: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14053: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #14054: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14055: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 108181882 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14056: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14057: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #14058: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14059: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 108181883 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14060: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14061: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #14062: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14063: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 108181884 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14064: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14065: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #14066: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14067: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 108181885 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14068: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14069: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #14070: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14071: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 108181886 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14072: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14073: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #14074: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14075: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 108181887 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14076: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14077: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #14078: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14079: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 108181888 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14080: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14081: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #14082: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14083: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 108181889 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14084: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14085: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #14086: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14087: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 108181890 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #14088: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14089: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #14090: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14091: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 108181891 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14092: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14093: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #14094: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14095: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 108181892 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14096: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14097: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #14098: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14099: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 108181893 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14100: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14101: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #14102: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14103: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 108181894 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14104: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14105: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #14106: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14107: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 108181895 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14108: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14109: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #14110: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14111: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 108181896 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14112: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14113: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #14114: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14115: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 108181897 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14116: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14117: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #14118: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14119: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 108181898 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14120: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14121: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #14122: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14123: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 108181899 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14124: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14125: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #14126: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14127: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 108181900 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14128: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14129: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #14130: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14131: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 108181901 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14132: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14133: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #14134: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14135: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 108181902 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14136: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14137: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14138: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181873 (0x672b971) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 23:31:06 2016 Not After : Fri Jan 08 23:31:06 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:0c:52:e1:09:ea:8b:e4:fa:ff:40:60:b8:ae:f8:f2: ba:ba:26:a9:2a:1a:03:2d:ef:71:fe:1c:3e:65:fe:72: 59:d6:8d:7a:5b:ec:99:36:41:ce:64:43:1f:b4:99:58: ae:ce:d7:e9:0d:72:3b:19:b4:5e:89:ba:91:23:1d:23: 58:a1:c7:86:d3:fd:b8:1e:4f:f6:c1:2a:39:45:f7:34: c8:cd:31:72:26:35:7f:66:e2:ec:77:45:3e:3d:79:61: a1:b0:9d:80:32:69:01:90:36:53:f2:9e:ad:45:19:68: 2b:88:12:a2:03:44:e2:f9:9a:26:93:e4:51:cb:1e:32: e3:e9:03:75:69:08:e3:0d:16:00:3b:e3:bc:75:14:29: 3e:0d:67:8d:1c:2b:0a:5b:ac:f5:97:01:a2:9d:e1:4d: d4:e3:36:d7:cd:fb:5d:80:3b:f5:85:17:52:bb:68:5c: 1b:b3:83:ec:6d:01:81:9f:0a:c9:2b:d5:59:50:90:72: 7d:c9:f0:3b:8a:09:3e:0f:e0:ca:b4:bd:64:d9:80:84: 35:2b:84:45:20:0c:07:da:d5:4d:5f:41:74:48:c6:65: a5:70:18:8f:f5:3d:c5:b3:01:e1:c1:82:ca:4a:33:5d: b8:e8:72:16:34:4f:c5:d6:3f:c0:f0:a7:33:81:d1:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:f7:1e:89:e8:65:24:0f:1d:0d:bc:66:80:2e:a1:db: d5:41:cf:b2:03:38:b3:f7:44:9d:3b:10:f6:e9:f8:7c: 0d:67:15:2d:68:4f:c7:08:b3:0b:58:fd:93:44:fd:93: af:ed:28:bf:fa:45:17:5d:fb:d6:e7:db:de:31:bb:34: 65:36:f2:c3:27:6a:e0:f1:06:93:b8:a0:a7:f8:be:bb: ed:64:4b:d0:7f:8d:4d:9f:e6:9b:3c:c7:96:0b:5e:b0: fa:c0:cc:a8:ad:2d:ae:6d:c2:bc:0f:bf:b1:04:2a:cd: 58:30:23:21:8d:70:40:2f:d9:ba:01:0a:d5:88:49:a1: 90:c9:f6:ea:d5:7f:b1:d6:35:0a:27:06:56:57:6d:39: bc:84:8c:93:c1:27:07:4e:f5:7e:f5:38:7d:50:05:36: 2f:b3:39:11:ef:1e:49:8f:ef:f7:cd:f3:58:39:ff:d2: 73:36:ce:43:7b:9e:6a:7b:50:3c:e5:f0:c5:8c:b9:12: a6:53:d7:fc:52:0f:50:96:77:31:06:a1:fc:b7:26:1a: ac:ba:2d:6a:fd:b0:dc:29:e1:e2:f3:35:7a:11:37:05: 22:6c:73:da:0b:98:c9:83:c4:2b:f7:ca:43:57:0b:36: 52:13:48:12:ae:d7:d6:1c:8e:51:09:99:ff:e8:f1:7d Fingerprint (SHA-256): 38:11:1C:B9:EF:45:41:2D:78:E4:B5:38:7C:54:27:AB:3D:71:01:C5:B4:B4:55:03:DD:84:20:9D:68:1F:EB:55 Fingerprint (SHA1): 3F:46:93:3E:30:92:A8:5D:37:31:38:A0:4F:2A:55:01:82:4D:50:3E Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14139: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14140: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181873 (0x672b971) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 23:31:06 2016 Not After : Fri Jan 08 23:31:06 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:0c:52:e1:09:ea:8b:e4:fa:ff:40:60:b8:ae:f8:f2: ba:ba:26:a9:2a:1a:03:2d:ef:71:fe:1c:3e:65:fe:72: 59:d6:8d:7a:5b:ec:99:36:41:ce:64:43:1f:b4:99:58: ae:ce:d7:e9:0d:72:3b:19:b4:5e:89:ba:91:23:1d:23: 58:a1:c7:86:d3:fd:b8:1e:4f:f6:c1:2a:39:45:f7:34: c8:cd:31:72:26:35:7f:66:e2:ec:77:45:3e:3d:79:61: a1:b0:9d:80:32:69:01:90:36:53:f2:9e:ad:45:19:68: 2b:88:12:a2:03:44:e2:f9:9a:26:93:e4:51:cb:1e:32: e3:e9:03:75:69:08:e3:0d:16:00:3b:e3:bc:75:14:29: 3e:0d:67:8d:1c:2b:0a:5b:ac:f5:97:01:a2:9d:e1:4d: d4:e3:36:d7:cd:fb:5d:80:3b:f5:85:17:52:bb:68:5c: 1b:b3:83:ec:6d:01:81:9f:0a:c9:2b:d5:59:50:90:72: 7d:c9:f0:3b:8a:09:3e:0f:e0:ca:b4:bd:64:d9:80:84: 35:2b:84:45:20:0c:07:da:d5:4d:5f:41:74:48:c6:65: a5:70:18:8f:f5:3d:c5:b3:01:e1:c1:82:ca:4a:33:5d: b8:e8:72:16:34:4f:c5:d6:3f:c0:f0:a7:33:81:d1:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:f7:1e:89:e8:65:24:0f:1d:0d:bc:66:80:2e:a1:db: d5:41:cf:b2:03:38:b3:f7:44:9d:3b:10:f6:e9:f8:7c: 0d:67:15:2d:68:4f:c7:08:b3:0b:58:fd:93:44:fd:93: af:ed:28:bf:fa:45:17:5d:fb:d6:e7:db:de:31:bb:34: 65:36:f2:c3:27:6a:e0:f1:06:93:b8:a0:a7:f8:be:bb: ed:64:4b:d0:7f:8d:4d:9f:e6:9b:3c:c7:96:0b:5e:b0: fa:c0:cc:a8:ad:2d:ae:6d:c2:bc:0f:bf:b1:04:2a:cd: 58:30:23:21:8d:70:40:2f:d9:ba:01:0a:d5:88:49:a1: 90:c9:f6:ea:d5:7f:b1:d6:35:0a:27:06:56:57:6d:39: bc:84:8c:93:c1:27:07:4e:f5:7e:f5:38:7d:50:05:36: 2f:b3:39:11:ef:1e:49:8f:ef:f7:cd:f3:58:39:ff:d2: 73:36:ce:43:7b:9e:6a:7b:50:3c:e5:f0:c5:8c:b9:12: a6:53:d7:fc:52:0f:50:96:77:31:06:a1:fc:b7:26:1a: ac:ba:2d:6a:fd:b0:dc:29:e1:e2:f3:35:7a:11:37:05: 22:6c:73:da:0b:98:c9:83:c4:2b:f7:ca:43:57:0b:36: 52:13:48:12:ae:d7:d6:1c:8e:51:09:99:ff:e8:f1:7d Fingerprint (SHA-256): 38:11:1C:B9:EF:45:41:2D:78:E4:B5:38:7C:54:27:AB:3D:71:01:C5:B4:B4:55:03:DD:84:20:9D:68:1F:EB:55 Fingerprint (SHA1): 3F:46:93:3E:30:92:A8:5D:37:31:38:A0:4F:2A:55:01:82:4D:50:3E Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14141: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14142: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14143: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14144: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181873 (0x672b971) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 23:31:06 2016 Not After : Fri Jan 08 23:31:06 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:0c:52:e1:09:ea:8b:e4:fa:ff:40:60:b8:ae:f8:f2: ba:ba:26:a9:2a:1a:03:2d:ef:71:fe:1c:3e:65:fe:72: 59:d6:8d:7a:5b:ec:99:36:41:ce:64:43:1f:b4:99:58: ae:ce:d7:e9:0d:72:3b:19:b4:5e:89:ba:91:23:1d:23: 58:a1:c7:86:d3:fd:b8:1e:4f:f6:c1:2a:39:45:f7:34: c8:cd:31:72:26:35:7f:66:e2:ec:77:45:3e:3d:79:61: a1:b0:9d:80:32:69:01:90:36:53:f2:9e:ad:45:19:68: 2b:88:12:a2:03:44:e2:f9:9a:26:93:e4:51:cb:1e:32: e3:e9:03:75:69:08:e3:0d:16:00:3b:e3:bc:75:14:29: 3e:0d:67:8d:1c:2b:0a:5b:ac:f5:97:01:a2:9d:e1:4d: d4:e3:36:d7:cd:fb:5d:80:3b:f5:85:17:52:bb:68:5c: 1b:b3:83:ec:6d:01:81:9f:0a:c9:2b:d5:59:50:90:72: 7d:c9:f0:3b:8a:09:3e:0f:e0:ca:b4:bd:64:d9:80:84: 35:2b:84:45:20:0c:07:da:d5:4d:5f:41:74:48:c6:65: a5:70:18:8f:f5:3d:c5:b3:01:e1:c1:82:ca:4a:33:5d: b8:e8:72:16:34:4f:c5:d6:3f:c0:f0:a7:33:81:d1:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:f7:1e:89:e8:65:24:0f:1d:0d:bc:66:80:2e:a1:db: d5:41:cf:b2:03:38:b3:f7:44:9d:3b:10:f6:e9:f8:7c: 0d:67:15:2d:68:4f:c7:08:b3:0b:58:fd:93:44:fd:93: af:ed:28:bf:fa:45:17:5d:fb:d6:e7:db:de:31:bb:34: 65:36:f2:c3:27:6a:e0:f1:06:93:b8:a0:a7:f8:be:bb: ed:64:4b:d0:7f:8d:4d:9f:e6:9b:3c:c7:96:0b:5e:b0: fa:c0:cc:a8:ad:2d:ae:6d:c2:bc:0f:bf:b1:04:2a:cd: 58:30:23:21:8d:70:40:2f:d9:ba:01:0a:d5:88:49:a1: 90:c9:f6:ea:d5:7f:b1:d6:35:0a:27:06:56:57:6d:39: bc:84:8c:93:c1:27:07:4e:f5:7e:f5:38:7d:50:05:36: 2f:b3:39:11:ef:1e:49:8f:ef:f7:cd:f3:58:39:ff:d2: 73:36:ce:43:7b:9e:6a:7b:50:3c:e5:f0:c5:8c:b9:12: a6:53:d7:fc:52:0f:50:96:77:31:06:a1:fc:b7:26:1a: ac:ba:2d:6a:fd:b0:dc:29:e1:e2:f3:35:7a:11:37:05: 22:6c:73:da:0b:98:c9:83:c4:2b:f7:ca:43:57:0b:36: 52:13:48:12:ae:d7:d6:1c:8e:51:09:99:ff:e8:f1:7d Fingerprint (SHA-256): 38:11:1C:B9:EF:45:41:2D:78:E4:B5:38:7C:54:27:AB:3D:71:01:C5:B4:B4:55:03:DD:84:20:9D:68:1F:EB:55 Fingerprint (SHA1): 3F:46:93:3E:30:92:A8:5D:37:31:38:A0:4F:2A:55:01:82:4D:50:3E Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14145: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14146: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14147: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14148: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181873 (0x672b971) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 23:31:06 2016 Not After : Fri Jan 08 23:31:06 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:0c:52:e1:09:ea:8b:e4:fa:ff:40:60:b8:ae:f8:f2: ba:ba:26:a9:2a:1a:03:2d:ef:71:fe:1c:3e:65:fe:72: 59:d6:8d:7a:5b:ec:99:36:41:ce:64:43:1f:b4:99:58: ae:ce:d7:e9:0d:72:3b:19:b4:5e:89:ba:91:23:1d:23: 58:a1:c7:86:d3:fd:b8:1e:4f:f6:c1:2a:39:45:f7:34: c8:cd:31:72:26:35:7f:66:e2:ec:77:45:3e:3d:79:61: a1:b0:9d:80:32:69:01:90:36:53:f2:9e:ad:45:19:68: 2b:88:12:a2:03:44:e2:f9:9a:26:93:e4:51:cb:1e:32: e3:e9:03:75:69:08:e3:0d:16:00:3b:e3:bc:75:14:29: 3e:0d:67:8d:1c:2b:0a:5b:ac:f5:97:01:a2:9d:e1:4d: d4:e3:36:d7:cd:fb:5d:80:3b:f5:85:17:52:bb:68:5c: 1b:b3:83:ec:6d:01:81:9f:0a:c9:2b:d5:59:50:90:72: 7d:c9:f0:3b:8a:09:3e:0f:e0:ca:b4:bd:64:d9:80:84: 35:2b:84:45:20:0c:07:da:d5:4d:5f:41:74:48:c6:65: a5:70:18:8f:f5:3d:c5:b3:01:e1:c1:82:ca:4a:33:5d: b8:e8:72:16:34:4f:c5:d6:3f:c0:f0:a7:33:81:d1:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:f7:1e:89:e8:65:24:0f:1d:0d:bc:66:80:2e:a1:db: d5:41:cf:b2:03:38:b3:f7:44:9d:3b:10:f6:e9:f8:7c: 0d:67:15:2d:68:4f:c7:08:b3:0b:58:fd:93:44:fd:93: af:ed:28:bf:fa:45:17:5d:fb:d6:e7:db:de:31:bb:34: 65:36:f2:c3:27:6a:e0:f1:06:93:b8:a0:a7:f8:be:bb: ed:64:4b:d0:7f:8d:4d:9f:e6:9b:3c:c7:96:0b:5e:b0: fa:c0:cc:a8:ad:2d:ae:6d:c2:bc:0f:bf:b1:04:2a:cd: 58:30:23:21:8d:70:40:2f:d9:ba:01:0a:d5:88:49:a1: 90:c9:f6:ea:d5:7f:b1:d6:35:0a:27:06:56:57:6d:39: bc:84:8c:93:c1:27:07:4e:f5:7e:f5:38:7d:50:05:36: 2f:b3:39:11:ef:1e:49:8f:ef:f7:cd:f3:58:39:ff:d2: 73:36:ce:43:7b:9e:6a:7b:50:3c:e5:f0:c5:8c:b9:12: a6:53:d7:fc:52:0f:50:96:77:31:06:a1:fc:b7:26:1a: ac:ba:2d:6a:fd:b0:dc:29:e1:e2:f3:35:7a:11:37:05: 22:6c:73:da:0b:98:c9:83:c4:2b:f7:ca:43:57:0b:36: 52:13:48:12:ae:d7:d6:1c:8e:51:09:99:ff:e8:f1:7d Fingerprint (SHA-256): 38:11:1C:B9:EF:45:41:2D:78:E4:B5:38:7C:54:27:AB:3D:71:01:C5:B4:B4:55:03:DD:84:20:9D:68:1F:EB:55 Fingerprint (SHA1): 3F:46:93:3E:30:92:A8:5D:37:31:38:A0:4F:2A:55:01:82:4D:50:3E Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14149: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181873 (0x672b971) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 23:31:06 2016 Not After : Fri Jan 08 23:31:06 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:0c:52:e1:09:ea:8b:e4:fa:ff:40:60:b8:ae:f8:f2: ba:ba:26:a9:2a:1a:03:2d:ef:71:fe:1c:3e:65:fe:72: 59:d6:8d:7a:5b:ec:99:36:41:ce:64:43:1f:b4:99:58: ae:ce:d7:e9:0d:72:3b:19:b4:5e:89:ba:91:23:1d:23: 58:a1:c7:86:d3:fd:b8:1e:4f:f6:c1:2a:39:45:f7:34: c8:cd:31:72:26:35:7f:66:e2:ec:77:45:3e:3d:79:61: a1:b0:9d:80:32:69:01:90:36:53:f2:9e:ad:45:19:68: 2b:88:12:a2:03:44:e2:f9:9a:26:93:e4:51:cb:1e:32: e3:e9:03:75:69:08:e3:0d:16:00:3b:e3:bc:75:14:29: 3e:0d:67:8d:1c:2b:0a:5b:ac:f5:97:01:a2:9d:e1:4d: d4:e3:36:d7:cd:fb:5d:80:3b:f5:85:17:52:bb:68:5c: 1b:b3:83:ec:6d:01:81:9f:0a:c9:2b:d5:59:50:90:72: 7d:c9:f0:3b:8a:09:3e:0f:e0:ca:b4:bd:64:d9:80:84: 35:2b:84:45:20:0c:07:da:d5:4d:5f:41:74:48:c6:65: a5:70:18:8f:f5:3d:c5:b3:01:e1:c1:82:ca:4a:33:5d: b8:e8:72:16:34:4f:c5:d6:3f:c0:f0:a7:33:81:d1:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:f7:1e:89:e8:65:24:0f:1d:0d:bc:66:80:2e:a1:db: d5:41:cf:b2:03:38:b3:f7:44:9d:3b:10:f6:e9:f8:7c: 0d:67:15:2d:68:4f:c7:08:b3:0b:58:fd:93:44:fd:93: af:ed:28:bf:fa:45:17:5d:fb:d6:e7:db:de:31:bb:34: 65:36:f2:c3:27:6a:e0:f1:06:93:b8:a0:a7:f8:be:bb: ed:64:4b:d0:7f:8d:4d:9f:e6:9b:3c:c7:96:0b:5e:b0: fa:c0:cc:a8:ad:2d:ae:6d:c2:bc:0f:bf:b1:04:2a:cd: 58:30:23:21:8d:70:40:2f:d9:ba:01:0a:d5:88:49:a1: 90:c9:f6:ea:d5:7f:b1:d6:35:0a:27:06:56:57:6d:39: bc:84:8c:93:c1:27:07:4e:f5:7e:f5:38:7d:50:05:36: 2f:b3:39:11:ef:1e:49:8f:ef:f7:cd:f3:58:39:ff:d2: 73:36:ce:43:7b:9e:6a:7b:50:3c:e5:f0:c5:8c:b9:12: a6:53:d7:fc:52:0f:50:96:77:31:06:a1:fc:b7:26:1a: ac:ba:2d:6a:fd:b0:dc:29:e1:e2:f3:35:7a:11:37:05: 22:6c:73:da:0b:98:c9:83:c4:2b:f7:ca:43:57:0b:36: 52:13:48:12:ae:d7:d6:1c:8e:51:09:99:ff:e8:f1:7d Fingerprint (SHA-256): 38:11:1C:B9:EF:45:41:2D:78:E4:B5:38:7C:54:27:AB:3D:71:01:C5:B4:B4:55:03:DD:84:20:9D:68:1F:EB:55 Fingerprint (SHA1): 3F:46:93:3E:30:92:A8:5D:37:31:38:A0:4F:2A:55:01:82:4D:50:3E Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14150: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14151: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181873 (0x672b971) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 23:31:06 2016 Not After : Fri Jan 08 23:31:06 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:0c:52:e1:09:ea:8b:e4:fa:ff:40:60:b8:ae:f8:f2: ba:ba:26:a9:2a:1a:03:2d:ef:71:fe:1c:3e:65:fe:72: 59:d6:8d:7a:5b:ec:99:36:41:ce:64:43:1f:b4:99:58: ae:ce:d7:e9:0d:72:3b:19:b4:5e:89:ba:91:23:1d:23: 58:a1:c7:86:d3:fd:b8:1e:4f:f6:c1:2a:39:45:f7:34: c8:cd:31:72:26:35:7f:66:e2:ec:77:45:3e:3d:79:61: a1:b0:9d:80:32:69:01:90:36:53:f2:9e:ad:45:19:68: 2b:88:12:a2:03:44:e2:f9:9a:26:93:e4:51:cb:1e:32: e3:e9:03:75:69:08:e3:0d:16:00:3b:e3:bc:75:14:29: 3e:0d:67:8d:1c:2b:0a:5b:ac:f5:97:01:a2:9d:e1:4d: d4:e3:36:d7:cd:fb:5d:80:3b:f5:85:17:52:bb:68:5c: 1b:b3:83:ec:6d:01:81:9f:0a:c9:2b:d5:59:50:90:72: 7d:c9:f0:3b:8a:09:3e:0f:e0:ca:b4:bd:64:d9:80:84: 35:2b:84:45:20:0c:07:da:d5:4d:5f:41:74:48:c6:65: a5:70:18:8f:f5:3d:c5:b3:01:e1:c1:82:ca:4a:33:5d: b8:e8:72:16:34:4f:c5:d6:3f:c0:f0:a7:33:81:d1:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:f7:1e:89:e8:65:24:0f:1d:0d:bc:66:80:2e:a1:db: d5:41:cf:b2:03:38:b3:f7:44:9d:3b:10:f6:e9:f8:7c: 0d:67:15:2d:68:4f:c7:08:b3:0b:58:fd:93:44:fd:93: af:ed:28:bf:fa:45:17:5d:fb:d6:e7:db:de:31:bb:34: 65:36:f2:c3:27:6a:e0:f1:06:93:b8:a0:a7:f8:be:bb: ed:64:4b:d0:7f:8d:4d:9f:e6:9b:3c:c7:96:0b:5e:b0: fa:c0:cc:a8:ad:2d:ae:6d:c2:bc:0f:bf:b1:04:2a:cd: 58:30:23:21:8d:70:40:2f:d9:ba:01:0a:d5:88:49:a1: 90:c9:f6:ea:d5:7f:b1:d6:35:0a:27:06:56:57:6d:39: bc:84:8c:93:c1:27:07:4e:f5:7e:f5:38:7d:50:05:36: 2f:b3:39:11:ef:1e:49:8f:ef:f7:cd:f3:58:39:ff:d2: 73:36:ce:43:7b:9e:6a:7b:50:3c:e5:f0:c5:8c:b9:12: a6:53:d7:fc:52:0f:50:96:77:31:06:a1:fc:b7:26:1a: ac:ba:2d:6a:fd:b0:dc:29:e1:e2:f3:35:7a:11:37:05: 22:6c:73:da:0b:98:c9:83:c4:2b:f7:ca:43:57:0b:36: 52:13:48:12:ae:d7:d6:1c:8e:51:09:99:ff:e8:f1:7d Fingerprint (SHA-256): 38:11:1C:B9:EF:45:41:2D:78:E4:B5:38:7C:54:27:AB:3D:71:01:C5:B4:B4:55:03:DD:84:20:9D:68:1F:EB:55 Fingerprint (SHA1): 3F:46:93:3E:30:92:A8:5D:37:31:38:A0:4F:2A:55:01:82:4D:50:3E Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14152: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14153: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14154: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14155: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181873 (0x672b971) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 23:31:06 2016 Not After : Fri Jan 08 23:31:06 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:0c:52:e1:09:ea:8b:e4:fa:ff:40:60:b8:ae:f8:f2: ba:ba:26:a9:2a:1a:03:2d:ef:71:fe:1c:3e:65:fe:72: 59:d6:8d:7a:5b:ec:99:36:41:ce:64:43:1f:b4:99:58: ae:ce:d7:e9:0d:72:3b:19:b4:5e:89:ba:91:23:1d:23: 58:a1:c7:86:d3:fd:b8:1e:4f:f6:c1:2a:39:45:f7:34: c8:cd:31:72:26:35:7f:66:e2:ec:77:45:3e:3d:79:61: a1:b0:9d:80:32:69:01:90:36:53:f2:9e:ad:45:19:68: 2b:88:12:a2:03:44:e2:f9:9a:26:93:e4:51:cb:1e:32: e3:e9:03:75:69:08:e3:0d:16:00:3b:e3:bc:75:14:29: 3e:0d:67:8d:1c:2b:0a:5b:ac:f5:97:01:a2:9d:e1:4d: d4:e3:36:d7:cd:fb:5d:80:3b:f5:85:17:52:bb:68:5c: 1b:b3:83:ec:6d:01:81:9f:0a:c9:2b:d5:59:50:90:72: 7d:c9:f0:3b:8a:09:3e:0f:e0:ca:b4:bd:64:d9:80:84: 35:2b:84:45:20:0c:07:da:d5:4d:5f:41:74:48:c6:65: a5:70:18:8f:f5:3d:c5:b3:01:e1:c1:82:ca:4a:33:5d: b8:e8:72:16:34:4f:c5:d6:3f:c0:f0:a7:33:81:d1:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:f7:1e:89:e8:65:24:0f:1d:0d:bc:66:80:2e:a1:db: d5:41:cf:b2:03:38:b3:f7:44:9d:3b:10:f6:e9:f8:7c: 0d:67:15:2d:68:4f:c7:08:b3:0b:58:fd:93:44:fd:93: af:ed:28:bf:fa:45:17:5d:fb:d6:e7:db:de:31:bb:34: 65:36:f2:c3:27:6a:e0:f1:06:93:b8:a0:a7:f8:be:bb: ed:64:4b:d0:7f:8d:4d:9f:e6:9b:3c:c7:96:0b:5e:b0: fa:c0:cc:a8:ad:2d:ae:6d:c2:bc:0f:bf:b1:04:2a:cd: 58:30:23:21:8d:70:40:2f:d9:ba:01:0a:d5:88:49:a1: 90:c9:f6:ea:d5:7f:b1:d6:35:0a:27:06:56:57:6d:39: bc:84:8c:93:c1:27:07:4e:f5:7e:f5:38:7d:50:05:36: 2f:b3:39:11:ef:1e:49:8f:ef:f7:cd:f3:58:39:ff:d2: 73:36:ce:43:7b:9e:6a:7b:50:3c:e5:f0:c5:8c:b9:12: a6:53:d7:fc:52:0f:50:96:77:31:06:a1:fc:b7:26:1a: ac:ba:2d:6a:fd:b0:dc:29:e1:e2:f3:35:7a:11:37:05: 22:6c:73:da:0b:98:c9:83:c4:2b:f7:ca:43:57:0b:36: 52:13:48:12:ae:d7:d6:1c:8e:51:09:99:ff:e8:f1:7d Fingerprint (SHA-256): 38:11:1C:B9:EF:45:41:2D:78:E4:B5:38:7C:54:27:AB:3D:71:01:C5:B4:B4:55:03:DD:84:20:9D:68:1F:EB:55 Fingerprint (SHA1): 3F:46:93:3E:30:92:A8:5D:37:31:38:A0:4F:2A:55:01:82:4D:50:3E Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14156: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181873 (0x672b971) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 23:31:06 2016 Not After : Fri Jan 08 23:31:06 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:0c:52:e1:09:ea:8b:e4:fa:ff:40:60:b8:ae:f8:f2: ba:ba:26:a9:2a:1a:03:2d:ef:71:fe:1c:3e:65:fe:72: 59:d6:8d:7a:5b:ec:99:36:41:ce:64:43:1f:b4:99:58: ae:ce:d7:e9:0d:72:3b:19:b4:5e:89:ba:91:23:1d:23: 58:a1:c7:86:d3:fd:b8:1e:4f:f6:c1:2a:39:45:f7:34: c8:cd:31:72:26:35:7f:66:e2:ec:77:45:3e:3d:79:61: a1:b0:9d:80:32:69:01:90:36:53:f2:9e:ad:45:19:68: 2b:88:12:a2:03:44:e2:f9:9a:26:93:e4:51:cb:1e:32: e3:e9:03:75:69:08:e3:0d:16:00:3b:e3:bc:75:14:29: 3e:0d:67:8d:1c:2b:0a:5b:ac:f5:97:01:a2:9d:e1:4d: d4:e3:36:d7:cd:fb:5d:80:3b:f5:85:17:52:bb:68:5c: 1b:b3:83:ec:6d:01:81:9f:0a:c9:2b:d5:59:50:90:72: 7d:c9:f0:3b:8a:09:3e:0f:e0:ca:b4:bd:64:d9:80:84: 35:2b:84:45:20:0c:07:da:d5:4d:5f:41:74:48:c6:65: a5:70:18:8f:f5:3d:c5:b3:01:e1:c1:82:ca:4a:33:5d: b8:e8:72:16:34:4f:c5:d6:3f:c0:f0:a7:33:81:d1:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:f7:1e:89:e8:65:24:0f:1d:0d:bc:66:80:2e:a1:db: d5:41:cf:b2:03:38:b3:f7:44:9d:3b:10:f6:e9:f8:7c: 0d:67:15:2d:68:4f:c7:08:b3:0b:58:fd:93:44:fd:93: af:ed:28:bf:fa:45:17:5d:fb:d6:e7:db:de:31:bb:34: 65:36:f2:c3:27:6a:e0:f1:06:93:b8:a0:a7:f8:be:bb: ed:64:4b:d0:7f:8d:4d:9f:e6:9b:3c:c7:96:0b:5e:b0: fa:c0:cc:a8:ad:2d:ae:6d:c2:bc:0f:bf:b1:04:2a:cd: 58:30:23:21:8d:70:40:2f:d9:ba:01:0a:d5:88:49:a1: 90:c9:f6:ea:d5:7f:b1:d6:35:0a:27:06:56:57:6d:39: bc:84:8c:93:c1:27:07:4e:f5:7e:f5:38:7d:50:05:36: 2f:b3:39:11:ef:1e:49:8f:ef:f7:cd:f3:58:39:ff:d2: 73:36:ce:43:7b:9e:6a:7b:50:3c:e5:f0:c5:8c:b9:12: a6:53:d7:fc:52:0f:50:96:77:31:06:a1:fc:b7:26:1a: ac:ba:2d:6a:fd:b0:dc:29:e1:e2:f3:35:7a:11:37:05: 22:6c:73:da:0b:98:c9:83:c4:2b:f7:ca:43:57:0b:36: 52:13:48:12:ae:d7:d6:1c:8e:51:09:99:ff:e8:f1:7d Fingerprint (SHA-256): 38:11:1C:B9:EF:45:41:2D:78:E4:B5:38:7C:54:27:AB:3D:71:01:C5:B4:B4:55:03:DD:84:20:9D:68:1F:EB:55 Fingerprint (SHA1): 3F:46:93:3E:30:92:A8:5D:37:31:38:A0:4F:2A:55:01:82:4D:50:3E Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #14157: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181873 (0x672b971) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 23:31:06 2016 Not After : Fri Jan 08 23:31:06 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:0c:52:e1:09:ea:8b:e4:fa:ff:40:60:b8:ae:f8:f2: ba:ba:26:a9:2a:1a:03:2d:ef:71:fe:1c:3e:65:fe:72: 59:d6:8d:7a:5b:ec:99:36:41:ce:64:43:1f:b4:99:58: ae:ce:d7:e9:0d:72:3b:19:b4:5e:89:ba:91:23:1d:23: 58:a1:c7:86:d3:fd:b8:1e:4f:f6:c1:2a:39:45:f7:34: c8:cd:31:72:26:35:7f:66:e2:ec:77:45:3e:3d:79:61: a1:b0:9d:80:32:69:01:90:36:53:f2:9e:ad:45:19:68: 2b:88:12:a2:03:44:e2:f9:9a:26:93:e4:51:cb:1e:32: e3:e9:03:75:69:08:e3:0d:16:00:3b:e3:bc:75:14:29: 3e:0d:67:8d:1c:2b:0a:5b:ac:f5:97:01:a2:9d:e1:4d: d4:e3:36:d7:cd:fb:5d:80:3b:f5:85:17:52:bb:68:5c: 1b:b3:83:ec:6d:01:81:9f:0a:c9:2b:d5:59:50:90:72: 7d:c9:f0:3b:8a:09:3e:0f:e0:ca:b4:bd:64:d9:80:84: 35:2b:84:45:20:0c:07:da:d5:4d:5f:41:74:48:c6:65: a5:70:18:8f:f5:3d:c5:b3:01:e1:c1:82:ca:4a:33:5d: b8:e8:72:16:34:4f:c5:d6:3f:c0:f0:a7:33:81:d1:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:f7:1e:89:e8:65:24:0f:1d:0d:bc:66:80:2e:a1:db: d5:41:cf:b2:03:38:b3:f7:44:9d:3b:10:f6:e9:f8:7c: 0d:67:15:2d:68:4f:c7:08:b3:0b:58:fd:93:44:fd:93: af:ed:28:bf:fa:45:17:5d:fb:d6:e7:db:de:31:bb:34: 65:36:f2:c3:27:6a:e0:f1:06:93:b8:a0:a7:f8:be:bb: ed:64:4b:d0:7f:8d:4d:9f:e6:9b:3c:c7:96:0b:5e:b0: fa:c0:cc:a8:ad:2d:ae:6d:c2:bc:0f:bf:b1:04:2a:cd: 58:30:23:21:8d:70:40:2f:d9:ba:01:0a:d5:88:49:a1: 90:c9:f6:ea:d5:7f:b1:d6:35:0a:27:06:56:57:6d:39: bc:84:8c:93:c1:27:07:4e:f5:7e:f5:38:7d:50:05:36: 2f:b3:39:11:ef:1e:49:8f:ef:f7:cd:f3:58:39:ff:d2: 73:36:ce:43:7b:9e:6a:7b:50:3c:e5:f0:c5:8c:b9:12: a6:53:d7:fc:52:0f:50:96:77:31:06:a1:fc:b7:26:1a: ac:ba:2d:6a:fd:b0:dc:29:e1:e2:f3:35:7a:11:37:05: 22:6c:73:da:0b:98:c9:83:c4:2b:f7:ca:43:57:0b:36: 52:13:48:12:ae:d7:d6:1c:8e:51:09:99:ff:e8:f1:7d Fingerprint (SHA-256): 38:11:1C:B9:EF:45:41:2D:78:E4:B5:38:7C:54:27:AB:3D:71:01:C5:B4:B4:55:03:DD:84:20:9D:68:1F:EB:55 Fingerprint (SHA1): 3F:46:93:3E:30:92:A8:5D:37:31:38:A0:4F:2A:55:01:82:4D:50:3E Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #14158: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181873 (0x672b971) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 23:31:06 2016 Not After : Fri Jan 08 23:31:06 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:0c:52:e1:09:ea:8b:e4:fa:ff:40:60:b8:ae:f8:f2: ba:ba:26:a9:2a:1a:03:2d:ef:71:fe:1c:3e:65:fe:72: 59:d6:8d:7a:5b:ec:99:36:41:ce:64:43:1f:b4:99:58: ae:ce:d7:e9:0d:72:3b:19:b4:5e:89:ba:91:23:1d:23: 58:a1:c7:86:d3:fd:b8:1e:4f:f6:c1:2a:39:45:f7:34: c8:cd:31:72:26:35:7f:66:e2:ec:77:45:3e:3d:79:61: a1:b0:9d:80:32:69:01:90:36:53:f2:9e:ad:45:19:68: 2b:88:12:a2:03:44:e2:f9:9a:26:93:e4:51:cb:1e:32: e3:e9:03:75:69:08:e3:0d:16:00:3b:e3:bc:75:14:29: 3e:0d:67:8d:1c:2b:0a:5b:ac:f5:97:01:a2:9d:e1:4d: d4:e3:36:d7:cd:fb:5d:80:3b:f5:85:17:52:bb:68:5c: 1b:b3:83:ec:6d:01:81:9f:0a:c9:2b:d5:59:50:90:72: 7d:c9:f0:3b:8a:09:3e:0f:e0:ca:b4:bd:64:d9:80:84: 35:2b:84:45:20:0c:07:da:d5:4d:5f:41:74:48:c6:65: a5:70:18:8f:f5:3d:c5:b3:01:e1:c1:82:ca:4a:33:5d: b8:e8:72:16:34:4f:c5:d6:3f:c0:f0:a7:33:81:d1:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:f7:1e:89:e8:65:24:0f:1d:0d:bc:66:80:2e:a1:db: d5:41:cf:b2:03:38:b3:f7:44:9d:3b:10:f6:e9:f8:7c: 0d:67:15:2d:68:4f:c7:08:b3:0b:58:fd:93:44:fd:93: af:ed:28:bf:fa:45:17:5d:fb:d6:e7:db:de:31:bb:34: 65:36:f2:c3:27:6a:e0:f1:06:93:b8:a0:a7:f8:be:bb: ed:64:4b:d0:7f:8d:4d:9f:e6:9b:3c:c7:96:0b:5e:b0: fa:c0:cc:a8:ad:2d:ae:6d:c2:bc:0f:bf:b1:04:2a:cd: 58:30:23:21:8d:70:40:2f:d9:ba:01:0a:d5:88:49:a1: 90:c9:f6:ea:d5:7f:b1:d6:35:0a:27:06:56:57:6d:39: bc:84:8c:93:c1:27:07:4e:f5:7e:f5:38:7d:50:05:36: 2f:b3:39:11:ef:1e:49:8f:ef:f7:cd:f3:58:39:ff:d2: 73:36:ce:43:7b:9e:6a:7b:50:3c:e5:f0:c5:8c:b9:12: a6:53:d7:fc:52:0f:50:96:77:31:06:a1:fc:b7:26:1a: ac:ba:2d:6a:fd:b0:dc:29:e1:e2:f3:35:7a:11:37:05: 22:6c:73:da:0b:98:c9:83:c4:2b:f7:ca:43:57:0b:36: 52:13:48:12:ae:d7:d6:1c:8e:51:09:99:ff:e8:f1:7d Fingerprint (SHA-256): 38:11:1C:B9:EF:45:41:2D:78:E4:B5:38:7C:54:27:AB:3D:71:01:C5:B4:B4:55:03:DD:84:20:9D:68:1F:EB:55 Fingerprint (SHA1): 3F:46:93:3E:30:92:A8:5D:37:31:38:A0:4F:2A:55:01:82:4D:50:3E Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #14159: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181873 (0x672b971) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 23:31:06 2016 Not After : Fri Jan 08 23:31:06 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:0c:52:e1:09:ea:8b:e4:fa:ff:40:60:b8:ae:f8:f2: ba:ba:26:a9:2a:1a:03:2d:ef:71:fe:1c:3e:65:fe:72: 59:d6:8d:7a:5b:ec:99:36:41:ce:64:43:1f:b4:99:58: ae:ce:d7:e9:0d:72:3b:19:b4:5e:89:ba:91:23:1d:23: 58:a1:c7:86:d3:fd:b8:1e:4f:f6:c1:2a:39:45:f7:34: c8:cd:31:72:26:35:7f:66:e2:ec:77:45:3e:3d:79:61: a1:b0:9d:80:32:69:01:90:36:53:f2:9e:ad:45:19:68: 2b:88:12:a2:03:44:e2:f9:9a:26:93:e4:51:cb:1e:32: e3:e9:03:75:69:08:e3:0d:16:00:3b:e3:bc:75:14:29: 3e:0d:67:8d:1c:2b:0a:5b:ac:f5:97:01:a2:9d:e1:4d: d4:e3:36:d7:cd:fb:5d:80:3b:f5:85:17:52:bb:68:5c: 1b:b3:83:ec:6d:01:81:9f:0a:c9:2b:d5:59:50:90:72: 7d:c9:f0:3b:8a:09:3e:0f:e0:ca:b4:bd:64:d9:80:84: 35:2b:84:45:20:0c:07:da:d5:4d:5f:41:74:48:c6:65: a5:70:18:8f:f5:3d:c5:b3:01:e1:c1:82:ca:4a:33:5d: b8:e8:72:16:34:4f:c5:d6:3f:c0:f0:a7:33:81:d1:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:f7:1e:89:e8:65:24:0f:1d:0d:bc:66:80:2e:a1:db: d5:41:cf:b2:03:38:b3:f7:44:9d:3b:10:f6:e9:f8:7c: 0d:67:15:2d:68:4f:c7:08:b3:0b:58:fd:93:44:fd:93: af:ed:28:bf:fa:45:17:5d:fb:d6:e7:db:de:31:bb:34: 65:36:f2:c3:27:6a:e0:f1:06:93:b8:a0:a7:f8:be:bb: ed:64:4b:d0:7f:8d:4d:9f:e6:9b:3c:c7:96:0b:5e:b0: fa:c0:cc:a8:ad:2d:ae:6d:c2:bc:0f:bf:b1:04:2a:cd: 58:30:23:21:8d:70:40:2f:d9:ba:01:0a:d5:88:49:a1: 90:c9:f6:ea:d5:7f:b1:d6:35:0a:27:06:56:57:6d:39: bc:84:8c:93:c1:27:07:4e:f5:7e:f5:38:7d:50:05:36: 2f:b3:39:11:ef:1e:49:8f:ef:f7:cd:f3:58:39:ff:d2: 73:36:ce:43:7b:9e:6a:7b:50:3c:e5:f0:c5:8c:b9:12: a6:53:d7:fc:52:0f:50:96:77:31:06:a1:fc:b7:26:1a: ac:ba:2d:6a:fd:b0:dc:29:e1:e2:f3:35:7a:11:37:05: 22:6c:73:da:0b:98:c9:83:c4:2b:f7:ca:43:57:0b:36: 52:13:48:12:ae:d7:d6:1c:8e:51:09:99:ff:e8:f1:7d Fingerprint (SHA-256): 38:11:1C:B9:EF:45:41:2D:78:E4:B5:38:7C:54:27:AB:3D:71:01:C5:B4:B4:55:03:DD:84:20:9D:68:1F:EB:55 Fingerprint (SHA1): 3F:46:93:3E:30:92:A8:5D:37:31:38:A0:4F:2A:55:01:82:4D:50:3E Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #14160: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181873 (0x672b971) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 23:31:06 2016 Not After : Fri Jan 08 23:31:06 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:0c:52:e1:09:ea:8b:e4:fa:ff:40:60:b8:ae:f8:f2: ba:ba:26:a9:2a:1a:03:2d:ef:71:fe:1c:3e:65:fe:72: 59:d6:8d:7a:5b:ec:99:36:41:ce:64:43:1f:b4:99:58: ae:ce:d7:e9:0d:72:3b:19:b4:5e:89:ba:91:23:1d:23: 58:a1:c7:86:d3:fd:b8:1e:4f:f6:c1:2a:39:45:f7:34: c8:cd:31:72:26:35:7f:66:e2:ec:77:45:3e:3d:79:61: a1:b0:9d:80:32:69:01:90:36:53:f2:9e:ad:45:19:68: 2b:88:12:a2:03:44:e2:f9:9a:26:93:e4:51:cb:1e:32: e3:e9:03:75:69:08:e3:0d:16:00:3b:e3:bc:75:14:29: 3e:0d:67:8d:1c:2b:0a:5b:ac:f5:97:01:a2:9d:e1:4d: d4:e3:36:d7:cd:fb:5d:80:3b:f5:85:17:52:bb:68:5c: 1b:b3:83:ec:6d:01:81:9f:0a:c9:2b:d5:59:50:90:72: 7d:c9:f0:3b:8a:09:3e:0f:e0:ca:b4:bd:64:d9:80:84: 35:2b:84:45:20:0c:07:da:d5:4d:5f:41:74:48:c6:65: a5:70:18:8f:f5:3d:c5:b3:01:e1:c1:82:ca:4a:33:5d: b8:e8:72:16:34:4f:c5:d6:3f:c0:f0:a7:33:81:d1:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:f7:1e:89:e8:65:24:0f:1d:0d:bc:66:80:2e:a1:db: d5:41:cf:b2:03:38:b3:f7:44:9d:3b:10:f6:e9:f8:7c: 0d:67:15:2d:68:4f:c7:08:b3:0b:58:fd:93:44:fd:93: af:ed:28:bf:fa:45:17:5d:fb:d6:e7:db:de:31:bb:34: 65:36:f2:c3:27:6a:e0:f1:06:93:b8:a0:a7:f8:be:bb: ed:64:4b:d0:7f:8d:4d:9f:e6:9b:3c:c7:96:0b:5e:b0: fa:c0:cc:a8:ad:2d:ae:6d:c2:bc:0f:bf:b1:04:2a:cd: 58:30:23:21:8d:70:40:2f:d9:ba:01:0a:d5:88:49:a1: 90:c9:f6:ea:d5:7f:b1:d6:35:0a:27:06:56:57:6d:39: bc:84:8c:93:c1:27:07:4e:f5:7e:f5:38:7d:50:05:36: 2f:b3:39:11:ef:1e:49:8f:ef:f7:cd:f3:58:39:ff:d2: 73:36:ce:43:7b:9e:6a:7b:50:3c:e5:f0:c5:8c:b9:12: a6:53:d7:fc:52:0f:50:96:77:31:06:a1:fc:b7:26:1a: ac:ba:2d:6a:fd:b0:dc:29:e1:e2:f3:35:7a:11:37:05: 22:6c:73:da:0b:98:c9:83:c4:2b:f7:ca:43:57:0b:36: 52:13:48:12:ae:d7:d6:1c:8e:51:09:99:ff:e8:f1:7d Fingerprint (SHA-256): 38:11:1C:B9:EF:45:41:2D:78:E4:B5:38:7C:54:27:AB:3D:71:01:C5:B4:B4:55:03:DD:84:20:9D:68:1F:EB:55 Fingerprint (SHA1): 3F:46:93:3E:30:92:A8:5D:37:31:38:A0:4F:2A:55:01:82:4D:50:3E Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #14161: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14162: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #14163: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181903 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14164: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #14165: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #14166: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14167: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 108181904 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14168: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14169: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #14170: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14171: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 108181905 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14172: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14173: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #14174: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14175: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 108181906 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14176: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14177: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #14178: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14179: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 108181907 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14180: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14181: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #14182: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14183: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 108181908 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14184: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14185: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #14186: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14187: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 108181909 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14188: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14189: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14190: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181903 (0x672b98f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:37:14 2016 Not After : Fri Jan 08 23:37:14 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:69:bd:03:20:37:59:7c:c0:4b:ad:4b:6a:cb:c2:66: 09:31:ed:74:03:9a:3b:72:44:39:20:8e:80:00:d7:7f: 5c:f8:13:fa:46:0c:60:4a:39:5b:cd:86:76:86:a1:ab: 8e:72:09:06:03:9d:e8:de:a0:25:7a:b6:3d:82:3b:7c: e4:ae:49:28:36:b8:25:37:93:9e:c1:1f:a2:c3:79:df: 17:52:de:fb:e5:f9:67:0f:fc:4e:c5:95:16:30:ba:0c: 6d:38:1d:03:60:53:a6:91:8f:9e:9c:0f:c5:80:ff:51: 9b:2c:9f:c9:7f:0a:d7:25:b0:d1:52:66:60:e2:da:2d: e0:0d:d8:c3:d0:da:8e:81:fd:04:85:53:f0:09:ba:38: 82:42:d5:3f:e0:a9:b9:55:da:d0:7c:aa:4c:b8:fc:7e: 24:0e:e3:87:3d:42:87:f2:31:5d:dd:78:4e:e4:ae:23: 35:8c:8e:70:7e:91:44:b4:c0:7b:b2:6f:d1:9c:8a:c3: f6:76:f7:dc:20:0e:3d:fb:fa:56:c0:9d:19:42:69:a6: f1:33:fc:27:b0:c1:a9:e3:e0:aa:24:39:c2:04:24:ac: 06:56:03:03:d1:61:87:09:e0:07:86:45:9f:8c:b5:e6: fc:e2:38:1b:03:5b:ac:df:fa:a1:ff:a7:cc:ca:02:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:98:4e:41:31:f1:38:8d:cc:63:d1:92:77:e5:7c:46: 04:e3:2f:1a:f1:4d:d7:ac:a7:9d:7e:05:b1:60:e0:68: c1:63:15:b2:73:01:34:a1:94:93:03:36:34:0c:76:54: 60:c6:d4:86:db:47:fa:f6:31:80:23:56:92:94:15:17: 1c:03:2a:6d:92:24:11:eb:04:71:34:57:c0:19:80:47: d3:05:a8:a9:11:38:0e:55:a1:38:fd:6f:4b:a4:2d:3a: 05:2e:64:dd:18:61:6e:25:f5:85:2f:38:31:fc:46:db: 56:2a:07:d8:d4:ea:1a:70:83:b3:49:fa:3a:c2:23:0a: de:bd:c7:99:d5:91:30:3d:2f:55:df:3e:26:e7:e0:0a: 3e:6d:58:8e:23:55:0f:87:71:f9:25:49:3e:76:e3:06: 85:97:ce:ce:c2:11:f5:88:d9:59:77:2f:a8:1f:21:a1: ce:b3:03:b7:70:a8:5e:e3:0f:0f:91:9c:09:92:16:83: 95:f0:15:da:f1:35:92:7c:06:eb:09:5b:1c:be:90:c9: 18:16:16:91:b8:0c:c1:08:e5:a6:6e:8f:01:7e:ca:d1: 71:a6:4e:da:f6:09:6f:b6:f7:1b:52:1e:91:1b:5c:2f: 5b:cb:02:bf:c2:77:83:bf:45:b1:67:d7:10:3a:3d:4d Fingerprint (SHA-256): 53:30:AB:DD:1B:1F:24:1E:0F:97:C3:7F:FB:84:4A:5C:60:A9:B2:AC:77:90:F8:4E:8B:E5:3F:25:09:5C:29:CD Fingerprint (SHA1): 34:A8:1E:0C:37:9B:82:58:49:65:B7:F3:F4:1E:46:06:CB:4B:BE:8F Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #14191: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14192: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14193: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #14194: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181903 (0x672b98f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:37:14 2016 Not After : Fri Jan 08 23:37:14 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:69:bd:03:20:37:59:7c:c0:4b:ad:4b:6a:cb:c2:66: 09:31:ed:74:03:9a:3b:72:44:39:20:8e:80:00:d7:7f: 5c:f8:13:fa:46:0c:60:4a:39:5b:cd:86:76:86:a1:ab: 8e:72:09:06:03:9d:e8:de:a0:25:7a:b6:3d:82:3b:7c: e4:ae:49:28:36:b8:25:37:93:9e:c1:1f:a2:c3:79:df: 17:52:de:fb:e5:f9:67:0f:fc:4e:c5:95:16:30:ba:0c: 6d:38:1d:03:60:53:a6:91:8f:9e:9c:0f:c5:80:ff:51: 9b:2c:9f:c9:7f:0a:d7:25:b0:d1:52:66:60:e2:da:2d: e0:0d:d8:c3:d0:da:8e:81:fd:04:85:53:f0:09:ba:38: 82:42:d5:3f:e0:a9:b9:55:da:d0:7c:aa:4c:b8:fc:7e: 24:0e:e3:87:3d:42:87:f2:31:5d:dd:78:4e:e4:ae:23: 35:8c:8e:70:7e:91:44:b4:c0:7b:b2:6f:d1:9c:8a:c3: f6:76:f7:dc:20:0e:3d:fb:fa:56:c0:9d:19:42:69:a6: f1:33:fc:27:b0:c1:a9:e3:e0:aa:24:39:c2:04:24:ac: 06:56:03:03:d1:61:87:09:e0:07:86:45:9f:8c:b5:e6: fc:e2:38:1b:03:5b:ac:df:fa:a1:ff:a7:cc:ca:02:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:98:4e:41:31:f1:38:8d:cc:63:d1:92:77:e5:7c:46: 04:e3:2f:1a:f1:4d:d7:ac:a7:9d:7e:05:b1:60:e0:68: c1:63:15:b2:73:01:34:a1:94:93:03:36:34:0c:76:54: 60:c6:d4:86:db:47:fa:f6:31:80:23:56:92:94:15:17: 1c:03:2a:6d:92:24:11:eb:04:71:34:57:c0:19:80:47: d3:05:a8:a9:11:38:0e:55:a1:38:fd:6f:4b:a4:2d:3a: 05:2e:64:dd:18:61:6e:25:f5:85:2f:38:31:fc:46:db: 56:2a:07:d8:d4:ea:1a:70:83:b3:49:fa:3a:c2:23:0a: de:bd:c7:99:d5:91:30:3d:2f:55:df:3e:26:e7:e0:0a: 3e:6d:58:8e:23:55:0f:87:71:f9:25:49:3e:76:e3:06: 85:97:ce:ce:c2:11:f5:88:d9:59:77:2f:a8:1f:21:a1: ce:b3:03:b7:70:a8:5e:e3:0f:0f:91:9c:09:92:16:83: 95:f0:15:da:f1:35:92:7c:06:eb:09:5b:1c:be:90:c9: 18:16:16:91:b8:0c:c1:08:e5:a6:6e:8f:01:7e:ca:d1: 71:a6:4e:da:f6:09:6f:b6:f7:1b:52:1e:91:1b:5c:2f: 5b:cb:02:bf:c2:77:83:bf:45:b1:67:d7:10:3a:3d:4d Fingerprint (SHA-256): 53:30:AB:DD:1B:1F:24:1E:0F:97:C3:7F:FB:84:4A:5C:60:A9:B2:AC:77:90:F8:4E:8B:E5:3F:25:09:5C:29:CD Fingerprint (SHA1): 34:A8:1E:0C:37:9B:82:58:49:65:B7:F3:F4:1E:46:06:CB:4B:BE:8F Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #14195: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14196: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14197: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #14198: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181910 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14199: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #14200: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14201: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14202: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108181911 --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #14203: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14204: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14205: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14206: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108181912 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14207: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14208: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #14209: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14210: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108181913 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14211: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14212: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14213: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #14214: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #14215: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #14216: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181910 (0x672b996) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:38:38 2016 Not After : Fri Jan 08 23:38:38 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:86:d8:f6:2a:81:9c:4b:d8:b3:ad:e2:f3:93:5f:12: b2:45:ed:76:48:58:66:78:4b:5d:e3:ca:c1:18:83:48: 47:49:40:eb:37:d8:3a:eb:ec:49:a9:61:b1:cd:c7:c2: ea:e2:1c:bf:28:ff:6d:83:c2:16:07:25:af:38:af:f7: 73:51:85:67:42:e4:48:44:4d:5e:84:0b:37:93:3c:3f: f9:4e:eb:95:b7:b5:3a:82:8e:b5:a7:57:48:28:75:3f: 9b:6a:31:84:ba:06:9d:b3:83:ea:9b:f0:5f:7d:1d:59: f1:de:09:ca:b8:dd:40:10:65:e3:a6:d6:d0:b9:e2:d5: 26:2f:23:f4:b6:a1:13:b7:be:9f:70:60:2c:c9:8c:f9: bb:05:10:f6:e5:67:35:c7:fa:0c:6c:69:88:ed:d9:f7: b0:fb:4e:46:ef:cb:18:af:00:72:cb:d3:26:84:90:1e: 1c:e8:24:84:d7:ea:d2:48:0c:0c:60:37:7b:f1:7f:52: 3a:4a:d4:13:e4:cf:a1:b0:cd:3b:c4:61:6e:b8:6a:a7: cd:f3:49:9e:af:f5:40:62:51:c8:3f:41:0b:d9:ba:27: e5:d4:f4:32:e0:60:04:7e:7c:51:da:16:b1:2f:81:80: 83:88:03:f3:c6:23:e6:e1:ee:08:12:78:d2:c8:0d:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:39:23:d8:5a:1a:b3:24:6b:45:54:22:4d:0d:b0:21: 4d:4e:a3:c0:9d:63:9d:14:28:dd:d8:6f:2c:d6:ee:ab: ba:89:f4:7a:40:a1:2f:f4:ab:1c:78:8a:b0:92:51:3b: 16:60:6b:f1:09:78:33:d1:61:43:e7:41:5d:1a:f7:5d: c2:45:67:3d:8c:29:16:d9:2c:17:b9:3c:f7:b0:cb:96: 43:21:10:c8:05:ec:30:fb:28:3c:94:8f:f9:b9:a4:4d: 8d:fe:74:0f:27:d7:26:dd:54:30:af:cf:0b:78:77:da: 9f:44:a2:aa:e7:f2:7a:f0:a5:2c:e8:bd:ed:82:e7:94: ec:95:f9:0b:a8:1b:69:2b:14:6c:51:23:e7:68:20:96: da:80:c4:1f:ca:8b:e0:cb:47:97:65:ea:4d:b8:47:b2: ac:40:f4:7d:43:5d:e4:03:45:e4:e2:91:cb:12:a2:98: a5:7c:4e:4d:31:b5:7d:66:d0:00:e6:fd:7f:3b:04:5f: 7c:15:23:74:fd:58:91:6f:61:b1:b5:bc:b6:8a:dc:b6: 82:d6:6a:a0:1b:16:55:2b:92:ea:73:b6:d6:05:7e:78: 9d:b1:cb:74:6e:30:c4:44:55:aa:5c:6c:5e:f5:97:27: 4e:0c:04:e8:28:8f:5f:52:9a:a6:19:b8:6c:b5:59:7d Fingerprint (SHA-256): A4:8A:30:9C:20:73:F4:C2:47:8C:31:01:C3:D9:3B:90:16:48:BB:E3:9E:EA:1F:03:60:D5:66:3E:E7:F5:A9:A8 Fingerprint (SHA1): 03:09:2A:90:85:F2:60:87:F1:8B:8C:06:D7:C6:CB:43:67:E8:D1:09 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14217: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14218: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14219: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181911 (0x672b997) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:38:45 2016 Not After : Fri Jan 08 23:38:45 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:3f:fc:63:72:96:04:4d:41:30:a6:8e:e0:25:b0:6c: 80:8f:6d:aa:1c:a1:85:86:6a:61:75:42:78:d7:50:f9: fd:11:b3:22:eb:d0:43:fe:eb:3b:6b:16:d9:0a:e6:f4: bd:98:95:37:9c:3f:bf:3d:c7:33:53:fe:77:ce:58:eb: bc:0d:51:33:67:08:39:f2:49:2a:78:b4:ef:c5:bc:0b: 72:e3:1f:c1:d7:0c:15:e0:d8:6d:83:5a:8c:43:21:43: 01:13:60:be:34:11:8c:56:23:ad:40:e7:61:7a:b2:f7: a4:af:e9:b2:4e:a4:57:e9:f6:a1:16:41:61:5f:7d:09: be:6a:34:f6:41:96:b6:c4:b7:77:bd:1e:d1:06:70:85: b4:16:01:02:45:18:5b:da:9c:d6:41:2a:bd:41:44:e8: ce:b2:1b:48:8d:cd:13:e6:67:74:ca:dc:c2:08:a3:d9: 3d:19:9a:76:83:41:2e:9f:f4:0a:d1:5f:f4:e1:5a:09: 09:65:74:ff:73:c5:8e:77:3c:a8:22:18:55:4d:fb:1f: 7c:9e:f2:44:e8:27:3c:d2:09:16:2d:45:33:1e:d0:b4: 95:5a:8c:0d:b1:02:f0:31:f6:fb:33:a2:d2:fc:1d:f4: 59:e6:75:85:ac:8d:29:43:eb:6e:6f:1b:77:d1:0d:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:c7:0d:ed:e2:39:a6:fe:50:87:9c:99:68:30:10:01: 90:15:0b:e0:02:ba:c2:39:98:c8:9a:91:a6:3f:9d:71: 32:14:e4:3f:d2:57:b5:87:67:5a:a9:2a:9d:02:20:5e: d8:05:d6:81:ae:8e:b9:65:76:6d:6f:4c:ae:d2:f9:3f: ab:02:28:e7:9c:91:07:01:72:e3:07:de:81:b7:77:bc: 9f:9e:08:11:41:b1:36:4e:be:dd:da:51:d8:c6:b2:ae: 30:ae:f4:59:cc:b5:55:02:94:19:a9:95:93:b5:79:9f: 80:4c:c2:27:30:2b:c6:27:48:02:8b:1a:21:f8:0f:27: ef:d7:a8:70:32:5e:8f:22:ad:e5:2a:b9:7a:d7:be:d5: 82:6d:8d:33:ad:54:68:b2:90:88:1b:ab:e6:98:11:78: c1:57:f6:1d:51:c6:a3:03:2e:1d:22:93:c4:cc:bc:11: f0:f4:f6:00:1f:be:0d:bf:8a:4b:b3:5c:5d:7c:e9:8f: 96:60:59:b5:fc:9a:2e:3e:23:ec:85:5e:15:5b:c7:2e: ba:b9:4e:5e:c6:bc:7e:b5:e8:58:fc:09:e6:17:24:66: be:71:18:b3:a5:5b:12:84:b1:7b:8e:e7:35:22:af:e8: 51:7d:85:b8:c6:46:7c:ab:aa:20:a8:a2:14:86:7d:24 Fingerprint (SHA-256): 93:C1:21:67:C3:0E:8F:63:1A:E2:54:31:4D:C3:18:AA:F2:24:C2:08:98:43:B8:88:DE:AC:50:02:7B:04:71:BC Fingerprint (SHA1): 5D:D7:A8:5B:1B:CA:F3:89:46:0A:06:31:4B:C2:0A:80:21:3C:F2:07 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14220: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14221: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181912 (0x672b998) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 23:39:08 2016 Not After : Fri Jan 08 23:39:08 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:28:f0:9c:14:7b:b2:02:c0:2c:58:a0:3c:47:b8:0f: e1:94:0c:4f:81:f8:d1:55:57:9c:36:63:d5:93:80:4d: 2a:82:75:1d:cd:b7:75:3d:de:4f:db:04:e0:68:ec:7b: ce:95:1a:b7:c3:ef:a9:f0:3e:22:32:c4:bb:3f:5a:67: 3c:c7:04:59:01:75:4d:c3:91:f4:dc:a4:80:ff:13:1f: cd:04:87:13:1c:5d:02:6f:1d:b1:cd:9a:87:4f:01:ac: 53:52:2c:18:d8:00:c9:ca:cd:61:67:8f:fa:33:39:88: 9f:3f:43:ec:03:e5:aa:f5:54:27:df:c1:dc:29:f1:93: 78:f9:11:99:23:6a:31:07:7a:21:b5:70:ab:21:93:85: dc:cd:78:d2:23:a6:62:08:d5:bc:32:8d:d7:39:b7:0b: 8a:1f:49:e5:a2:3f:eb:55:13:fb:95:ed:4c:2c:76:a8: c6:a3:c7:43:eb:c7:29:9e:cb:4d:ef:57:b0:f6:30:b5: da:6a:d0:1c:06:36:56:de:9e:60:d0:6b:3f:4d:9c:e1: 6b:f9:da:71:80:7d:65:33:1f:21:70:0c:c2:b3:9f:70: 1e:f4:5b:ba:b7:0a:90:e9:5b:5f:c4:a0:82:bf:2b:6d: 3e:5d:20:30:e2:9c:74:a4:b1:1f:11:cc:1b:36:ce:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a7:2f:a6:1e:26:60:72:8c:b9:5d:fd:ff:72:be:d4:79: cc:f8:c4:29:13:6b:ee:1f:e9:5f:d4:f4:19:10:ca:c7: 4a:ba:d9:92:58:a8:e2:87:32:a9:b3:99:f3:0f:05:c5: c6:d4:f7:2d:5b:ce:c6:f3:a9:5a:6e:9e:bb:e0:92:0d: ac:be:65:c5:78:54:c1:60:6c:8a:b3:4f:b6:31:8d:31: f6:1e:44:eb:e3:61:e2:d8:86:17:d6:f3:81:dc:f8:2a: b4:bc:d9:5f:f4:a8:2e:af:64:5c:14:06:44:f8:10:aa: e3:bd:13:d8:bc:2d:c3:5d:59:aa:59:49:2c:a5:d7:12: 49:e8:80:15:10:8a:65:ae:77:8e:66:17:b1:32:1b:79: 0d:ac:ab:06:05:9b:68:b6:dc:4b:66:99:70:42:a6:72: 48:e7:63:9a:6a:ea:d8:9e:60:c8:9e:61:23:d7:b4:fd: 33:24:9c:7b:25:09:fa:c8:62:c0:fc:cb:b4:bf:68:29: 87:e0:bf:1f:07:54:fe:c8:ec:27:18:7b:02:ff:cc:15: c2:a2:2e:e6:9d:10:33:f1:2f:0e:f9:a0:34:2e:ed:09: d1:77:10:20:d9:37:1e:79:cd:b2:88:11:bc:f8:19:46: d9:29:29:70:e5:f6:50:37:d3:2e:29:66:5c:53:92:ae Fingerprint (SHA-256): E1:9E:03:C3:E7:41:A9:DC:5C:1A:79:2B:AC:C8:D3:CE:02:B5:8F:42:21:ED:C2:11:41:DF:6E:F1:79:3F:18:C0 Fingerprint (SHA1): 66:E8:BE:B1:CA:53:11:35:CE:1A:BA:3E:7F:86:8C:38:B9:FC:FF:FE Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #14222: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #14223: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181914 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14224: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #14225: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14226: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14227: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108181915 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14228: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14229: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14230: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14231: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108181916 --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #14232: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14233: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #14234: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14235: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 108181917 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14236: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14237: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #14238: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14239: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 108181918 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14240: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14241: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14242: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #14243: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #14244: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #14245: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #14246: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181914 (0x672b99a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:39:42 2016 Not After : Fri Jan 08 23:39:42 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:f3:eb:0d:a7:c9:15:71:06:ed:0f:89:44:7d:ac:44: ab:ad:a1:68:43:cd:df:4d:25:58:56:d2:ed:70:6b:15: b4:1a:e3:f4:96:f0:64:b1:96:07:44:c9:6b:35:f3:a7: 3b:09:b3:13:1e:fe:19:62:aa:5a:00:53:ba:bb:eb:93: eb:9b:10:53:9b:53:8b:98:9b:85:2e:31:69:83:db:e5: 2e:60:f0:6c:b9:bb:13:d1:b5:be:cf:5a:8f:bb:f0:be: ed:f6:c0:0b:a9:ac:3b:16:ef:1c:99:bd:fb:02:c8:c1: 0e:de:30:6b:3c:c1:c7:8d:99:4e:5d:46:69:e4:86:5e: 5e:ec:02:03:32:d3:65:54:3f:88:73:69:2c:61:a3:76: c0:91:45:9e:7b:8b:02:fd:69:dd:24:ba:86:fe:30:aa: 39:51:8f:8d:16:39:b4:d7:41:71:d5:45:82:a9:ba:67: 73:3a:b3:00:19:20:67:59:72:2c:89:6b:14:1f:2f:a8: 6d:2f:15:8c:f4:97:c2:57:84:d2:ed:3b:02:c6:e2:51: 06:11:c1:a9:d6:3b:65:c9:64:90:a4:49:0f:ae:14:20: db:98:21:65:ed:9c:bf:8d:a0:45:25:3a:e2:82:1b:95: 02:e4:6c:f3:82:50:a5:8f:26:d8:83:a5:20:eb:2e:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:3b:44:5a:d8:47:ea:c4:a0:17:0e:4c:6a:b9:74:ce: 03:99:01:8b:4c:09:87:34:e2:76:c0:d2:0a:c7:f9:15: 76:4f:e0:77:02:b9:7d:6c:17:c8:8d:6a:bc:61:b8:e5: 1f:08:d5:a8:f4:7e:a3:0e:73:5b:0e:d0:2e:d5:77:ad: 2d:6e:9d:01:d6:5a:db:e7:19:4c:30:69:8b:94:64:53: 64:c8:b1:c8:8c:d7:0c:99:8e:1c:ef:46:56:eb:90:84: bd:54:a6:60:e5:fa:cc:de:05:74:22:4b:d7:26:40:44: 3b:72:2d:33:b5:fa:47:2d:d4:bd:56:3b:60:9e:ad:19: 7f:dd:80:93:07:8b:94:58:92:30:26:b2:a0:64:eb:db: 94:05:7d:9a:e1:97:f6:a0:8b:65:c4:5d:ff:8f:1d:e5: f2:25:32:76:36:cb:ad:e5:86:c1:f4:c7:eb:4f:e0:ec: e0:f0:7e:9a:c8:8a:c6:0e:05:68:be:4d:41:19:1c:68: b3:ba:c7:0e:4e:71:73:73:c3:21:45:14:4e:88:89:7d: d1:98:de:f4:4e:1c:d1:a7:c7:6f:56:2f:a9:4b:58:10: 3f:e9:95:20:f7:22:8a:66:71:2f:a4:f8:46:fc:5f:4a: d3:09:c8:13:4b:76:88:85:db:74:07:e9:3e:9d:e8:98 Fingerprint (SHA-256): E5:1F:26:E5:81:EF:5E:A4:CC:32:C1:73:A8:CF:4B:39:29:F1:4F:A0:3D:AD:E8:41:F6:50:A4:D2:60:DC:72:1C Fingerprint (SHA1): 98:22:E2:A7:B2:17:5C:13:0A:19:E6:8C:DB:29:31:82:C1:DD:DF:47 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14247: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14248: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181915 (0x672b99b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:40:11 2016 Not After : Fri Jan 08 23:40:11 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:23:43:53:46:54:8a:e1:7d:bc:53:ff:ca:09:f2:f6: 32:93:b7:cb:73:7a:96:51:ef:98:f1:30:27:e9:59:d8: 9d:4a:f4:a6:57:ab:0a:5f:49:cd:a7:c0:5e:15:98:73: dd:1d:6e:5a:54:5a:e6:e0:9f:a6:44:a8:02:fa:9b:77: c2:69:9b:5e:25:6e:73:21:b1:58:5a:a8:80:e7:23:73: 3f:83:56:fb:26:d7:f1:58:5c:b8:d8:3d:01:f1:c9:b8: aa:72:d8:1e:2c:1c:1b:d2:5c:33:05:dc:d5:15:03:77: da:52:34:bd:7e:cd:27:1e:bd:ff:eb:de:ad:19:3e:d6: 0e:05:94:df:ea:a5:bb:4f:dd:56:7a:fd:3b:d3:42:8d: b4:46:09:86:32:e5:9e:0e:b3:fb:2f:e4:f8:8e:88:b8: 39:c0:47:8e:fb:c4:0c:f6:51:46:32:72:05:b1:2d:46: bb:89:f4:26:13:86:ae:3f:c9:a0:4a:0c:86:0a:8e:06: 21:f1:a4:8f:b7:68:57:1f:1b:89:f7:1c:96:33:66:ac: 82:36:e9:6d:38:ac:e9:87:77:6f:2d:e0:f0:32:de:eb: 96:ba:0a:24:2e:5b:9a:c5:90:b4:cb:b1:9a:ff:b3:22: 6e:90:ae:19:5d:a3:39:55:89:63:94:15:42:a6:70:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:20:91:6b:fb:a6:f3:1d:71:02:2c:5c:26:00:0f:8e: 7e:96:2a:0f:04:c2:e0:1b:79:84:2c:25:56:23:31:03: a8:77:2d:12:2a:62:37:db:f0:30:29:9f:3e:7f:1f:29: a8:f8:44:4d:85:b3:27:8a:85:58:fe:af:31:e2:77:21: 91:14:38:e6:7d:eb:e1:db:e4:f0:c6:92:9a:d6:83:0c: c6:a8:c8:2f:49:3c:24:e5:51:d6:a5:be:7d:bc:b6:a2: cf:d4:e4:7f:9a:8d:c8:ec:bf:93:11:cb:ee:ac:c8:8f: 6c:d3:e5:56:cf:fe:8c:09:9d:94:f0:9c:c5:98:38:8c: 04:e9:a6:11:7a:4b:46:d9:9f:fd:74:1e:df:5c:f5:b5: 6c:6c:11:d0:40:24:28:59:c4:70:8b:5c:73:4d:42:47: b3:5d:fe:38:30:02:93:d7:7c:de:63:73:5a:4b:4e:28: 3c:88:4e:f3:e4:fb:30:c0:03:1a:9e:6e:7a:ef:9e:56: e1:c3:b8:d3:35:99:54:12:b1:52:8f:d5:62:f6:8e:b7: 6f:92:ea:cd:20:93:70:63:40:de:89:a1:8d:bd:4a:77: 62:3f:52:1e:f0:74:71:34:45:41:b2:a6:86:98:6b:99: 7b:b1:c1:95:19:23:4d:7d:8f:3b:db:39:0d:04:8a:84 Fingerprint (SHA-256): 85:1F:1B:FB:76:E7:29:42:8B:FB:62:0D:7F:B1:55:6B:14:E9:B5:F9:84:6C:6A:18:97:EC:F7:5C:6C:18:DA:6E Fingerprint (SHA1): 5D:B0:7F:B6:C9:A1:C8:47:61:7C:6B:11:9E:AD:6A:1F:8C:E8:C5:D2 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14249: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14250: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14251: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181916 (0x672b99c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 23:40:21 2016 Not After : Fri Jan 08 23:40:21 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:09:9d:a7:23:20:cb:21:7a:19:0c:43:99:39:d8:d7: 9c:ab:a8:b8:3b:28:71:66:db:c7:b5:19:34:54:f3:cf: cf:23:3f:38:7a:07:ba:c2:7c:d2:14:6b:e7:36:2b:7c: fe:9b:19:9f:63:13:d1:ce:1a:2b:b2:62:1f:2f:a6:da: 29:1f:7f:67:61:89:0d:ae:40:bb:c1:e8:ff:3c:38:95: 6f:06:e7:41:22:7f:17:7f:42:89:f1:8b:e9:e2:ad:11: 94:bd:62:d9:1b:07:98:84:44:34:9c:5d:05:1d:41:3a: d9:23:7b:c4:b5:87:a4:67:c7:d9:74:1d:b6:15:27:06: 55:a7:2c:fe:86:ba:4f:49:d3:b7:5e:87:87:0e:96:6f: 32:74:98:27:81:85:cf:05:55:66:60:c5:ea:04:a7:77: 49:d5:6a:98:cb:e9:7e:59:e0:fc:27:76:bb:c8:53:b8: 99:25:3f:46:81:4d:2d:bc:b3:5a:7d:57:a1:f2:43:b4: d8:ed:d5:da:a3:d4:bc:30:90:55:b8:d1:82:9d:41:b6: 7a:d1:e9:6b:ba:4a:f5:f0:86:e0:1c:ea:cd:e7:a5:df: 19:6b:36:ed:09:94:c7:a8:7f:dd:41:ad:11:90:0b:ae: 16:50:d7:c7:2f:c4:83:ee:87:0e:ad:6b:de:a8:c6:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0f:cd:fb:3e:5e:88:b1:48:68:cf:5d:1a:5c:7e:22:f9: b0:71:5e:4b:a7:ac:ee:f8:c6:66:a1:c5:a6:a5:73:38: 9c:10:d0:54:66:52:87:75:02:8f:e7:df:1b:fa:b0:db: 09:8e:cd:18:5e:4a:d9:7f:14:84:cb:9a:80:1b:5c:cb: 59:71:8d:bf:54:3e:f8:ec:8c:48:89:a2:99:08:4f:5b: 9c:74:aa:ce:98:37:70:c8:90:1a:d8:05:c3:0f:9e:f5: 5e:44:e4:85:bc:27:75:9e:66:2a:ba:7e:1c:30:71:77: e8:8c:2c:96:aa:7f:fe:54:19:cd:86:98:22:98:d3:16: ee:c2:59:8e:c7:b5:e9:1d:97:d5:65:a3:8f:50:ec:7f: 9c:c2:f3:6d:de:81:14:54:25:04:4f:c5:64:d3:f2:dc: 5c:71:9b:15:9a:ab:1d:c6:04:62:b0:9f:4e:1d:af:9b: 42:74:04:87:f7:36:d9:37:66:70:00:e0:28:ed:28:35: 91:6d:60:c1:6d:2c:02:6d:e0:ba:19:e8:c5:da:a4:2f: e8:db:0f:bf:91:4e:1d:81:f9:55:e8:86:d2:28:80:48: a4:ad:b2:5b:6e:71:21:a0:1a:f0:44:cd:01:83:87:f8: d8:0e:dc:99:4e:50:66:16:9d:ab:55:0e:6f:a3:88:a9 Fingerprint (SHA-256): 85:17:55:47:4F:B8:AA:01:DA:3A:36:E5:25:0B:A3:3E:F1:98:FB:55:66:8C:24:FD:CE:5B:F9:69:9A:A6:91:D1 Fingerprint (SHA1): C1:36:E9:2A:75:19:DD:1F:C1:58:B2:5E:A1:06:CF:EC:2D:28:2C:8A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #14252: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #14253: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181919 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14254: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #14255: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14256: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14257: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108181920 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14258: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14259: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14260: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14261: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108181921 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA1Root-108181828.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #14262: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14263: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #14264: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14265: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108181922 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14266: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14267: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #14268: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181919 (0x672b99f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:40:53 2016 Not After : Fri Jan 08 23:40:53 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:e4:19:8c:b3:64:c6:76:39:74:dd:0e:16:d8:4e:b9: 03:7b:18:92:44:53:a2:d8:97:89:3a:6e:9a:34:86:db: ca:8d:a4:6e:c3:f4:c8:26:6b:38:d9:b9:b7:97:78:2c: cd:9b:46:9b:7d:45:13:32:de:95:14:6a:0b:71:bd:d9: e1:b4:7b:79:d0:1d:54:af:8f:86:aa:8e:86:8f:96:78: 1c:74:f9:c5:83:22:41:4e:13:4f:23:77:01:78:1e:fe: ff:ee:5c:d8:86:15:f2:ee:63:62:a8:e3:58:a0:40:d5: 0d:62:79:19:39:ce:7e:46:1f:35:c4:69:45:c5:0b:3d: 10:9d:49:4b:61:37:76:16:0e:9b:4e:26:e3:ae:b0:53: 5d:e2:56:22:f3:42:c9:81:8d:d0:18:73:ad:61:b5:24: 31:e2:f1:5e:8d:1a:19:ea:ee:67:49:00:cf:ea:95:68: 15:74:78:3a:e6:ad:65:5e:db:ee:4d:1f:53:9c:e4:0f: 3b:c9:a1:8e:36:5e:d3:60:07:bf:14:1a:cd:d0:f8:99: 80:85:d6:f6:b1:94:7a:3b:dd:11:74:c1:93:27:5a:2b: 18:89:5b:40:a9:c9:a6:51:46:74:77:4e:4b:11:97:a5: 25:b2:56:68:10:ce:cd:f7:64:d2:0f:a9:14:24:99:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c0:4b:a3:d8:8a:68:e6:c8:27:01:3e:70:c1:36:02:bf: f4:88:30:76:62:11:1d:dc:31:83:f3:fb:c1:ac:76:3a: 85:47:43:e9:bd:8a:82:8f:59:92:ab:dc:07:45:5f:49: 16:12:ab:be:e4:cd:e3:6b:ce:5d:ae:93:ca:f3:fb:1f: b6:97:4a:89:95:3a:db:f3:41:e6:a6:e6:e3:38:4d:99: a6:7b:55:d5:7d:05:51:21:8a:4e:13:04:cd:0d:3c:82: e0:6d:31:4d:10:ac:3e:f8:7b:77:cf:7c:16:de:c5:82: 1e:63:eb:4e:9b:2a:bc:a9:be:68:6d:fd:91:f1:dc:36: ec:9a:f5:0d:72:7c:73:fc:c3:e9:40:e4:ed:23:84:d2: 3d:fc:b7:49:47:7e:7b:7a:b1:d2:23:8e:49:d8:b2:37: 61:89:b2:97:af:11:c7:3a:3a:39:20:9a:f0:fd:39:1a: 40:c8:72:58:11:5c:6c:6c:ec:2e:f9:ae:f9:92:b5:00: ad:92:f3:3a:df:9a:5c:36:5c:f8:3a:50:1b:80:15:33: 07:01:4f:4d:ac:53:88:46:3b:cc:53:c9:09:57:33:47: 56:0e:29:8d:93:58:be:70:60:67:9d:f0:16:cd:b5:c1: f7:5f:04:4e:39:ef:d0:bd:7d:b1:bb:cd:b7:32:88:5d Fingerprint (SHA-256): DA:19:94:03:D5:00:34:0B:4D:CC:EC:ED:D5:17:74:CF:25:66:75:42:58:E6:46:5D:01:4A:1A:AC:0F:3B:EE:CC Fingerprint (SHA1): CE:FA:08:A0:B3:DD:09:F7:EB:3B:85:8A:63:90:EC:03:A8:D5:79:1E Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14269: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #14270: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181923 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14271: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #14272: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #14273: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181924 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14274: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #14275: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #14276: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14277: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108181925 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14278: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14279: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108181926 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14280: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14281: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #14282: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14283: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14284: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108181927 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-Bridge-108181829.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #14285: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14286: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #14287: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14288: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108181928 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14289: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14290: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #14291: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181923 (0x672b9a3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 23:41:39 2016 Not After : Fri Jan 08 23:41:39 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:ff:ae:d0:c6:d3:3d:e1:59:01:5d:a5:c8:0e:86:96: 90:55:4c:91:e8:58:3c:b2:ec:3b:c9:04:53:76:41:8c: 5d:56:a6:50:8c:d3:ba:ee:64:58:91:e8:9d:d5:dc:f8: 3d:9e:ef:3f:8c:20:9c:93:5d:a1:18:cc:ce:8d:fa:7c: 8e:59:bf:e1:cd:be:12:43:48:fa:f0:a1:99:c4:91:d4: 69:59:b6:b3:d3:f6:71:e7:b4:f6:38:49:28:30:0b:78: 3a:29:b8:09:b0:00:ab:04:91:a8:4f:52:8d:7a:0e:ef: 59:45:fb:df:3a:a6:e1:5a:2b:fe:0c:5f:d5:a3:93:df: b2:0e:85:62:e8:e4:61:f7:11:2d:af:5c:f7:50:e3:36: 80:d4:13:58:8e:24:67:06:95:22:36:47:ab:4c:2a:99: 0d:57:f7:98:e6:5c:fa:12:ff:96:05:1c:5f:b8:1b:4e: 78:2c:cb:22:56:5f:28:5d:c6:4a:ba:f6:8b:3e:07:b2: ce:8f:e7:16:fd:1b:1c:18:b0:2b:16:36:07:89:af:e3: 2a:4c:0f:11:6a:bf:44:c0:c6:69:ad:c9:80:74:34:f7: 46:7d:6d:5c:28:83:61:fc:c5:f4:5a:3a:9b:ef:99:a8: 30:46:78:3a:1d:51:51:5c:ec:e6:40:5a:44:16:20:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:53:1f:b8:d5:35:ba:7c:4a:cb:f2:7c:71:87:a9:27: f7:11:f4:8d:41:75:40:ee:3c:3b:80:6c:26:2c:bd:21: 82:2e:91:bb:b4:0f:3c:90:56:d4:eb:cb:75:33:a8:29: ea:da:81:88:99:5e:bf:9a:f1:17:87:cc:45:a3:23:3a: b6:f3:55:c9:3b:6a:45:39:54:d4:33:07:64:e9:a8:44: 84:00:57:e1:17:10:84:12:52:ee:43:c9:96:b5:db:7f: 91:89:99:cd:87:e1:a2:87:63:3f:b5:e6:0f:1b:05:53: 31:5a:53:6c:e6:eb:90:69:e2:c1:f5:b6:0a:d9:61:9d: 2d:fc:22:00:cf:ff:4d:30:c7:a5:3f:87:02:0d:e4:d7: fc:b1:83:86:f1:38:cf:74:f9:1d:bf:1b:88:46:2e:79: fe:ec:a4:64:69:a1:83:87:d7:e4:39:e7:3e:b6:f3:74: c9:69:8e:7e:93:be:1c:ad:15:c0:45:ed:4a:23:66:df: b1:11:29:78:92:be:21:1e:c3:99:fe:92:d1:7a:c1:c9: ce:4d:91:eb:c3:01:a3:67:ff:f4:07:7a:a3:61:12:6c: 18:58:9b:44:fd:02:fa:06:a6:fd:4d:b5:d9:1d:ac:05: be:b2:0a:83:76:1a:b6:02:30:81:56:e1:83:e4:a5:d9 Fingerprint (SHA-256): 3B:D1:62:90:13:EC:C5:40:CA:D3:90:1F:3B:DD:50:EB:9B:F4:42:EE:E9:29:81:5B:5D:7F:2A:86:BC:6D:40:75 Fingerprint (SHA1): F0:37:F3:95:71:9D:8E:54:F2:B3:26:9D:A4:9D:71:AE:81:BD:9E:34 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14292: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181924 (0x672b9a4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 23:41:52 2016 Not After : Fri Jan 08 23:41:52 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:19:b7:67:60:51:02:ca:c6:41:5a:bc:10:81:ff:ce: 1f:a8:d1:60:bf:3b:81:0e:0a:22:7a:c6:37:0d:8a:90: f5:22:84:0e:23:c3:81:16:b7:5b:f6:33:31:7b:c0:f2: e6:90:f8:d1:3b:a0:a1:1e:a8:05:78:99:1b:17:19:b3: 49:29:01:68:0d:d7:0e:90:5d:83:35:1b:ae:a1:80:3b: f4:e0:30:88:1c:8e:25:34:cf:2d:da:1f:59:ee:41:92: 7e:90:67:92:e7:35:a9:12:c7:1a:10:4c:76:ca:56:63: 2a:c6:7c:65:a5:5b:f3:b6:7e:58:d0:e6:08:34:fa:c3: 2a:5b:d1:26:f6:5c:b6:82:fe:44:09:94:a6:3f:5c:ca: 96:54:2b:c2:69:fd:d9:51:79:7b:54:2b:44:25:e3:15: c7:bf:9e:87:47:70:fd:95:24:57:fd:d4:df:9c:ce:d5: b8:0b:b7:ac:86:b7:37:b9:bb:0d:1c:53:77:09:82:b5: ba:23:38:94:ca:41:a3:8d:da:12:72:e5:5f:f3:07:4f: 42:01:b6:e3:21:f6:f6:15:3f:a5:a4:a7:22:ca:dd:e8: 26:47:e6:06:d9:d5:a8:62:7e:bc:59:17:84:03:ee:5b: e2:dd:f2:ed:62:00:6d:1c:cf:da:f7:15:fb:97:0e:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:7e:88:13:5f:4d:96:1c:46:46:d3:03:e6:79:1a:fc: 1d:76:c5:22:d5:aa:3a:5c:26:aa:3c:d2:32:c6:de:1c: f5:bd:27:91:00:03:28:c5:17:1a:de:5d:ce:40:fc:2c: a1:73:be:ee:db:7f:a4:b3:ab:83:d0:a7:22:07:85:21: c7:fb:d6:5d:ce:5c:ce:b8:c5:cc:38:d6:97:eb:2c:75: db:cc:2b:8e:98:29:35:e4:0a:44:5e:ac:51:97:ca:78: 7d:fb:6d:eb:97:3d:a0:a6:8a:11:72:27:18:54:ba:9d: a8:91:d6:8f:47:e9:65:80:6e:ef:7d:d5:c7:e1:97:67: a1:13:ac:c6:74:28:91:70:ff:e5:39:22:ab:d2:a2:fe: 02:2d:be:a6:67:d5:c9:57:3d:d0:58:ea:37:47:6f:fb: fe:36:10:31:20:66:c3:39:a1:db:ae:93:5e:dd:e0:be: 14:74:59:b2:3b:00:2e:8b:9b:9f:c7:fb:a3:10:12:58: 63:c3:c7:a2:70:bf:b5:22:61:7b:f0:70:f3:21:0e:9d: 80:c4:17:7a:2f:05:7f:48:78:83:0f:61:ea:77:fa:e8: a2:07:cc:84:6f:3c:b4:a7:d7:a3:b9:b1:c4:06:8a:90: f5:b9:3c:72:6a:53:0e:50:df:aa:5f:6f:c4:5a:50:ec Fingerprint (SHA-256): 6D:87:EB:D3:D6:F5:19:15:22:39:C7:08:49:6D:FF:C1:80:82:50:A7:31:B0:C4:EF:2D:8C:D3:65:10:10:B8:B6 Fingerprint (SHA1): 3D:17:89:B8:1B:41:73:62:5B:49:4F:45:ED:69:DD:0B:40:21:D7:FB Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14293: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181924 (0x672b9a4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 23:41:52 2016 Not After : Fri Jan 08 23:41:52 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:19:b7:67:60:51:02:ca:c6:41:5a:bc:10:81:ff:ce: 1f:a8:d1:60:bf:3b:81:0e:0a:22:7a:c6:37:0d:8a:90: f5:22:84:0e:23:c3:81:16:b7:5b:f6:33:31:7b:c0:f2: e6:90:f8:d1:3b:a0:a1:1e:a8:05:78:99:1b:17:19:b3: 49:29:01:68:0d:d7:0e:90:5d:83:35:1b:ae:a1:80:3b: f4:e0:30:88:1c:8e:25:34:cf:2d:da:1f:59:ee:41:92: 7e:90:67:92:e7:35:a9:12:c7:1a:10:4c:76:ca:56:63: 2a:c6:7c:65:a5:5b:f3:b6:7e:58:d0:e6:08:34:fa:c3: 2a:5b:d1:26:f6:5c:b6:82:fe:44:09:94:a6:3f:5c:ca: 96:54:2b:c2:69:fd:d9:51:79:7b:54:2b:44:25:e3:15: c7:bf:9e:87:47:70:fd:95:24:57:fd:d4:df:9c:ce:d5: b8:0b:b7:ac:86:b7:37:b9:bb:0d:1c:53:77:09:82:b5: ba:23:38:94:ca:41:a3:8d:da:12:72:e5:5f:f3:07:4f: 42:01:b6:e3:21:f6:f6:15:3f:a5:a4:a7:22:ca:dd:e8: 26:47:e6:06:d9:d5:a8:62:7e:bc:59:17:84:03:ee:5b: e2:dd:f2:ed:62:00:6d:1c:cf:da:f7:15:fb:97:0e:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:7e:88:13:5f:4d:96:1c:46:46:d3:03:e6:79:1a:fc: 1d:76:c5:22:d5:aa:3a:5c:26:aa:3c:d2:32:c6:de:1c: f5:bd:27:91:00:03:28:c5:17:1a:de:5d:ce:40:fc:2c: a1:73:be:ee:db:7f:a4:b3:ab:83:d0:a7:22:07:85:21: c7:fb:d6:5d:ce:5c:ce:b8:c5:cc:38:d6:97:eb:2c:75: db:cc:2b:8e:98:29:35:e4:0a:44:5e:ac:51:97:ca:78: 7d:fb:6d:eb:97:3d:a0:a6:8a:11:72:27:18:54:ba:9d: a8:91:d6:8f:47:e9:65:80:6e:ef:7d:d5:c7:e1:97:67: a1:13:ac:c6:74:28:91:70:ff:e5:39:22:ab:d2:a2:fe: 02:2d:be:a6:67:d5:c9:57:3d:d0:58:ea:37:47:6f:fb: fe:36:10:31:20:66:c3:39:a1:db:ae:93:5e:dd:e0:be: 14:74:59:b2:3b:00:2e:8b:9b:9f:c7:fb:a3:10:12:58: 63:c3:c7:a2:70:bf:b5:22:61:7b:f0:70:f3:21:0e:9d: 80:c4:17:7a:2f:05:7f:48:78:83:0f:61:ea:77:fa:e8: a2:07:cc:84:6f:3c:b4:a7:d7:a3:b9:b1:c4:06:8a:90: f5:b9:3c:72:6a:53:0e:50:df:aa:5f:6f:c4:5a:50:ec Fingerprint (SHA-256): 6D:87:EB:D3:D6:F5:19:15:22:39:C7:08:49:6D:FF:C1:80:82:50:A7:31:B0:C4:EF:2D:8C:D3:65:10:10:B8:B6 Fingerprint (SHA1): 3D:17:89:B8:1B:41:73:62:5B:49:4F:45:ED:69:DD:0B:40:21:D7:FB Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14294: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #14295: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181929 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14296: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #14297: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #14298: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181930 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14299: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #14300: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #14301: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14302: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108181931 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14303: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14304: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108181932 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14305: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14306: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #14307: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14308: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14309: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108181933 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-Bridge-108181830.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #14310: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14311: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #14312: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14313: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108181934 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14314: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14315: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14316: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14317: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 108181935 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-BridgeNavy-108181831.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #14318: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14319: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #14320: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14321: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108181936 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14322: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14323: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #14324: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181929 (0x672b9a9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 23:42:28 2016 Not After : Fri Jan 08 23:42:28 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:6b:f1:87:e7:00:93:f3:d9:1c:28:eb:13:89:12:b5: 7e:ad:39:05:dc:27:03:7a:2c:de:51:2e:f6:4f:0c:12: b6:1d:bb:06:92:f6:b0:db:49:59:9e:f2:d4:fc:4e:77: 6a:b4:e4:6f:ec:d5:70:6b:2e:78:e6:5c:22:97:7f:40: db:62:cf:0b:43:c2:39:8b:c0:a0:c8:48:d0:3b:53:20: 58:25:86:c7:d4:95:c6:36:23:2e:9c:6e:20:20:09:18: 7f:5d:13:7b:14:41:65:9b:f6:57:a9:87:15:a9:3c:b6: 2f:c4:5c:49:44:3f:79:6b:b2:23:72:cd:a1:50:41:93: b8:73:e2:b8:73:87:f2:04:9e:67:ba:b1:c2:5a:21:e2: ad:9d:e7:74:02:23:15:5a:b4:87:76:d5:f9:1d:5b:45: 24:f6:0e:ef:5e:cf:d1:e8:b5:ac:79:21:63:37:5e:83: 1a:24:1b:ba:b2:26:bd:c4:0d:88:25:8f:96:d8:a4:08: f9:31:66:37:c9:04:fa:39:ab:f2:12:cf:51:02:77:9e: 27:6b:47:04:cc:28:a4:1b:be:a6:a1:a4:a4:30:5b:08: 0d:e3:36:21:5a:31:04:34:27:31:77:d1:14:e3:d8:92: 51:a7:84:f3:5d:56:65:17:c0:9c:2b:a9:76:32:16:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:8b:00:1b:a8:b3:a3:f5:f1:8d:bd:af:ba:62:0b:e9: 8c:a6:6c:81:5c:90:b1:94:b5:d1:67:ce:93:d0:b9:97: 75:40:6c:8b:dd:85:0b:ed:2e:08:c2:8b:b3:8e:cf:95: ba:6c:54:13:11:ee:c2:39:7f:66:30:57:91:7e:96:ef: f4:20:25:34:27:d0:ad:2a:78:ee:15:39:db:98:cc:af: 95:e6:97:07:b2:fe:83:64:4b:6e:7d:3c:e2:c5:3b:d6: ae:87:5b:0d:e9:8e:8f:50:5a:94:91:62:a3:8c:87:06: 94:a4:9d:5a:9f:d7:7c:20:1d:9a:a8:ae:ed:fa:06:46: 86:4f:d7:e6:d9:c9:1d:f3:1e:e3:c3:aa:e9:16:98:57: 0b:77:b4:57:bb:58:7c:d7:16:be:39:9a:a0:8b:6c:f1: d6:45:eb:bc:74:3f:21:72:86:6a:de:56:47:4a:5e:a9: 5d:7f:15:b7:88:03:9c:3b:59:18:78:22:bd:56:21:1e: 55:c0:73:58:6b:63:63:94:20:e9:35:8e:9e:0b:a9:11: 4a:f9:c8:ac:da:0a:b3:ea:f9:0c:f9:00:f6:51:ce:25: ef:df:51:c9:f7:f1:07:2e:7d:f4:17:75:61:11:82:46: 26:3d:42:ed:60:1e:88:d1:62:98:34:db:27:ba:1b:65 Fingerprint (SHA-256): CD:18:64:2F:CC:73:EC:FF:12:B5:52:7D:BC:A1:8B:77:DD:C8:B1:5A:A1:65:B5:C8:AE:99:F1:90:BF:72:DA:6B Fingerprint (SHA1): 16:4B:E0:F9:3A:96:6E:D7:E9:CF:0C:01:E4:DA:24:AE:E1:5A:75:F8 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14325: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181930 (0x672b9aa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 23:42:34 2016 Not After : Fri Jan 08 23:42:34 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:88:30:d2:6a:fb:44:df:9d:6b:ce:13:4c:74:0c:21: 45:ab:18:6c:a4:6d:f3:a2:6e:0b:b9:78:fa:96:f5:28: 36:30:1a:b3:68:c0:36:b6:9e:6d:82:56:7a:39:84:23: c7:39:d4:77:a8:e7:6a:8e:cf:c6:df:75:09:5d:2c:2a: 51:4a:21:96:d4:5c:1d:e4:d0:1f:8c:b4:70:6b:1c:50: 8d:5a:ab:8f:27:f6:48:d8:54:59:44:26:fe:5d:de:7c: 78:c3:e4:6a:c6:15:7d:8f:5b:bd:e7:cd:4f:c5:df:3e: 2d:6b:35:36:af:c1:42:e3:bd:2a:2a:ea:de:d7:48:58: e1:c0:11:80:11:99:75:94:58:0c:9f:dc:d9:4f:52:48: 7f:82:76:63:75:82:f8:fd:f9:81:72:dd:4a:25:64:37: fc:70:85:9c:e0:09:df:18:20:4b:0a:7b:b9:62:eb:86: 6f:87:81:33:d3:81:58:af:82:5e:97:9e:62:6f:a5:64: 1a:ec:9b:a3:9f:d9:2c:fe:8b:ee:89:1d:a7:f9:81:fd: 7c:3d:2d:83:94:e0:a6:cb:57:13:94:c6:00:d2:bb:86: c9:85:54:ff:28:0b:dd:d6:2b:a2:ee:4f:11:cc:d9:1d: 7f:0a:4e:5c:fd:cb:31:0b:55:db:ab:66:27:5c:8a:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0b:46:21:40:8c:62:dc:7c:88:32:07:bb:2e:5f:dd: 9c:61:60:d5:fe:0d:31:1d:2c:26:81:60:f2:a5:7f:2c: bc:d8:95:bb:89:34:a1:fe:11:ca:cb:68:2d:a6:81:c2: f7:26:a3:b8:cd:b7:da:3b:af:54:4a:b0:60:ed:ce:de: 89:19:cd:c5:d5:ce:e4:2a:52:b5:cf:6f:fb:f5:78:92: 08:c1:93:9b:88:bd:5b:7e:e0:f5:34:f8:88:29:bd:02: ad:36:ed:b1:52:65:28:ec:dc:22:d1:e4:27:21:bd:74: 34:65:31:42:fd:b3:6b:43:2b:74:f0:0f:52:c7:84:73: ac:be:a3:58:d6:89:3e:6d:9c:b7:62:78:f7:e0:32:82: fb:b1:b2:33:f4:42:ef:3e:12:82:b4:09:99:1e:6f:71: 3b:11:1a:6d:c0:0c:e9:97:87:38:ec:ac:e8:f1:d8:27: 45:9e:ff:81:db:db:dd:f3:5b:b3:8b:7e:0e:ce:e5:71: d3:a3:d9:99:2e:8c:55:5b:58:14:bb:3a:bd:6b:07:94: 5c:06:da:04:fd:01:55:50:f0:ec:fa:c9:fa:49:f5:f1: c4:e0:69:f2:8f:84:97:87:c6:ed:ae:02:8a:57:90:b3: c1:aa:3d:0a:4a:c4:83:41:00:b6:12:0f:8e:14:ae:bc Fingerprint (SHA-256): E8:03:F6:5D:A3:F3:DE:C1:44:B5:71:A8:58:AE:E8:12:C1:31:64:E8:52:D4:75:3B:A7:42:73:04:F3:1C:EF:67 Fingerprint (SHA1): 3B:6D:84:7C:65:D3:E0:3E:12:1B:F6:A6:DE:B6:8D:A0:9D:8E:EA:6D Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14326: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181930 (0x672b9aa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 23:42:34 2016 Not After : Fri Jan 08 23:42:34 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:88:30:d2:6a:fb:44:df:9d:6b:ce:13:4c:74:0c:21: 45:ab:18:6c:a4:6d:f3:a2:6e:0b:b9:78:fa:96:f5:28: 36:30:1a:b3:68:c0:36:b6:9e:6d:82:56:7a:39:84:23: c7:39:d4:77:a8:e7:6a:8e:cf:c6:df:75:09:5d:2c:2a: 51:4a:21:96:d4:5c:1d:e4:d0:1f:8c:b4:70:6b:1c:50: 8d:5a:ab:8f:27:f6:48:d8:54:59:44:26:fe:5d:de:7c: 78:c3:e4:6a:c6:15:7d:8f:5b:bd:e7:cd:4f:c5:df:3e: 2d:6b:35:36:af:c1:42:e3:bd:2a:2a:ea:de:d7:48:58: e1:c0:11:80:11:99:75:94:58:0c:9f:dc:d9:4f:52:48: 7f:82:76:63:75:82:f8:fd:f9:81:72:dd:4a:25:64:37: fc:70:85:9c:e0:09:df:18:20:4b:0a:7b:b9:62:eb:86: 6f:87:81:33:d3:81:58:af:82:5e:97:9e:62:6f:a5:64: 1a:ec:9b:a3:9f:d9:2c:fe:8b:ee:89:1d:a7:f9:81:fd: 7c:3d:2d:83:94:e0:a6:cb:57:13:94:c6:00:d2:bb:86: c9:85:54:ff:28:0b:dd:d6:2b:a2:ee:4f:11:cc:d9:1d: 7f:0a:4e:5c:fd:cb:31:0b:55:db:ab:66:27:5c:8a:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0b:46:21:40:8c:62:dc:7c:88:32:07:bb:2e:5f:dd: 9c:61:60:d5:fe:0d:31:1d:2c:26:81:60:f2:a5:7f:2c: bc:d8:95:bb:89:34:a1:fe:11:ca:cb:68:2d:a6:81:c2: f7:26:a3:b8:cd:b7:da:3b:af:54:4a:b0:60:ed:ce:de: 89:19:cd:c5:d5:ce:e4:2a:52:b5:cf:6f:fb:f5:78:92: 08:c1:93:9b:88:bd:5b:7e:e0:f5:34:f8:88:29:bd:02: ad:36:ed:b1:52:65:28:ec:dc:22:d1:e4:27:21:bd:74: 34:65:31:42:fd:b3:6b:43:2b:74:f0:0f:52:c7:84:73: ac:be:a3:58:d6:89:3e:6d:9c:b7:62:78:f7:e0:32:82: fb:b1:b2:33:f4:42:ef:3e:12:82:b4:09:99:1e:6f:71: 3b:11:1a:6d:c0:0c:e9:97:87:38:ec:ac:e8:f1:d8:27: 45:9e:ff:81:db:db:dd:f3:5b:b3:8b:7e:0e:ce:e5:71: d3:a3:d9:99:2e:8c:55:5b:58:14:bb:3a:bd:6b:07:94: 5c:06:da:04:fd:01:55:50:f0:ec:fa:c9:fa:49:f5:f1: c4:e0:69:f2:8f:84:97:87:c6:ed:ae:02:8a:57:90:b3: c1:aa:3d:0a:4a:c4:83:41:00:b6:12:0f:8e:14:ae:bc Fingerprint (SHA-256): E8:03:F6:5D:A3:F3:DE:C1:44:B5:71:A8:58:AE:E8:12:C1:31:64:E8:52:D4:75:3B:A7:42:73:04:F3:1C:EF:67 Fingerprint (SHA1): 3B:6D:84:7C:65:D3:E0:3E:12:1B:F6:A6:DE:B6:8D:A0:9D:8E:EA:6D Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14327: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #14328: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181929 (0x672b9a9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 23:42:28 2016 Not After : Fri Jan 08 23:42:28 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:6b:f1:87:e7:00:93:f3:d9:1c:28:eb:13:89:12:b5: 7e:ad:39:05:dc:27:03:7a:2c:de:51:2e:f6:4f:0c:12: b6:1d:bb:06:92:f6:b0:db:49:59:9e:f2:d4:fc:4e:77: 6a:b4:e4:6f:ec:d5:70:6b:2e:78:e6:5c:22:97:7f:40: db:62:cf:0b:43:c2:39:8b:c0:a0:c8:48:d0:3b:53:20: 58:25:86:c7:d4:95:c6:36:23:2e:9c:6e:20:20:09:18: 7f:5d:13:7b:14:41:65:9b:f6:57:a9:87:15:a9:3c:b6: 2f:c4:5c:49:44:3f:79:6b:b2:23:72:cd:a1:50:41:93: b8:73:e2:b8:73:87:f2:04:9e:67:ba:b1:c2:5a:21:e2: ad:9d:e7:74:02:23:15:5a:b4:87:76:d5:f9:1d:5b:45: 24:f6:0e:ef:5e:cf:d1:e8:b5:ac:79:21:63:37:5e:83: 1a:24:1b:ba:b2:26:bd:c4:0d:88:25:8f:96:d8:a4:08: f9:31:66:37:c9:04:fa:39:ab:f2:12:cf:51:02:77:9e: 27:6b:47:04:cc:28:a4:1b:be:a6:a1:a4:a4:30:5b:08: 0d:e3:36:21:5a:31:04:34:27:31:77:d1:14:e3:d8:92: 51:a7:84:f3:5d:56:65:17:c0:9c:2b:a9:76:32:16:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:8b:00:1b:a8:b3:a3:f5:f1:8d:bd:af:ba:62:0b:e9: 8c:a6:6c:81:5c:90:b1:94:b5:d1:67:ce:93:d0:b9:97: 75:40:6c:8b:dd:85:0b:ed:2e:08:c2:8b:b3:8e:cf:95: ba:6c:54:13:11:ee:c2:39:7f:66:30:57:91:7e:96:ef: f4:20:25:34:27:d0:ad:2a:78:ee:15:39:db:98:cc:af: 95:e6:97:07:b2:fe:83:64:4b:6e:7d:3c:e2:c5:3b:d6: ae:87:5b:0d:e9:8e:8f:50:5a:94:91:62:a3:8c:87:06: 94:a4:9d:5a:9f:d7:7c:20:1d:9a:a8:ae:ed:fa:06:46: 86:4f:d7:e6:d9:c9:1d:f3:1e:e3:c3:aa:e9:16:98:57: 0b:77:b4:57:bb:58:7c:d7:16:be:39:9a:a0:8b:6c:f1: d6:45:eb:bc:74:3f:21:72:86:6a:de:56:47:4a:5e:a9: 5d:7f:15:b7:88:03:9c:3b:59:18:78:22:bd:56:21:1e: 55:c0:73:58:6b:63:63:94:20:e9:35:8e:9e:0b:a9:11: 4a:f9:c8:ac:da:0a:b3:ea:f9:0c:f9:00:f6:51:ce:25: ef:df:51:c9:f7:f1:07:2e:7d:f4:17:75:61:11:82:46: 26:3d:42:ed:60:1e:88:d1:62:98:34:db:27:ba:1b:65 Fingerprint (SHA-256): CD:18:64:2F:CC:73:EC:FF:12:B5:52:7D:BC:A1:8B:77:DD:C8:B1:5A:A1:65:B5:C8:AE:99:F1:90:BF:72:DA:6B Fingerprint (SHA1): 16:4B:E0:F9:3A:96:6E:D7:E9:CF:0C:01:E4:DA:24:AE:E1:5A:75:F8 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14329: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181930 (0x672b9aa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 23:42:34 2016 Not After : Fri Jan 08 23:42:34 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:88:30:d2:6a:fb:44:df:9d:6b:ce:13:4c:74:0c:21: 45:ab:18:6c:a4:6d:f3:a2:6e:0b:b9:78:fa:96:f5:28: 36:30:1a:b3:68:c0:36:b6:9e:6d:82:56:7a:39:84:23: c7:39:d4:77:a8:e7:6a:8e:cf:c6:df:75:09:5d:2c:2a: 51:4a:21:96:d4:5c:1d:e4:d0:1f:8c:b4:70:6b:1c:50: 8d:5a:ab:8f:27:f6:48:d8:54:59:44:26:fe:5d:de:7c: 78:c3:e4:6a:c6:15:7d:8f:5b:bd:e7:cd:4f:c5:df:3e: 2d:6b:35:36:af:c1:42:e3:bd:2a:2a:ea:de:d7:48:58: e1:c0:11:80:11:99:75:94:58:0c:9f:dc:d9:4f:52:48: 7f:82:76:63:75:82:f8:fd:f9:81:72:dd:4a:25:64:37: fc:70:85:9c:e0:09:df:18:20:4b:0a:7b:b9:62:eb:86: 6f:87:81:33:d3:81:58:af:82:5e:97:9e:62:6f:a5:64: 1a:ec:9b:a3:9f:d9:2c:fe:8b:ee:89:1d:a7:f9:81:fd: 7c:3d:2d:83:94:e0:a6:cb:57:13:94:c6:00:d2:bb:86: c9:85:54:ff:28:0b:dd:d6:2b:a2:ee:4f:11:cc:d9:1d: 7f:0a:4e:5c:fd:cb:31:0b:55:db:ab:66:27:5c:8a:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0b:46:21:40:8c:62:dc:7c:88:32:07:bb:2e:5f:dd: 9c:61:60:d5:fe:0d:31:1d:2c:26:81:60:f2:a5:7f:2c: bc:d8:95:bb:89:34:a1:fe:11:ca:cb:68:2d:a6:81:c2: f7:26:a3:b8:cd:b7:da:3b:af:54:4a:b0:60:ed:ce:de: 89:19:cd:c5:d5:ce:e4:2a:52:b5:cf:6f:fb:f5:78:92: 08:c1:93:9b:88:bd:5b:7e:e0:f5:34:f8:88:29:bd:02: ad:36:ed:b1:52:65:28:ec:dc:22:d1:e4:27:21:bd:74: 34:65:31:42:fd:b3:6b:43:2b:74:f0:0f:52:c7:84:73: ac:be:a3:58:d6:89:3e:6d:9c:b7:62:78:f7:e0:32:82: fb:b1:b2:33:f4:42:ef:3e:12:82:b4:09:99:1e:6f:71: 3b:11:1a:6d:c0:0c:e9:97:87:38:ec:ac:e8:f1:d8:27: 45:9e:ff:81:db:db:dd:f3:5b:b3:8b:7e:0e:ce:e5:71: d3:a3:d9:99:2e:8c:55:5b:58:14:bb:3a:bd:6b:07:94: 5c:06:da:04:fd:01:55:50:f0:ec:fa:c9:fa:49:f5:f1: c4:e0:69:f2:8f:84:97:87:c6:ed:ae:02:8a:57:90:b3: c1:aa:3d:0a:4a:c4:83:41:00:b6:12:0f:8e:14:ae:bc Fingerprint (SHA-256): E8:03:F6:5D:A3:F3:DE:C1:44:B5:71:A8:58:AE:E8:12:C1:31:64:E8:52:D4:75:3B:A7:42:73:04:F3:1C:EF:67 Fingerprint (SHA1): 3B:6D:84:7C:65:D3:E0:3E:12:1B:F6:A6:DE:B6:8D:A0:9D:8E:EA:6D Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14330: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181930 (0x672b9aa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 23:42:34 2016 Not After : Fri Jan 08 23:42:34 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:88:30:d2:6a:fb:44:df:9d:6b:ce:13:4c:74:0c:21: 45:ab:18:6c:a4:6d:f3:a2:6e:0b:b9:78:fa:96:f5:28: 36:30:1a:b3:68:c0:36:b6:9e:6d:82:56:7a:39:84:23: c7:39:d4:77:a8:e7:6a:8e:cf:c6:df:75:09:5d:2c:2a: 51:4a:21:96:d4:5c:1d:e4:d0:1f:8c:b4:70:6b:1c:50: 8d:5a:ab:8f:27:f6:48:d8:54:59:44:26:fe:5d:de:7c: 78:c3:e4:6a:c6:15:7d:8f:5b:bd:e7:cd:4f:c5:df:3e: 2d:6b:35:36:af:c1:42:e3:bd:2a:2a:ea:de:d7:48:58: e1:c0:11:80:11:99:75:94:58:0c:9f:dc:d9:4f:52:48: 7f:82:76:63:75:82:f8:fd:f9:81:72:dd:4a:25:64:37: fc:70:85:9c:e0:09:df:18:20:4b:0a:7b:b9:62:eb:86: 6f:87:81:33:d3:81:58:af:82:5e:97:9e:62:6f:a5:64: 1a:ec:9b:a3:9f:d9:2c:fe:8b:ee:89:1d:a7:f9:81:fd: 7c:3d:2d:83:94:e0:a6:cb:57:13:94:c6:00:d2:bb:86: c9:85:54:ff:28:0b:dd:d6:2b:a2:ee:4f:11:cc:d9:1d: 7f:0a:4e:5c:fd:cb:31:0b:55:db:ab:66:27:5c:8a:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0b:46:21:40:8c:62:dc:7c:88:32:07:bb:2e:5f:dd: 9c:61:60:d5:fe:0d:31:1d:2c:26:81:60:f2:a5:7f:2c: bc:d8:95:bb:89:34:a1:fe:11:ca:cb:68:2d:a6:81:c2: f7:26:a3:b8:cd:b7:da:3b:af:54:4a:b0:60:ed:ce:de: 89:19:cd:c5:d5:ce:e4:2a:52:b5:cf:6f:fb:f5:78:92: 08:c1:93:9b:88:bd:5b:7e:e0:f5:34:f8:88:29:bd:02: ad:36:ed:b1:52:65:28:ec:dc:22:d1:e4:27:21:bd:74: 34:65:31:42:fd:b3:6b:43:2b:74:f0:0f:52:c7:84:73: ac:be:a3:58:d6:89:3e:6d:9c:b7:62:78:f7:e0:32:82: fb:b1:b2:33:f4:42:ef:3e:12:82:b4:09:99:1e:6f:71: 3b:11:1a:6d:c0:0c:e9:97:87:38:ec:ac:e8:f1:d8:27: 45:9e:ff:81:db:db:dd:f3:5b:b3:8b:7e:0e:ce:e5:71: d3:a3:d9:99:2e:8c:55:5b:58:14:bb:3a:bd:6b:07:94: 5c:06:da:04:fd:01:55:50:f0:ec:fa:c9:fa:49:f5:f1: c4:e0:69:f2:8f:84:97:87:c6:ed:ae:02:8a:57:90:b3: c1:aa:3d:0a:4a:c4:83:41:00:b6:12:0f:8e:14:ae:bc Fingerprint (SHA-256): E8:03:F6:5D:A3:F3:DE:C1:44:B5:71:A8:58:AE:E8:12:C1:31:64:E8:52:D4:75:3B:A7:42:73:04:F3:1C:EF:67 Fingerprint (SHA1): 3B:6D:84:7C:65:D3:E0:3E:12:1B:F6:A6:DE:B6:8D:A0:9D:8E:EA:6D Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14331: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #14332: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181937 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14333: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #14334: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #14335: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181938 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14336: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #14337: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #14338: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14339: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 108181939 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14340: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14341: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #14342: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14343: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 108181940 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14344: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14345: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #14346: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14347: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 108181941 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #14348: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14349: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 108181942 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #14350: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14351: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #14352: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14353: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14354: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108181943 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14355: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14356: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14357: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14358: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 108181944 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14359: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14360: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #14361: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14362: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108181945 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14363: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14364: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #14365: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14366: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108181946 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14367: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14368: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14369: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181937 (0x672b9b1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 23:44:47 2016 Not After : Fri Jan 08 23:44:47 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:3e:d3:6b:03:ec:8c:fe:79:90:8e:05:97:ed:a5:1b: 05:04:2b:77:5c:99:b8:8c:d0:35:11:28:01:b4:0e:c1: 72:be:d8:e6:0b:41:06:28:8b:fd:e5:09:05:09:82:ff: 94:22:93:19:96:b6:43:84:bc:36:dc:4f:94:c3:b2:bf: d3:ac:95:9f:de:26:8e:82:52:61:d5:26:62:c9:f2:96: 22:d3:4c:7d:c4:28:76:b3:a7:a7:ca:4a:ad:12:d7:73: d9:a4:ca:9d:67:de:d5:40:69:ec:fb:ce:3a:c6:bd:f1: 30:c9:70:a5:d8:50:b0:8c:25:a1:3f:58:0b:32:0f:1f: fb:09:d8:92:80:a9:27:2f:72:45:11:56:3c:9c:0a:35: f0:92:fb:e3:7e:57:85:9e:2f:55:ac:34:49:f4:b0:ff: 5e:85:54:8b:3b:22:cc:dc:d6:58:c8:50:e4:3c:67:6e: 68:b8:59:f3:5b:ea:ad:8a:8e:30:2f:39:ab:d2:6e:0f: 83:07:07:ca:1d:6e:e4:b4:c0:f6:28:df:54:2b:0d:4a: 48:ce:1d:ca:b2:e7:0a:be:6a:8c:8a:47:a8:e1:c7:ec: 75:e9:9e:01:32:60:b9:2c:43:67:4a:d7:f1:9c:22:b2: 0e:69:5b:da:77:15:5e:da:ca:fb:61:c3:9c:a2:47:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 70:6f:b3:c6:8e:f1:68:35:73:df:fa:64:aa:70:d0:84: e1:5d:38:26:83:a0:a5:91:92:ea:f8:db:ea:e9:1e:38: 1b:cd:0c:75:fb:3c:92:a7:bf:8a:7e:7d:35:98:1b:c1: 08:70:4d:68:28:c4:0a:ef:3f:6d:8c:96:f2:4e:8e:04: a1:af:91:60:57:c0:b0:ab:6b:59:a9:1b:d1:30:61:b4: a4:bf:99:c1:47:1a:1e:80:b0:e4:05:f9:d8:cb:4b:4a: 4e:59:63:f9:44:60:94:0a:8f:75:8f:d3:53:e6:3e:e2: c0:e9:83:d1:ed:e3:59:e2:9c:55:8c:8e:52:81:c9:c7: 21:d5:54:25:2c:e5:36:a0:81:2f:2a:0d:08:46:69:6b: 05:7a:9a:60:f6:2e:26:51:ce:d9:15:3e:c6:06:b1:30: cd:85:ad:9d:43:cc:4d:26:8e:38:92:3c:ef:35:04:a3: 08:e1:05:2c:c0:97:fd:39:1f:5f:13:99:7c:6a:84:78: f7:e1:f3:c9:8a:4b:59:85:69:7a:89:ee:ac:0e:0d:f4: 1b:8a:64:91:73:d2:ec:64:15:da:53:85:42:6d:c4:8f: 8b:b5:17:78:95:24:b9:70:1f:c5:b1:8d:df:9e:69:d5: dc:c6:b3:91:74:32:61:a8:6a:1b:fe:27:aa:90:10:76 Fingerprint (SHA-256): BE:C3:E9:22:3C:2F:6D:E6:40:95:47:E1:41:C8:C7:E1:E1:47:17:69:1A:F7:AC:E7:05:C9:4D:9C:EE:ED:B0:D4 Fingerprint (SHA1): D6:BD:AC:26:D7:18:59:9E:80:95:8D:C7:D6:CE:CE:9E:E2:F5:79:41 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #14370: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14371: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14372: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14373: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14374: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14375: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14376: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14377: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14378: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181938 (0x672b9b2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 23:44:56 2016 Not After : Fri Jan 08 23:44:56 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:33:39:2a:47:f8:8f:4a:a0:c1:9e:ca:eb:8c:e5:d0: 15:a4:8d:cf:66:20:ef:85:7f:bf:36:90:d7:bc:31:7c: f2:c9:05:c7:d8:5d:ad:bd:71:ca:6b:6b:b4:47:65:3a: ea:29:4c:01:08:16:07:0f:f5:b7:32:cc:a9:e4:6b:88: ff:88:f7:c7:57:64:ef:97:01:a7:31:24:60:3e:55:43: 15:0d:44:0f:c2:6b:02:53:6d:42:96:68:70:25:1e:93: 59:49:a6:45:82:4d:b3:66:36:72:b0:e3:38:fd:db:10: f9:cb:78:95:e9:7c:b0:be:06:f0:7d:f7:4d:43:c0:fc: 0b:cb:e8:29:cd:0e:46:c7:9b:c4:83:2a:03:27:26:14: bd:39:59:19:cc:f8:cb:c8:ef:98:ff:05:f8:93:a8:bd: 1a:39:a0:0e:a4:25:93:c6:42:a3:d0:92:30:62:5b:dd: 9b:64:86:6a:5d:e4:57:23:8b:00:97:f8:9c:f6:53:25: fe:fa:d8:b8:60:53:58:b8:79:58:6c:5d:42:11:43:1f: a3:49:9e:d1:d6:48:d5:10:3f:38:fe:50:8c:8d:78:9e: a9:75:e5:0f:12:67:ef:aa:a4:01:18:cf:eb:71:c4:e2: 6f:92:3c:a3:53:a9:05:86:96:cd:a7:57:66:98:ca:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ab:c3:7b:2d:ae:e1:53:d5:68:90:3d:4e:a8:28:73:2e: 28:4d:4a:f1:55:84:9b:45:df:34:02:f9:71:92:78:46: 3d:8d:d5:eb:1b:89:d0:74:e9:72:04:55:8d:0c:b7:ec: dd:dc:0e:34:8d:62:90:67:76:70:fc:7f:b5:09:47:02: f3:5d:34:e6:55:10:48:14:ec:36:3e:66:55:cc:e8:68: 32:99:fe:1e:16:8f:91:d9:8f:d6:e1:d9:5f:88:ba:c8: a4:1f:49:16:79:c3:22:39:7f:58:28:63:8b:77:78:7b: 6b:d6:a9:1e:32:16:04:ea:7d:a0:0b:d8:c3:c4:27:66: 8e:78:5d:0c:55:e7:26:09:05:90:1b:ce:e3:61:04:2a: 6e:01:90:5d:c2:8d:03:17:7f:18:d1:18:49:b2:51:24: ff:65:35:e4:13:f9:27:bf:2a:86:50:ff:dc:f5:0a:69: f6:4f:9d:4e:cd:4e:b2:7b:6b:40:3b:39:fd:06:17:29: 07:2d:ac:75:1e:23:b3:fe:ad:ec:ab:8e:2e:e1:24:9b: 5a:d7:50:2e:61:b5:d9:58:6b:b9:41:80:0d:27:d6:87: a5:2f:93:57:f7:36:d1:2c:ff:b5:4f:8f:17:10:3c:9f: 74:96:89:0c:49:da:19:6d:e7:34:58:c7:8d:bd:41:e0 Fingerprint (SHA-256): B0:24:A7:C8:EA:7D:D2:3B:8C:B3:D3:94:84:BC:3F:81:5B:D3:4E:6D:9D:76:F7:2A:DB:F1:30:E2:E7:AD:E4:F9 Fingerprint (SHA1): AE:9F:91:01:9E:0D:18:66:53:A1:66:90:85:F3:A6:94:65:39:AA:0A Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #14379: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14380: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14381: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14382: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14383: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14384: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14385: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #14386: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #14387: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #14388: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #14389: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #14390: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #14391: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #14392: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #14393: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #14394: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.114412.1.1 /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=paypal.com,OU=PayPal Production,O="PayPal, Inc.",L =San Jose,ST=California,C=US" Certificate 2 Subject: "CN=DigiCert SHA2 High Assurance Server CA,OU=www.digi cert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #14395: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #14396: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #14397: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181947 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14398: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #14399: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14400: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14401: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108181948 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14402: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14403: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #14404: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14405: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108181949 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14406: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14407: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14408: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14409: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 108181950 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14410: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14411: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #14412: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14413: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108181951 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14414: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14415: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #14416: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14417: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 108181952 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14418: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14419: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #14420: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14421: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 108181953 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14422: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14423: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #14424: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14425: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 108181954 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14426: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14427: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #14428: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14429: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 108181955 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14430: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14431: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14432: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181947 (0x672b9bb) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:46:23 2016 Not After : Fri Jan 08 23:46:23 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 2a:7a:ae:88:ad:f6:e2:f9:5c:5a:2d:c9:8c:8b:28:8b: c7:71:55:9c:19:63:6a:a0:3e:25:8b:ea:60:d2:0e:b7: 26:24:72:b7:13:64:79:57:d3:29:8d:40:3a:06:64:5a: 52:ff:28:52:54:69:8c:89:74:f4:a0:e9:26:d4:79:2a: f4:80:8a:c5:dd:3e:b5:40:0f:58:17:3c:70:d4:58:1d: af:e1:eb:de:c7:02:30:c6:8d:e1:f7:71:22:e3:98:fd: 1c:5c:c5:99:ad:9a:cb:ed:8a:43:6f:f9:40:62:b3:97: f1:93:22:cf:1a:a3:50:13:42:68:07:7a:14:79:63:01: 05:dc:e0:d8:bf:69:b4:1f:0c:e5:70:b3:60:e5:2f:64: 26:32:e3:c9:be:cd:a8:9c:5b:e8:85:ab:0c:11:30:18: e2:06:8c:be:f8:73:18:d1:cb:ac:3a:52:69:ce:41:1a: 8d:2c:c0:5f:2e:e8:81:95:a2:d2:83:3d:64:ed:18:19: 95:b1:d3:14:fa:90:ed:30:21:81:4a:64:bd:7e:88:85: ac:86:65:52:1f:81:a0:66:9a:32:9e:21:ad:aa:60:fd: bc:a2:89:bf:10:d3:bf:18:59:05:5c:4f:8a:25:df:8c: df:c1:02:65:78:21:49:a5:b0:dd:33:a4:4e:cf:e1:cf Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:52:8f:65:fd:bd:5e:fd:90:f6:da:75:bf: af:39:a4:22:b9:58:23:14:ab:24:9e:9c:40:c7:52:bc: 02:1c:42:80:ed:83:76:9e:54:aa:30:80:98:7d:74:1e: 4b:98:81:ad:5b:6a:f8:34:21:fd:7d:90:8c:41 Fingerprint (SHA-256): EC:F2:E5:30:47:E1:CE:C7:75:B1:CE:45:D1:B5:3E:F8:6F:0B:B2:81:34:39:1E:B5:EE:6C:FE:E6:83:BC:D2:EF Fingerprint (SHA1): 13:10:4F:F3:53:9D:38:9F:9D:6C:6E:BD:B7:07:B1:7E:AC:AB:D6:05 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14433: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181947 (0x672b9bb) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:46:23 2016 Not After : Fri Jan 08 23:46:23 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 2a:7a:ae:88:ad:f6:e2:f9:5c:5a:2d:c9:8c:8b:28:8b: c7:71:55:9c:19:63:6a:a0:3e:25:8b:ea:60:d2:0e:b7: 26:24:72:b7:13:64:79:57:d3:29:8d:40:3a:06:64:5a: 52:ff:28:52:54:69:8c:89:74:f4:a0:e9:26:d4:79:2a: f4:80:8a:c5:dd:3e:b5:40:0f:58:17:3c:70:d4:58:1d: af:e1:eb:de:c7:02:30:c6:8d:e1:f7:71:22:e3:98:fd: 1c:5c:c5:99:ad:9a:cb:ed:8a:43:6f:f9:40:62:b3:97: f1:93:22:cf:1a:a3:50:13:42:68:07:7a:14:79:63:01: 05:dc:e0:d8:bf:69:b4:1f:0c:e5:70:b3:60:e5:2f:64: 26:32:e3:c9:be:cd:a8:9c:5b:e8:85:ab:0c:11:30:18: e2:06:8c:be:f8:73:18:d1:cb:ac:3a:52:69:ce:41:1a: 8d:2c:c0:5f:2e:e8:81:95:a2:d2:83:3d:64:ed:18:19: 95:b1:d3:14:fa:90:ed:30:21:81:4a:64:bd:7e:88:85: ac:86:65:52:1f:81:a0:66:9a:32:9e:21:ad:aa:60:fd: bc:a2:89:bf:10:d3:bf:18:59:05:5c:4f:8a:25:df:8c: df:c1:02:65:78:21:49:a5:b0:dd:33:a4:4e:cf:e1:cf Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:52:8f:65:fd:bd:5e:fd:90:f6:da:75:bf: af:39:a4:22:b9:58:23:14:ab:24:9e:9c:40:c7:52:bc: 02:1c:42:80:ed:83:76:9e:54:aa:30:80:98:7d:74:1e: 4b:98:81:ad:5b:6a:f8:34:21:fd:7d:90:8c:41 Fingerprint (SHA-256): EC:F2:E5:30:47:E1:CE:C7:75:B1:CE:45:D1:B5:3E:F8:6F:0B:B2:81:34:39:1E:B5:EE:6C:FE:E6:83:BC:D2:EF Fingerprint (SHA1): 13:10:4F:F3:53:9D:38:9F:9D:6C:6E:BD:B7:07:B1:7E:AC:AB:D6:05 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14434: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181947 (0x672b9bb) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:46:23 2016 Not After : Fri Jan 08 23:46:23 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 2a:7a:ae:88:ad:f6:e2:f9:5c:5a:2d:c9:8c:8b:28:8b: c7:71:55:9c:19:63:6a:a0:3e:25:8b:ea:60:d2:0e:b7: 26:24:72:b7:13:64:79:57:d3:29:8d:40:3a:06:64:5a: 52:ff:28:52:54:69:8c:89:74:f4:a0:e9:26:d4:79:2a: f4:80:8a:c5:dd:3e:b5:40:0f:58:17:3c:70:d4:58:1d: af:e1:eb:de:c7:02:30:c6:8d:e1:f7:71:22:e3:98:fd: 1c:5c:c5:99:ad:9a:cb:ed:8a:43:6f:f9:40:62:b3:97: f1:93:22:cf:1a:a3:50:13:42:68:07:7a:14:79:63:01: 05:dc:e0:d8:bf:69:b4:1f:0c:e5:70:b3:60:e5:2f:64: 26:32:e3:c9:be:cd:a8:9c:5b:e8:85:ab:0c:11:30:18: e2:06:8c:be:f8:73:18:d1:cb:ac:3a:52:69:ce:41:1a: 8d:2c:c0:5f:2e:e8:81:95:a2:d2:83:3d:64:ed:18:19: 95:b1:d3:14:fa:90:ed:30:21:81:4a:64:bd:7e:88:85: ac:86:65:52:1f:81:a0:66:9a:32:9e:21:ad:aa:60:fd: bc:a2:89:bf:10:d3:bf:18:59:05:5c:4f:8a:25:df:8c: df:c1:02:65:78:21:49:a5:b0:dd:33:a4:4e:cf:e1:cf Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:52:8f:65:fd:bd:5e:fd:90:f6:da:75:bf: af:39:a4:22:b9:58:23:14:ab:24:9e:9c:40:c7:52:bc: 02:1c:42:80:ed:83:76:9e:54:aa:30:80:98:7d:74:1e: 4b:98:81:ad:5b:6a:f8:34:21:fd:7d:90:8c:41 Fingerprint (SHA-256): EC:F2:E5:30:47:E1:CE:C7:75:B1:CE:45:D1:B5:3E:F8:6F:0B:B2:81:34:39:1E:B5:EE:6C:FE:E6:83:BC:D2:EF Fingerprint (SHA1): 13:10:4F:F3:53:9D:38:9F:9D:6C:6E:BD:B7:07:B1:7E:AC:AB:D6:05 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #14435: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181947 (0x672b9bb) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:46:23 2016 Not After : Fri Jan 08 23:46:23 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 2a:7a:ae:88:ad:f6:e2:f9:5c:5a:2d:c9:8c:8b:28:8b: c7:71:55:9c:19:63:6a:a0:3e:25:8b:ea:60:d2:0e:b7: 26:24:72:b7:13:64:79:57:d3:29:8d:40:3a:06:64:5a: 52:ff:28:52:54:69:8c:89:74:f4:a0:e9:26:d4:79:2a: f4:80:8a:c5:dd:3e:b5:40:0f:58:17:3c:70:d4:58:1d: af:e1:eb:de:c7:02:30:c6:8d:e1:f7:71:22:e3:98:fd: 1c:5c:c5:99:ad:9a:cb:ed:8a:43:6f:f9:40:62:b3:97: f1:93:22:cf:1a:a3:50:13:42:68:07:7a:14:79:63:01: 05:dc:e0:d8:bf:69:b4:1f:0c:e5:70:b3:60:e5:2f:64: 26:32:e3:c9:be:cd:a8:9c:5b:e8:85:ab:0c:11:30:18: e2:06:8c:be:f8:73:18:d1:cb:ac:3a:52:69:ce:41:1a: 8d:2c:c0:5f:2e:e8:81:95:a2:d2:83:3d:64:ed:18:19: 95:b1:d3:14:fa:90:ed:30:21:81:4a:64:bd:7e:88:85: ac:86:65:52:1f:81:a0:66:9a:32:9e:21:ad:aa:60:fd: bc:a2:89:bf:10:d3:bf:18:59:05:5c:4f:8a:25:df:8c: df:c1:02:65:78:21:49:a5:b0:dd:33:a4:4e:cf:e1:cf Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:52:8f:65:fd:bd:5e:fd:90:f6:da:75:bf: af:39:a4:22:b9:58:23:14:ab:24:9e:9c:40:c7:52:bc: 02:1c:42:80:ed:83:76:9e:54:aa:30:80:98:7d:74:1e: 4b:98:81:ad:5b:6a:f8:34:21:fd:7d:90:8c:41 Fingerprint (SHA-256): EC:F2:E5:30:47:E1:CE:C7:75:B1:CE:45:D1:B5:3E:F8:6F:0B:B2:81:34:39:1E:B5:EE:6C:FE:E6:83:BC:D2:EF Fingerprint (SHA1): 13:10:4F:F3:53:9D:38:9F:9D:6C:6E:BD:B7:07:B1:7E:AC:AB:D6:05 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #14436: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #14437: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 10 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14438: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #14439: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #14440: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14441: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14442: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14443: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14444: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14445: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14446: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14447: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #14448: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14449: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14450: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14451: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #14452: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14453: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14454: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14455: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14456: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14457: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14458: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14459: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #14460: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14461: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14462: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14463: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160108234856Z nextupdate=20170108234856Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Jan 08 23:48:56 2016 Next Update: Sun Jan 08 23:48:56 2017 CRL Extensions: chains.sh: #14464: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108234857Z nextupdate=20170108234857Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 23:48:57 2016 Next Update: Sun Jan 08 23:48:57 2017 CRL Extensions: chains.sh: #14465: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108234858Z nextupdate=20170108234858Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 23:48:58 2016 Next Update: Sun Jan 08 23:48:58 2017 CRL Extensions: chains.sh: #14466: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160108234858Z nextupdate=20170108234858Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Jan 08 23:48:58 2016 Next Update: Sun Jan 08 23:48:58 2017 CRL Extensions: chains.sh: #14467: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108234859Z addcert 14 20160108234859Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 23:48:59 2016 Next Update: Sun Jan 08 23:48:58 2017 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Fri Jan 08 23:48:59 2016 CRL Extensions: chains.sh: #14468: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108234900Z addcert 15 20160108234900Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 23:49:00 2016 Next Update: Sun Jan 08 23:48:57 2017 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Fri Jan 08 23:49:00 2016 CRL Extensions: chains.sh: #14469: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14470: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14471: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #14472: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #14473: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #14474: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #14475: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #14476: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #14477: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #14478: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:47:40 2016 Not After : Fri Jan 08 23:47:40 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:48:70:4b:95:7c:40:92:12:54:84:7e:ee:a1:a6:85: 3f:da:06:1f:c5:b9:0c:67:ef:de:c8:a7:4b:d9:66:3a: f1:3a:33:64:51:29:8f:00:4c:9e:22:9c:11:bb:a8:25: ea:06:54:ab:c7:10:2d:a5:54:f1:b0:fb:d0:6f:cf:c5: 8b:3b:72:87:21:ea:9c:5c:6a:bd:4b:f1:07:b7:43:fe: 77:fd:a0:e9:7e:e0:80:d6:65:3b:17:80:c6:2e:eb:6a: da:80:c4:b4:67:d6:9b:66:d8:b0:34:11:42:d3:ae:e3: 33:61:67:0d:4b:65:9b:ae:46:a8:26:e3:c0:1b:ee:3e: 1e:b4:1b:d1:2d:a7:5d:d8:cb:e3:08:b0:ce:2d:2e:e0: 80:1e:a8:81:37:f9:fe:dd:95:2c:1b:be:e9:47:ae:b2: c5:e7:b2:eb:ad:4c:45:54:a6:37:c0:d1:ee:ba:4e:b4: 54:b1:53:d2:0f:ca:79:e2:b5:ef:81:4f:bb:cf:80:fc: df:69:76:54:b9:ba:6e:0a:4e:84:eb:89:29:cc:87:bb: 53:ef:37:69:9d:15:05:28:cb:8a:5c:70:0c:6e:3d:66: c3:4d:31:ed:c9:f8:24:97:50:23:45:88:bd:30:dd:29: ea:d4:cb:9a:7f:37:31:63:ca:2c:5b:2f:d9:a4:e1:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 71:d4:ef:00:fd:a7:98:6e:fc:c5:b2:02:c9:b2:4d:4c: ba:d1:e9:43:c0:fd:bd:51:08:ce:3c:a5:72:42:3f:09: 24:22:7d:cf:95:50:17:58:a0:67:53:00:1b:7f:bd:76: 57:74:90:bf:9e:3d:81:cb:c1:bb:de:a0:73:8b:d8:a8: b2:79:c0:83:5d:0a:42:0f:0b:f8:f5:74:54:56:27:8e: db:55:0c:6f:d5:2d:fc:c4:bd:b4:9d:e3:a7:89:43:fe: 76:b3:30:ac:3b:a7:d3:75:d8:bb:f4:16:85:06:c4:8a: 0f:cb:3e:61:af:2e:7f:ff:e7:34:b1:f5:2d:ef:72:2e: b9:0c:13:43:0d:11:f0:3c:aa:8b:87:50:d5:a4:87:7f: bd:6d:4d:80:47:9c:e2:31:7b:b5:c9:af:38:53:cd:d0: b7:f5:9f:9f:18:98:db:96:22:29:c5:d0:a6:69:9a:d3: 37:05:31:49:bc:97:ef:7c:99:d8:db:f5:37:79:1f:07: bc:e7:08:35:74:33:82:d1:56:59:63:11:a2:f1:67:e0: 10:18:e5:a3:bf:c3:82:07:c0:56:1b:be:17:7c:29:35: c4:ec:40:8c:8b:9c:9a:c3:43:0e:7c:07:54:4a:c5:a6: 3f:65:17:19:b5:32:cd:84:18:ba:df:72:d0:be:59:be Fingerprint (SHA-256): B9:1B:FA:FC:15:EB:78:3F:56:08:88:84:0F:5C:B6:17:DB:86:81:7F:80:7F:B1:80:86:E1:6B:4D:F5:43:92:3B Fingerprint (SHA1): 24:9F:B0:8F:87:3E:2E:75:5B:A3:43:0C:50:20:CC:3A:54:93:3D:C4 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #14479: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #14480: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:47:40 2016 Not After : Fri Jan 08 23:47:40 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:48:70:4b:95:7c:40:92:12:54:84:7e:ee:a1:a6:85: 3f:da:06:1f:c5:b9:0c:67:ef:de:c8:a7:4b:d9:66:3a: f1:3a:33:64:51:29:8f:00:4c:9e:22:9c:11:bb:a8:25: ea:06:54:ab:c7:10:2d:a5:54:f1:b0:fb:d0:6f:cf:c5: 8b:3b:72:87:21:ea:9c:5c:6a:bd:4b:f1:07:b7:43:fe: 77:fd:a0:e9:7e:e0:80:d6:65:3b:17:80:c6:2e:eb:6a: da:80:c4:b4:67:d6:9b:66:d8:b0:34:11:42:d3:ae:e3: 33:61:67:0d:4b:65:9b:ae:46:a8:26:e3:c0:1b:ee:3e: 1e:b4:1b:d1:2d:a7:5d:d8:cb:e3:08:b0:ce:2d:2e:e0: 80:1e:a8:81:37:f9:fe:dd:95:2c:1b:be:e9:47:ae:b2: c5:e7:b2:eb:ad:4c:45:54:a6:37:c0:d1:ee:ba:4e:b4: 54:b1:53:d2:0f:ca:79:e2:b5:ef:81:4f:bb:cf:80:fc: df:69:76:54:b9:ba:6e:0a:4e:84:eb:89:29:cc:87:bb: 53:ef:37:69:9d:15:05:28:cb:8a:5c:70:0c:6e:3d:66: c3:4d:31:ed:c9:f8:24:97:50:23:45:88:bd:30:dd:29: ea:d4:cb:9a:7f:37:31:63:ca:2c:5b:2f:d9:a4:e1:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 71:d4:ef:00:fd:a7:98:6e:fc:c5:b2:02:c9:b2:4d:4c: ba:d1:e9:43:c0:fd:bd:51:08:ce:3c:a5:72:42:3f:09: 24:22:7d:cf:95:50:17:58:a0:67:53:00:1b:7f:bd:76: 57:74:90:bf:9e:3d:81:cb:c1:bb:de:a0:73:8b:d8:a8: b2:79:c0:83:5d:0a:42:0f:0b:f8:f5:74:54:56:27:8e: db:55:0c:6f:d5:2d:fc:c4:bd:b4:9d:e3:a7:89:43:fe: 76:b3:30:ac:3b:a7:d3:75:d8:bb:f4:16:85:06:c4:8a: 0f:cb:3e:61:af:2e:7f:ff:e7:34:b1:f5:2d:ef:72:2e: b9:0c:13:43:0d:11:f0:3c:aa:8b:87:50:d5:a4:87:7f: bd:6d:4d:80:47:9c:e2:31:7b:b5:c9:af:38:53:cd:d0: b7:f5:9f:9f:18:98:db:96:22:29:c5:d0:a6:69:9a:d3: 37:05:31:49:bc:97:ef:7c:99:d8:db:f5:37:79:1f:07: bc:e7:08:35:74:33:82:d1:56:59:63:11:a2:f1:67:e0: 10:18:e5:a3:bf:c3:82:07:c0:56:1b:be:17:7c:29:35: c4:ec:40:8c:8b:9c:9a:c3:43:0e:7c:07:54:4a:c5:a6: 3f:65:17:19:b5:32:cd:84:18:ba:df:72:d0:be:59:be Fingerprint (SHA-256): B9:1B:FA:FC:15:EB:78:3F:56:08:88:84:0F:5C:B6:17:DB:86:81:7F:80:7F:B1:80:86:E1:6B:4D:F5:43:92:3B Fingerprint (SHA1): 24:9F:B0:8F:87:3E:2E:75:5B:A3:43:0C:50:20:CC:3A:54:93:3D:C4 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #14481: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #14482: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #14483: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181956 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14484: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #14485: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #14486: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14487: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 108181957 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14488: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14489: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14490: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9169/localhost-27064-CA0-108181847.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #14491: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0Root-108181832.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #14492: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14493: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #14494: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0-108181847.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #14495: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 108181958 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14496: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14497: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14498: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9169/localhost-27064-CA0-108181847.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #14499: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0Root-108181833.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #14500: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14501: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #14502: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14503: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 108181959 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14504: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14505: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #14506: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0-108181847.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #14507: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0Root-108181834.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #14508: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14509: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #14510: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0-108181847.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #14511: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0Root-108181835.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #14512: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14513: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160108235056Z nextupdate=20170108235056Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Jan 08 23:50:56 2016 Next Update: Sun Jan 08 23:50:56 2017 CRL Extensions: chains.sh: #14514: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108235057Z nextupdate=20170108235057Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 23:50:57 2016 Next Update: Sun Jan 08 23:50:57 2017 CRL Extensions: chains.sh: #14515: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160108235057Z nextupdate=20170108235057Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Jan 08 23:50:57 2016 Next Update: Sun Jan 08 23:50:57 2017 CRL Extensions: chains.sh: #14516: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160108235058Z nextupdate=20170108235058Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Jan 08 23:50:58 2016 Next Update: Sun Jan 08 23:50:58 2017 CRL Extensions: chains.sh: #14517: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108235059Z addcert 20 20160108235059Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 23:50:59 2016 Next Update: Sun Jan 08 23:50:57 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Jan 08 23:50:59 2016 CRL Extensions: chains.sh: #14518: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160108235100Z addcert 40 20160108235100Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Jan 08 23:51:00 2016 Next Update: Sun Jan 08 23:50:57 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Jan 08 23:50:59 2016 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Fri Jan 08 23:51:00 2016 CRL Extensions: chains.sh: #14519: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14520: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14521: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #14522: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181956 (0x672b9c4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:49:25 2016 Not After : Fri Jan 08 23:49:25 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:26:5d:2b:48:c1:be:97:b9:d2:43:88:c6:cd:9c:df: e5:96:70:c7:8e:a4:8e:ab:f2:0f:2f:a6:26:16:6a:d1: b4:4a:e7:fa:e2:25:00:5f:b4:be:c0:d9:7b:b5:62:3c: d2:d0:f8:05:0d:80:d5:cf:53:77:54:a5:b6:cb:4b:d9: d2:6f:6e:61:af:e2:f9:0e:d8:c5:2b:b6:39:1f:af:97: f3:a1:ca:c0:af:6e:cb:92:ec:27:c8:4c:73:8b:4a:3c: 51:85:55:62:d3:64:28:5d:31:05:50:6d:9b:9a:d2:d6: f2:66:8d:9d:ea:7b:a4:9c:d2:f6:c7:87:8e:a6:97:05: 07:f1:7f:1f:94:12:6d:ac:6b:ff:0c:61:91:8c:e7:cd: de:11:c7:b6:7c:7e:cb:75:a2:5e:f4:f1:2e:9e:a0:83: 9b:9a:09:22:c3:06:0e:c9:39:b6:ee:c7:5b:47:68:c5: 85:57:c1:e5:15:bf:ba:89:05:be:7e:27:eb:ef:16:c7: 13:88:12:9a:01:74:9c:63:80:b4:3c:df:d1:70:55:67: b8:f6:36:e6:5b:95:4c:11:d9:13:9b:1f:17:ca:41:c7: 18:39:6e:a7:a2:36:6e:f6:88:9d:a4:4f:da:a5:ff:6e: 78:63:fe:73:4c:83:5a:48:27:97:30:b7:88:63:a8:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ab:de:f0:e8:00:c2:30:24:e1:b9:2b:4a:72:1f:c0:f5: 43:f1:16:19:48:28:e6:09:81:22:db:56:9e:01:eb:92: 96:aa:2b:53:a1:2d:2c:2c:4b:17:3e:b1:1a:c0:7d:4a: 37:00:36:16:43:b5:09:d5:97:26:85:1e:19:21:35:bb: 6f:33:0c:31:74:7b:f0:33:fe:51:ef:f2:76:ee:d4:cf: 2e:0c:c0:e2:de:b3:32:33:2c:fe:f0:33:70:86:aa:c2: 38:05:04:45:96:a4:19:18:58:c7:2d:68:12:14:b9:9b: 1e:8f:ea:a3:65:dc:cb:8f:a9:85:87:85:a7:a1:2f:b2: 26:5a:eb:d3:b5:26:2c:f4:b5:1d:f6:a9:96:8f:b3:75: c8:8e:c6:a8:01:38:85:62:38:e7:fd:73:c3:ff:31:c7: 0d:79:fe:a3:2c:7a:f2:aa:22:0c:f1:c2:cc:66:02:fa: 9b:26:7d:a5:b0:fb:2c:d8:6d:2f:bc:f8:6b:c4:14:e1: 45:91:8e:e4:33:00:4c:be:48:0e:17:4c:b9:01:4d:ee: 4c:1f:0a:49:9e:08:6f:e0:4b:32:74:04:a2:8e:e2:87: d5:1e:97:8d:e9:58:68:45:ce:c6:90:08:82:7d:73:8e: 2a:36:1e:1c:bb:03:85:be:07:b5:db:8c:42:45:79:5f Fingerprint (SHA-256): 26:7A:7A:8A:E5:91:8E:69:65:89:DE:F5:CD:4C:84:5A:08:50:8D:03:65:E1:BA:93:F5:D4:88:4C:EA:E9:2E:D5 Fingerprint (SHA1): 1D:F1:E7:B8:29:5C:74:2F:B4:0C:C8:6D:BF:97:60:95:43:D3:B3:2E Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #14523: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #14524: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181956 (0x672b9c4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:49:25 2016 Not After : Fri Jan 08 23:49:25 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:26:5d:2b:48:c1:be:97:b9:d2:43:88:c6:cd:9c:df: e5:96:70:c7:8e:a4:8e:ab:f2:0f:2f:a6:26:16:6a:d1: b4:4a:e7:fa:e2:25:00:5f:b4:be:c0:d9:7b:b5:62:3c: d2:d0:f8:05:0d:80:d5:cf:53:77:54:a5:b6:cb:4b:d9: d2:6f:6e:61:af:e2:f9:0e:d8:c5:2b:b6:39:1f:af:97: f3:a1:ca:c0:af:6e:cb:92:ec:27:c8:4c:73:8b:4a:3c: 51:85:55:62:d3:64:28:5d:31:05:50:6d:9b:9a:d2:d6: f2:66:8d:9d:ea:7b:a4:9c:d2:f6:c7:87:8e:a6:97:05: 07:f1:7f:1f:94:12:6d:ac:6b:ff:0c:61:91:8c:e7:cd: de:11:c7:b6:7c:7e:cb:75:a2:5e:f4:f1:2e:9e:a0:83: 9b:9a:09:22:c3:06:0e:c9:39:b6:ee:c7:5b:47:68:c5: 85:57:c1:e5:15:bf:ba:89:05:be:7e:27:eb:ef:16:c7: 13:88:12:9a:01:74:9c:63:80:b4:3c:df:d1:70:55:67: b8:f6:36:e6:5b:95:4c:11:d9:13:9b:1f:17:ca:41:c7: 18:39:6e:a7:a2:36:6e:f6:88:9d:a4:4f:da:a5:ff:6e: 78:63:fe:73:4c:83:5a:48:27:97:30:b7:88:63:a8:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ab:de:f0:e8:00:c2:30:24:e1:b9:2b:4a:72:1f:c0:f5: 43:f1:16:19:48:28:e6:09:81:22:db:56:9e:01:eb:92: 96:aa:2b:53:a1:2d:2c:2c:4b:17:3e:b1:1a:c0:7d:4a: 37:00:36:16:43:b5:09:d5:97:26:85:1e:19:21:35:bb: 6f:33:0c:31:74:7b:f0:33:fe:51:ef:f2:76:ee:d4:cf: 2e:0c:c0:e2:de:b3:32:33:2c:fe:f0:33:70:86:aa:c2: 38:05:04:45:96:a4:19:18:58:c7:2d:68:12:14:b9:9b: 1e:8f:ea:a3:65:dc:cb:8f:a9:85:87:85:a7:a1:2f:b2: 26:5a:eb:d3:b5:26:2c:f4:b5:1d:f6:a9:96:8f:b3:75: c8:8e:c6:a8:01:38:85:62:38:e7:fd:73:c3:ff:31:c7: 0d:79:fe:a3:2c:7a:f2:aa:22:0c:f1:c2:cc:66:02:fa: 9b:26:7d:a5:b0:fb:2c:d8:6d:2f:bc:f8:6b:c4:14:e1: 45:91:8e:e4:33:00:4c:be:48:0e:17:4c:b9:01:4d:ee: 4c:1f:0a:49:9e:08:6f:e0:4b:32:74:04:a2:8e:e2:87: d5:1e:97:8d:e9:58:68:45:ce:c6:90:08:82:7d:73:8e: 2a:36:1e:1c:bb:03:85:be:07:b5:db:8c:42:45:79:5f Fingerprint (SHA-256): 26:7A:7A:8A:E5:91:8E:69:65:89:DE:F5:CD:4C:84:5A:08:50:8D:03:65:E1:BA:93:F5:D4:88:4C:EA:E9:2E:D5 Fingerprint (SHA1): 1D:F1:E7:B8:29:5C:74:2F:B4:0C:C8:6D:BF:97:60:95:43:D3:B3:2E Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #14525: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #14526: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #14527: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181960 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14528: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #14529: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14530: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14531: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108181961 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14532: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14533: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14534: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14535: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108181962 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14536: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14537: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #14538: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14539: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 108181963 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14540: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14541: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #14542: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181964 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14543: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #14544: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #14545: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14546: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 108181965 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14547: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14548: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #14549: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14550: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 108181966 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14551: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14552: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #14553: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #14554: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #14555: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181960 (0x672b9c8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 23:51:24 2016 Not After : Fri Jan 08 23:51:24 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:44:e3:45:d0:0e:82:f3:fe:50:94:24:d8:a9:27:d9: d8:f0:3d:7e:29:58:29:74:30:2b:7e:69:47:37:fd:f1: 2e:a4:d8:a8:aa:26:96:ce:df:3d:b5:84:05:45:98:71: 78:c5:11:e2:dd:e3:58:63:16:f9:b4:fd:d2:0f:81:29: 4f:73:3b:4b:bf:a2:1b:2a:8a:b4:79:0c:18:17:dd:7d: 58:a6:ba:e5:2b:46:4c:0c:98:12:f9:d2:81:0f:ec:7f: 8a:c5:0f:39:50:32:9e:21:c9:c0:17:9d:74:78:e4:e7: 24:50:90:9f:ac:a5:d1:09:e8:48:25:47:f8:c9:7a:53: d2:80:d5:d2:70:d8:aa:ae:2a:0a:3c:a5:e9:e4:8e:7d: 0f:26:31:ef:66:21:5d:8e:15:2b:47:d8:30:a1:f5:92: 8d:6c:c9:e8:e7:b5:7f:b8:93:e7:c6:02:3d:0a:51:d1: 9d:29:17:41:74:0d:87:31:5b:bb:12:69:39:14:bf:ab: 0f:fe:82:04:5c:64:fd:13:97:5e:7e:d4:45:57:ef:14: d0:5d:bd:2f:4a:d7:fc:fb:4d:51:4b:7c:64:d9:b6:99: 9f:6c:b9:b9:55:ba:0c:0e:81:37:6c:e3:30:19:be:6f: 4e:61:d4:60:36:c9:de:47:c9:09:ec:11:2c:6a:fc:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:7b:61:87:62:00:fd:80:03:9a:2b:21:5b:02:ac:2b: 47:8e:d6:6c:24:6b:4e:b2:8b:be:74:cd:64:01:4c:44: 64:f3:b8:28:ca:07:97:c3:97:11:eb:d6:e6:75:50:bf: 9e:a1:87:60:b5:27:47:a2:ac:d0:12:e7:95:39:1d:d8: e0:f7:2f:54:64:aa:58:8c:50:91:d7:f3:d2:8d:f8:fa: a6:12:62:72:1b:9d:aa:7e:fb:b6:27:c0:a3:0b:fc:69: b7:ce:0e:ea:66:3e:3f:01:f6:a8:5a:ad:46:18:d7:cd: ca:f7:89:75:92:29:29:58:68:17:84:1d:7c:3e:1d:e7: 2c:ce:3e:aa:68:1f:94:7f:8a:3a:5b:ab:21:4f:e3:32: e5:9a:e2:12:30:08:64:38:8e:21:a9:69:62:00:ed:e7: c6:aa:42:dd:ef:27:4b:d0:16:f6:eb:5f:52:59:de:3a: e5:2b:c3:30:8a:d5:2f:a1:25:b9:62:6c:07:d0:07:47: b4:79:bd:2b:b0:80:f8:91:9f:01:61:42:6f:87:84:69: 03:10:0f:47:b1:bf:c7:4c:2d:69:70:bf:c3:50:b9:89: e0:8c:53:61:50:f1:88:ae:72:bf:d4:eb:aa:e2:d0:10: b3:c6:1c:53:a7:09:b8:25:3b:a7:25:80:e6:c1:2f:91 Fingerprint (SHA-256): 13:55:54:E6:67:BC:9C:E1:F8:24:01:C5:2F:4D:6D:CC:4A:FB:FF:B1:0B:E8:2F:E6:9F:04:81:FF:54:7E:BE:B5 Fingerprint (SHA1): 0B:C9:E0:2C:04:58:CF:95:CF:77:4F:95:48:B4:23:49:02:58:E9:AC Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14556: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181962 (0x672b9ca) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 23:51:47 2016 Not After : Fri Jan 08 23:51:47 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:c2:ed:17:71:20:14:e2:83:ed:96:2c:60:d0:28:82: 13:57:b9:1b:c2:94:cd:1f:f4:fe:39:9e:86:c0:c9:01: 78:03:ea:3e:80:5a:b1:3f:d1:ed:69:fd:5c:9d:0a:66: 59:1a:59:38:9f:a2:95:95:7a:60:5f:45:6c:11:1a:91: 7a:02:39:eb:b6:50:5f:d6:2e:b6:40:86:77:56:98:6b: 97:28:81:1c:a3:8a:d9:a0:79:70:05:d1:ff:2a:be:d9: 1a:82:c6:bc:ae:16:34:0b:73:d6:69:6c:32:28:65:5a: 13:8d:53:7a:8f:31:12:00:55:e5:ca:c4:f7:02:5b:f8: 6b:5f:1a:8b:e0:3a:7b:72:37:59:02:4c:58:74:a2:d5: 05:35:00:64:29:40:db:82:fb:d4:a4:60:91:17:84:0e: 83:96:f2:21:19:1c:38:52:0c:8e:dc:29:6a:31:51:20: be:a2:ea:7c:29:92:b8:27:8c:8c:4c:1e:b6:e2:e8:44: cc:c4:bb:65:cb:bd:77:07:d0:8d:3a:c8:93:4c:55:74: ab:a2:a1:21:ad:13:93:13:e2:c7:a8:bd:b4:5e:4d:ee: 90:93:ed:a2:77:ce:f0:60:7f:44:c4:06:ce:5f:09:3f: 9c:c0:b2:f1:9e:87:da:c4:a7:3b:b2:76:f0:2c:46:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:ca:fd:3e:ec:3d:c9:c8:e3:b3:56:b6:e7:e5:d0:81: d8:c9:c3:e4:b6:f0:9a:0f:c1:b0:3b:09:e2:23:9e:72: 43:3e:35:75:73:5d:77:26:1c:12:73:53:8c:7b:7c:3c: cd:35:9d:5f:16:a3:09:e5:f0:75:08:80:01:8d:3b:ee: 50:ad:59:86:bd:17:b5:fa:7f:92:59:5a:c3:11:d9:34: b9:39:04:e9:a7:0f:a6:77:73:05:4e:1f:81:42:0a:2e: 8f:c4:91:1d:75:55:61:54:a7:3c:59:b1:0a:76:84:ec: 07:97:21:dd:53:58:b7:da:2b:d7:21:b4:42:92:19:4a: 31:a0:87:e8:b4:84:d4:ad:06:75:3d:75:4a:6f:61:34: 80:2a:38:65:1c:45:6c:5e:b3:69:d2:cd:d6:56:8d:be: b5:2e:0a:be:96:63:a9:9b:a5:95:80:3e:99:f0:39:91: 4e:36:93:1c:df:c0:01:d5:e3:97:82:c9:5a:57:1d:76: 88:9e:d8:74:8a:9f:e1:62:03:8a:c1:0a:f8:ee:ec:d7: 9f:64:df:b1:f5:73:54:95:b9:58:2c:a8:aa:2d:af:ea: d1:57:79:40:43:93:c6:18:54:77:12:b2:85:26:fc:cc: 51:0b:2d:62:9a:d7:33:b1:d7:95:49:81:4f:a8:4b:d3 Fingerprint (SHA-256): 76:53:01:D2:A9:81:39:F0:2E:9E:6D:08:41:33:6F:33:FC:4C:5D:58:B6:89:F9:2A:D5:F2:02:DC:2B:BA:09:D1 Fingerprint (SHA1): 03:B7:B2:E2:69:F4:5A:CA:FB:89:54:3E:A2:38:20:44:F2:D6:AE:FB Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #14557: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181960 (0x672b9c8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 23:51:24 2016 Not After : Fri Jan 08 23:51:24 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:44:e3:45:d0:0e:82:f3:fe:50:94:24:d8:a9:27:d9: d8:f0:3d:7e:29:58:29:74:30:2b:7e:69:47:37:fd:f1: 2e:a4:d8:a8:aa:26:96:ce:df:3d:b5:84:05:45:98:71: 78:c5:11:e2:dd:e3:58:63:16:f9:b4:fd:d2:0f:81:29: 4f:73:3b:4b:bf:a2:1b:2a:8a:b4:79:0c:18:17:dd:7d: 58:a6:ba:e5:2b:46:4c:0c:98:12:f9:d2:81:0f:ec:7f: 8a:c5:0f:39:50:32:9e:21:c9:c0:17:9d:74:78:e4:e7: 24:50:90:9f:ac:a5:d1:09:e8:48:25:47:f8:c9:7a:53: d2:80:d5:d2:70:d8:aa:ae:2a:0a:3c:a5:e9:e4:8e:7d: 0f:26:31:ef:66:21:5d:8e:15:2b:47:d8:30:a1:f5:92: 8d:6c:c9:e8:e7:b5:7f:b8:93:e7:c6:02:3d:0a:51:d1: 9d:29:17:41:74:0d:87:31:5b:bb:12:69:39:14:bf:ab: 0f:fe:82:04:5c:64:fd:13:97:5e:7e:d4:45:57:ef:14: d0:5d:bd:2f:4a:d7:fc:fb:4d:51:4b:7c:64:d9:b6:99: 9f:6c:b9:b9:55:ba:0c:0e:81:37:6c:e3:30:19:be:6f: 4e:61:d4:60:36:c9:de:47:c9:09:ec:11:2c:6a:fc:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:7b:61:87:62:00:fd:80:03:9a:2b:21:5b:02:ac:2b: 47:8e:d6:6c:24:6b:4e:b2:8b:be:74:cd:64:01:4c:44: 64:f3:b8:28:ca:07:97:c3:97:11:eb:d6:e6:75:50:bf: 9e:a1:87:60:b5:27:47:a2:ac:d0:12:e7:95:39:1d:d8: e0:f7:2f:54:64:aa:58:8c:50:91:d7:f3:d2:8d:f8:fa: a6:12:62:72:1b:9d:aa:7e:fb:b6:27:c0:a3:0b:fc:69: b7:ce:0e:ea:66:3e:3f:01:f6:a8:5a:ad:46:18:d7:cd: ca:f7:89:75:92:29:29:58:68:17:84:1d:7c:3e:1d:e7: 2c:ce:3e:aa:68:1f:94:7f:8a:3a:5b:ab:21:4f:e3:32: e5:9a:e2:12:30:08:64:38:8e:21:a9:69:62:00:ed:e7: c6:aa:42:dd:ef:27:4b:d0:16:f6:eb:5f:52:59:de:3a: e5:2b:c3:30:8a:d5:2f:a1:25:b9:62:6c:07:d0:07:47: b4:79:bd:2b:b0:80:f8:91:9f:01:61:42:6f:87:84:69: 03:10:0f:47:b1:bf:c7:4c:2d:69:70:bf:c3:50:b9:89: e0:8c:53:61:50:f1:88:ae:72:bf:d4:eb:aa:e2:d0:10: b3:c6:1c:53:a7:09:b8:25:3b:a7:25:80:e6:c1:2f:91 Fingerprint (SHA-256): 13:55:54:E6:67:BC:9C:E1:F8:24:01:C5:2F:4D:6D:CC:4A:FB:FF:B1:0B:E8:2F:E6:9F:04:81:FF:54:7E:BE:B5 Fingerprint (SHA1): 0B:C9:E0:2C:04:58:CF:95:CF:77:4F:95:48:B4:23:49:02:58:E9:AC Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14558: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #14559: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181960 (0x672b9c8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 23:51:24 2016 Not After : Fri Jan 08 23:51:24 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:44:e3:45:d0:0e:82:f3:fe:50:94:24:d8:a9:27:d9: d8:f0:3d:7e:29:58:29:74:30:2b:7e:69:47:37:fd:f1: 2e:a4:d8:a8:aa:26:96:ce:df:3d:b5:84:05:45:98:71: 78:c5:11:e2:dd:e3:58:63:16:f9:b4:fd:d2:0f:81:29: 4f:73:3b:4b:bf:a2:1b:2a:8a:b4:79:0c:18:17:dd:7d: 58:a6:ba:e5:2b:46:4c:0c:98:12:f9:d2:81:0f:ec:7f: 8a:c5:0f:39:50:32:9e:21:c9:c0:17:9d:74:78:e4:e7: 24:50:90:9f:ac:a5:d1:09:e8:48:25:47:f8:c9:7a:53: d2:80:d5:d2:70:d8:aa:ae:2a:0a:3c:a5:e9:e4:8e:7d: 0f:26:31:ef:66:21:5d:8e:15:2b:47:d8:30:a1:f5:92: 8d:6c:c9:e8:e7:b5:7f:b8:93:e7:c6:02:3d:0a:51:d1: 9d:29:17:41:74:0d:87:31:5b:bb:12:69:39:14:bf:ab: 0f:fe:82:04:5c:64:fd:13:97:5e:7e:d4:45:57:ef:14: d0:5d:bd:2f:4a:d7:fc:fb:4d:51:4b:7c:64:d9:b6:99: 9f:6c:b9:b9:55:ba:0c:0e:81:37:6c:e3:30:19:be:6f: 4e:61:d4:60:36:c9:de:47:c9:09:ec:11:2c:6a:fc:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:7b:61:87:62:00:fd:80:03:9a:2b:21:5b:02:ac:2b: 47:8e:d6:6c:24:6b:4e:b2:8b:be:74:cd:64:01:4c:44: 64:f3:b8:28:ca:07:97:c3:97:11:eb:d6:e6:75:50:bf: 9e:a1:87:60:b5:27:47:a2:ac:d0:12:e7:95:39:1d:d8: e0:f7:2f:54:64:aa:58:8c:50:91:d7:f3:d2:8d:f8:fa: a6:12:62:72:1b:9d:aa:7e:fb:b6:27:c0:a3:0b:fc:69: b7:ce:0e:ea:66:3e:3f:01:f6:a8:5a:ad:46:18:d7:cd: ca:f7:89:75:92:29:29:58:68:17:84:1d:7c:3e:1d:e7: 2c:ce:3e:aa:68:1f:94:7f:8a:3a:5b:ab:21:4f:e3:32: e5:9a:e2:12:30:08:64:38:8e:21:a9:69:62:00:ed:e7: c6:aa:42:dd:ef:27:4b:d0:16:f6:eb:5f:52:59:de:3a: e5:2b:c3:30:8a:d5:2f:a1:25:b9:62:6c:07:d0:07:47: b4:79:bd:2b:b0:80:f8:91:9f:01:61:42:6f:87:84:69: 03:10:0f:47:b1:bf:c7:4c:2d:69:70:bf:c3:50:b9:89: e0:8c:53:61:50:f1:88:ae:72:bf:d4:eb:aa:e2:d0:10: b3:c6:1c:53:a7:09:b8:25:3b:a7:25:80:e6:c1:2f:91 Fingerprint (SHA-256): 13:55:54:E6:67:BC:9C:E1:F8:24:01:C5:2F:4D:6D:CC:4A:FB:FF:B1:0B:E8:2F:E6:9F:04:81:FF:54:7E:BE:B5 Fingerprint (SHA1): 0B:C9:E0:2C:04:58:CF:95:CF:77:4F:95:48:B4:23:49:02:58:E9:AC Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14560: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181962 (0x672b9ca) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 23:51:47 2016 Not After : Fri Jan 08 23:51:47 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:c2:ed:17:71:20:14:e2:83:ed:96:2c:60:d0:28:82: 13:57:b9:1b:c2:94:cd:1f:f4:fe:39:9e:86:c0:c9:01: 78:03:ea:3e:80:5a:b1:3f:d1:ed:69:fd:5c:9d:0a:66: 59:1a:59:38:9f:a2:95:95:7a:60:5f:45:6c:11:1a:91: 7a:02:39:eb:b6:50:5f:d6:2e:b6:40:86:77:56:98:6b: 97:28:81:1c:a3:8a:d9:a0:79:70:05:d1:ff:2a:be:d9: 1a:82:c6:bc:ae:16:34:0b:73:d6:69:6c:32:28:65:5a: 13:8d:53:7a:8f:31:12:00:55:e5:ca:c4:f7:02:5b:f8: 6b:5f:1a:8b:e0:3a:7b:72:37:59:02:4c:58:74:a2:d5: 05:35:00:64:29:40:db:82:fb:d4:a4:60:91:17:84:0e: 83:96:f2:21:19:1c:38:52:0c:8e:dc:29:6a:31:51:20: be:a2:ea:7c:29:92:b8:27:8c:8c:4c:1e:b6:e2:e8:44: cc:c4:bb:65:cb:bd:77:07:d0:8d:3a:c8:93:4c:55:74: ab:a2:a1:21:ad:13:93:13:e2:c7:a8:bd:b4:5e:4d:ee: 90:93:ed:a2:77:ce:f0:60:7f:44:c4:06:ce:5f:09:3f: 9c:c0:b2:f1:9e:87:da:c4:a7:3b:b2:76:f0:2c:46:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:ca:fd:3e:ec:3d:c9:c8:e3:b3:56:b6:e7:e5:d0:81: d8:c9:c3:e4:b6:f0:9a:0f:c1:b0:3b:09:e2:23:9e:72: 43:3e:35:75:73:5d:77:26:1c:12:73:53:8c:7b:7c:3c: cd:35:9d:5f:16:a3:09:e5:f0:75:08:80:01:8d:3b:ee: 50:ad:59:86:bd:17:b5:fa:7f:92:59:5a:c3:11:d9:34: b9:39:04:e9:a7:0f:a6:77:73:05:4e:1f:81:42:0a:2e: 8f:c4:91:1d:75:55:61:54:a7:3c:59:b1:0a:76:84:ec: 07:97:21:dd:53:58:b7:da:2b:d7:21:b4:42:92:19:4a: 31:a0:87:e8:b4:84:d4:ad:06:75:3d:75:4a:6f:61:34: 80:2a:38:65:1c:45:6c:5e:b3:69:d2:cd:d6:56:8d:be: b5:2e:0a:be:96:63:a9:9b:a5:95:80:3e:99:f0:39:91: 4e:36:93:1c:df:c0:01:d5:e3:97:82:c9:5a:57:1d:76: 88:9e:d8:74:8a:9f:e1:62:03:8a:c1:0a:f8:ee:ec:d7: 9f:64:df:b1:f5:73:54:95:b9:58:2c:a8:aa:2d:af:ea: d1:57:79:40:43:93:c6:18:54:77:12:b2:85:26:fc:cc: 51:0b:2d:62:9a:d7:33:b1:d7:95:49:81:4f:a8:4b:d3 Fingerprint (SHA-256): 76:53:01:D2:A9:81:39:F0:2E:9E:6D:08:41:33:6F:33:FC:4C:5D:58:B6:89:F9:2A:D5:F2:02:DC:2B:BA:09:D1 Fingerprint (SHA1): 03:B7:B2:E2:69:F4:5A:CA:FB:89:54:3E:A2:38:20:44:F2:D6:AE:FB Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #14561: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #14562: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #14563: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #14564: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181960 (0x672b9c8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 23:51:24 2016 Not After : Fri Jan 08 23:51:24 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:44:e3:45:d0:0e:82:f3:fe:50:94:24:d8:a9:27:d9: d8:f0:3d:7e:29:58:29:74:30:2b:7e:69:47:37:fd:f1: 2e:a4:d8:a8:aa:26:96:ce:df:3d:b5:84:05:45:98:71: 78:c5:11:e2:dd:e3:58:63:16:f9:b4:fd:d2:0f:81:29: 4f:73:3b:4b:bf:a2:1b:2a:8a:b4:79:0c:18:17:dd:7d: 58:a6:ba:e5:2b:46:4c:0c:98:12:f9:d2:81:0f:ec:7f: 8a:c5:0f:39:50:32:9e:21:c9:c0:17:9d:74:78:e4:e7: 24:50:90:9f:ac:a5:d1:09:e8:48:25:47:f8:c9:7a:53: d2:80:d5:d2:70:d8:aa:ae:2a:0a:3c:a5:e9:e4:8e:7d: 0f:26:31:ef:66:21:5d:8e:15:2b:47:d8:30:a1:f5:92: 8d:6c:c9:e8:e7:b5:7f:b8:93:e7:c6:02:3d:0a:51:d1: 9d:29:17:41:74:0d:87:31:5b:bb:12:69:39:14:bf:ab: 0f:fe:82:04:5c:64:fd:13:97:5e:7e:d4:45:57:ef:14: d0:5d:bd:2f:4a:d7:fc:fb:4d:51:4b:7c:64:d9:b6:99: 9f:6c:b9:b9:55:ba:0c:0e:81:37:6c:e3:30:19:be:6f: 4e:61:d4:60:36:c9:de:47:c9:09:ec:11:2c:6a:fc:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:7b:61:87:62:00:fd:80:03:9a:2b:21:5b:02:ac:2b: 47:8e:d6:6c:24:6b:4e:b2:8b:be:74:cd:64:01:4c:44: 64:f3:b8:28:ca:07:97:c3:97:11:eb:d6:e6:75:50:bf: 9e:a1:87:60:b5:27:47:a2:ac:d0:12:e7:95:39:1d:d8: e0:f7:2f:54:64:aa:58:8c:50:91:d7:f3:d2:8d:f8:fa: a6:12:62:72:1b:9d:aa:7e:fb:b6:27:c0:a3:0b:fc:69: b7:ce:0e:ea:66:3e:3f:01:f6:a8:5a:ad:46:18:d7:cd: ca:f7:89:75:92:29:29:58:68:17:84:1d:7c:3e:1d:e7: 2c:ce:3e:aa:68:1f:94:7f:8a:3a:5b:ab:21:4f:e3:32: e5:9a:e2:12:30:08:64:38:8e:21:a9:69:62:00:ed:e7: c6:aa:42:dd:ef:27:4b:d0:16:f6:eb:5f:52:59:de:3a: e5:2b:c3:30:8a:d5:2f:a1:25:b9:62:6c:07:d0:07:47: b4:79:bd:2b:b0:80:f8:91:9f:01:61:42:6f:87:84:69: 03:10:0f:47:b1:bf:c7:4c:2d:69:70:bf:c3:50:b9:89: e0:8c:53:61:50:f1:88:ae:72:bf:d4:eb:aa:e2:d0:10: b3:c6:1c:53:a7:09:b8:25:3b:a7:25:80:e6:c1:2f:91 Fingerprint (SHA-256): 13:55:54:E6:67:BC:9C:E1:F8:24:01:C5:2F:4D:6D:CC:4A:FB:FF:B1:0B:E8:2F:E6:9F:04:81:FF:54:7E:BE:B5 Fingerprint (SHA1): 0B:C9:E0:2C:04:58:CF:95:CF:77:4F:95:48:B4:23:49:02:58:E9:AC Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14565: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181964 (0x672b9cc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Jan 08 23:52:05 2016 Not After : Fri Jan 08 23:52:05 2066 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:35:dd:dd:d4:25:1e:a8:42:14:51:25:2c:86:37:ba: c4:e7:3a:82:28:bf:5c:4f:d1:f2:63:31:0a:4d:53:7a: d4:20:5f:8b:e0:7f:e6:ee:48:bf:79:ce:cd:8f:bc:76: 5a:dc:55:ff:5a:78:1c:03:94:31:87:f5:a4:18:d1:4d: a3:27:bc:0e:45:60:95:0f:ac:29:df:c8:76:c7:ec:90: 77:b1:69:18:40:55:55:b1:d8:fd:be:4d:c7:41:cb:22: 9d:0d:b0:ac:5e:af:5c:0b:18:ba:08:5f:b3:f8:58:19: 20:a2:83:60:85:ae:35:37:b7:5a:e2:9a:56:a8:8a:fd: 7b:85:a4:15:ad:84:34:8e:e6:32:0e:85:ae:32:e3:61: 51:53:ba:df:f6:03:3a:3a:74:93:27:f5:81:2d:86:24: b3:7b:7b:2a:90:de:5f:82:8c:86:d8:58:eb:9f:6c:2e: b0:f1:6a:77:62:c4:06:5f:4f:94:23:09:dc:0f:45:4a: 51:f3:2c:13:aa:95:f1:a1:87:58:4d:3b:3a:2b:59:f3: 07:e1:4e:55:a3:59:8c:c7:98:f7:ec:6e:78:31:f6:26: 5f:b0:41:57:b6:21:c9:4e:e0:b4:b4:64:0f:24:29:bc: f3:bb:40:07:b3:f2:62:37:ee:6b:27:8c:a2:a2:b3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:41:c5:d9:03:91:15:49:53:9e:3b:a1:a3:44:21:e4: 39:f7:6e:67:8d:62:d1:73:f6:ea:03:e3:0d:e7:9b:8c: ec:c5:d2:62:53:f4:d0:d6:45:28:8d:45:8e:75:28:f3: 80:3a:98:b3:46:f2:ea:83:bf:4e:81:95:76:b5:4d:be: a2:17:b7:76:6f:09:49:e8:cd:d4:73:f9:96:82:ea:aa: 49:de:a7:22:a3:26:34:64:10:6c:48:a0:bf:8a:58:51: 1f:8a:7c:2c:d9:aa:fc:31:7d:4d:b3:20:d0:08:1c:6a: 03:b5:4a:38:b9:ec:9e:e5:42:1e:2d:d3:cb:bb:02:c8: 96:1c:20:5c:37:fe:e4:f5:f7:56:2b:6a:f8:94:1e:46: 43:9e:b3:83:13:1f:e4:8d:53:3c:32:21:bc:89:b2:62: 39:e5:23:29:bb:0b:3b:8f:45:39:51:18:4f:5a:f6:a8: ce:68:54:2a:cf:1c:8d:ab:18:2c:a3:9f:1e:b0:d4:3d: da:72:72:93:ea:c8:53:1d:fa:3d:e5:e3:7c:99:7b:67: 77:1b:ed:5b:34:ef:b4:75:0f:59:4e:ad:d3:dc:c1:c3: c5:2c:36:a9:92:f4:fc:f4:71:6a:0a:d6:26:9d:94:83: d3:30:4f:5a:ec:ed:00:1c:61:96:61:01:f4:e2:fa:6d Fingerprint (SHA-256): 4E:FD:E4:85:80:1F:A9:61:55:0C:E7:8A:AE:66:55:18:DA:5C:B3:BE:66:CF:91:FF:6F:66:3A:E3:E5:F6:10:40 Fingerprint (SHA1): BA:DC:F6:07:C0:80:B0:94:FA:89:96:AC:C9:56:3C:88:B6:04:51:54 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #14566: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181960 (0x672b9c8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Jan 08 23:51:24 2016 Not After : Fri Jan 08 23:51:24 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:44:e3:45:d0:0e:82:f3:fe:50:94:24:d8:a9:27:d9: d8:f0:3d:7e:29:58:29:74:30:2b:7e:69:47:37:fd:f1: 2e:a4:d8:a8:aa:26:96:ce:df:3d:b5:84:05:45:98:71: 78:c5:11:e2:dd:e3:58:63:16:f9:b4:fd:d2:0f:81:29: 4f:73:3b:4b:bf:a2:1b:2a:8a:b4:79:0c:18:17:dd:7d: 58:a6:ba:e5:2b:46:4c:0c:98:12:f9:d2:81:0f:ec:7f: 8a:c5:0f:39:50:32:9e:21:c9:c0:17:9d:74:78:e4:e7: 24:50:90:9f:ac:a5:d1:09:e8:48:25:47:f8:c9:7a:53: d2:80:d5:d2:70:d8:aa:ae:2a:0a:3c:a5:e9:e4:8e:7d: 0f:26:31:ef:66:21:5d:8e:15:2b:47:d8:30:a1:f5:92: 8d:6c:c9:e8:e7:b5:7f:b8:93:e7:c6:02:3d:0a:51:d1: 9d:29:17:41:74:0d:87:31:5b:bb:12:69:39:14:bf:ab: 0f:fe:82:04:5c:64:fd:13:97:5e:7e:d4:45:57:ef:14: d0:5d:bd:2f:4a:d7:fc:fb:4d:51:4b:7c:64:d9:b6:99: 9f:6c:b9:b9:55:ba:0c:0e:81:37:6c:e3:30:19:be:6f: 4e:61:d4:60:36:c9:de:47:c9:09:ec:11:2c:6a:fc:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:7b:61:87:62:00:fd:80:03:9a:2b:21:5b:02:ac:2b: 47:8e:d6:6c:24:6b:4e:b2:8b:be:74:cd:64:01:4c:44: 64:f3:b8:28:ca:07:97:c3:97:11:eb:d6:e6:75:50:bf: 9e:a1:87:60:b5:27:47:a2:ac:d0:12:e7:95:39:1d:d8: e0:f7:2f:54:64:aa:58:8c:50:91:d7:f3:d2:8d:f8:fa: a6:12:62:72:1b:9d:aa:7e:fb:b6:27:c0:a3:0b:fc:69: b7:ce:0e:ea:66:3e:3f:01:f6:a8:5a:ad:46:18:d7:cd: ca:f7:89:75:92:29:29:58:68:17:84:1d:7c:3e:1d:e7: 2c:ce:3e:aa:68:1f:94:7f:8a:3a:5b:ab:21:4f:e3:32: e5:9a:e2:12:30:08:64:38:8e:21:a9:69:62:00:ed:e7: c6:aa:42:dd:ef:27:4b:d0:16:f6:eb:5f:52:59:de:3a: e5:2b:c3:30:8a:d5:2f:a1:25:b9:62:6c:07:d0:07:47: b4:79:bd:2b:b0:80:f8:91:9f:01:61:42:6f:87:84:69: 03:10:0f:47:b1:bf:c7:4c:2d:69:70:bf:c3:50:b9:89: e0:8c:53:61:50:f1:88:ae:72:bf:d4:eb:aa:e2:d0:10: b3:c6:1c:53:a7:09:b8:25:3b:a7:25:80:e6:c1:2f:91 Fingerprint (SHA-256): 13:55:54:E6:67:BC:9C:E1:F8:24:01:C5:2F:4D:6D:CC:4A:FB:FF:B1:0B:E8:2F:E6:9F:04:81:FF:54:7E:BE:B5 Fingerprint (SHA1): 0B:C9:E0:2C:04:58:CF:95:CF:77:4F:95:48:B4:23:49:02:58:E9:AC Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14567: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #14568: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #14569: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #14570: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #14571: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #14572: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181965 (0x672b9cd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Jan 08 23:52:17 2016 Not After : Fri Jan 08 23:52:17 2021 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:07:a4:07:b6:de:43:f5:95:26:19:75:dd:29:f2:26: 14:2b:87:23:98:c4:ee:7d:da:1d:05:55:8e:76:20:7d: ac:2f:9b:4e:28:0f:d1:73:25:e2:80:3f:98:af:2f:63: 47:93:15:0c:73:cc:98:d1:ff:47:09:98:33:59:c8:41: ef:9b:26:b2:bf:8c:37:a5:05:d6:83:f2:48:0e:8f:ca: 94:fe:87:38:e2:51:58:5a:8a:c5:48:80:aa:0b:46:c6: 81:49:17:2a:d2:f4:94:a9:07:b3:ec:66:53:4e:bd:78: 32:e1:79:ad:2c:21:9a:23:e6:ea:92:13:0d:5e:d9:38: 78:8e:26:9b:44:24:1c:12:2a:0e:9b:d6:78:ab:1f:5b: c7:71:1b:3b:45:12:af:9b:bd:cc:f2:0f:4e:38:3b:cb: 93:4c:bf:91:9d:5a:23:d1:cd:70:e0:fb:f0:32:44:b5: 60:4c:d4:85:44:0b:25:f8:86:f3:6c:96:6f:aa:a1:5a: 20:2e:ef:bf:51:73:13:42:7d:b7:1d:8e:74:fe:fb:a6: 5d:cc:bb:65:2c:85:b7:30:11:2b:f3:fa:b5:cc:83:7f: b2:72:16:98:89:a3:d1:11:65:ac:1a:fc:19:a1:ba:2d: 19:df:60:11:1e:12:3d:62:10:51:b9:c1:13:63:08:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:df:28:77:c9:dc:f5:97:ca:ad:d6:b1:3b:2c:2f:7b: fe:8d:bb:89:81:92:4f:cd:87:a8:b3:35:cd:9f:55:d4: 1e:0f:b5:88:ef:07:4a:0e:16:25:2d:3f:6c:e6:3e:67: ce:89:1b:31:6a:6e:e8:8d:99:44:6e:6d:c5:65:17:4e: e1:3e:78:67:97:a1:a7:08:3d:7a:8e:4a:5f:c1:f4:e6: 40:fd:c2:ae:31:f4:54:2b:c7:08:dd:53:92:61:96:f6: 1e:fc:7f:80:a8:7c:79:bc:50:ce:bb:e2:71:02:cc:68: d0:d4:78:ea:45:c1:5e:bf:83:79:8a:6c:e6:60:b4:2c: a4:65:c1:6a:24:13:e1:d6:f8:54:8d:39:4f:d5:9c:26: bb:d1:d1:a2:ae:27:93:5f:ef:49:54:7c:d3:09:ee:9f: 04:01:2f:05:0f:53:8d:19:b6:c8:f5:ae:3a:b9:ee:f2: 3b:65:a2:e3:fb:19:7e:4c:7d:ed:e6:86:72:a6:21:57: 39:29:af:52:da:ba:bc:41:a0:e4:af:a6:c5:27:81:98: ed:ad:3f:86:a8:59:a0:35:fd:4d:55:71:e8:80:73:34: 03:50:b2:ff:c5:80:0f:ca:e3:ec:cc:f4:b6:d0:b0:0d: 26:b3:7c:bd:38:da:3e:2e:cd:db:25:be:18:fa:00:5e Fingerprint (SHA-256): 26:15:83:42:FE:78:28:D2:50:74:7B:7E:C6:01:EB:7B:6A:76:14:D5:DD:CA:33:A0:CA:33:24:B9:E3:C3:BD:69 Fingerprint (SHA1): 0A:63:76:52:4D:57:B6:DB:0D:1E:7F:28:10:F3:05:A5:04:AE:89:88 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #14573: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #14574: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #14575: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #14576: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #14577: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #14578: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #14579: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #14580: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #14581: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #14582: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #14583: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #14584: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #14585: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #14586: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #14587: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #14588: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #14589: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #14590: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #14591: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #14592: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #14593: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #14594: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #14595: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #14596: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED trying to kill httpserv with PID 28749 at Fri Jan 8 18:53:01 EST 2016 kill -USR1 28749 httpserv: normal termination httpserv -b -p 9169 2>/dev/null; httpserv with PID 28749 killed at Fri Jan 8 18:53:01 EST 2016 httpserv starting at Fri Jan 8 18:53:01 EST 2016 httpserv -D -p 9169 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O get-unknown -d /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.27064 & trying to connect to httpserv at Fri Jan 8 18:53:01 EST 2016 tstclnt -p 9169 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to httpserv at Fri Jan 8 18:53:07 EST 2016 tstclnt -p 9169 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #14597: Waiting for Server - FAILED kill -0 11816 >/dev/null 2>/dev/null httpserv with PID 11816 found at Fri Jan 8 18:53:07 EST 2016 httpserv with PID 11816 started at Fri Jan 8 18:53:07 EST 2016 chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #14598: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181967 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14599: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #14600: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #14601: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181968 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14602: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #14603: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #14604: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14605: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108181969 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14606: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14607: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108181970 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14608: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14609: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #14610: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #14611: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14612: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 108181971 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14613: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14614: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14615: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #14616: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #14617: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181968 (0x672b9d0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 23:53:30 2016 Not After : Fri Jan 08 23:53:30 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:40:d4:a1:ff:20:aa:96:ba:0a:b1:82:8c:ea:82:30: 30:4e:78:a6:95:e7:75:c0:75:fa:d8:42:96:bc:a9:91: a8:bf:39:18:45:e2:e0:54:c5:d0:9e:08:43:bf:6a:d4: 80:a9:fd:b0:f6:48:11:09:66:8d:31:36:a2:05:e1:31: 93:4e:25:e2:58:6a:65:5b:19:bf:c0:b2:1e:c8:69:04: 23:5b:b9:61:9d:24:8b:e0:fe:4f:a9:ee:36:16:37:b6: c2:1a:db:f2:16:29:db:bc:40:ff:a5:b0:20:dd:b5:b8: af:e5:3f:38:52:f6:76:03:3a:c4:86:34:31:99:cd:f8: 05:11:d8:40:32:88:89:3d:ce:a4:c2:16:d3:46:50:9f: aa:41:9c:07:f2:38:ba:24:a3:07:ad:dd:de:34:ab:1c: c5:f5:58:4c:ef:cf:5e:15:5c:72:97:36:f5:0d:90:f0: 23:6c:46:38:82:6a:78:05:db:ff:77:6c:54:b9:05:01: ea:c4:49:cd:7d:0c:4c:fe:57:63:cf:bd:e9:5f:5f:04: de:a3:1a:c1:d8:64:ef:1c:c9:ed:10:52:08:53:c1:b5: 86:cd:00:ac:61:3a:19:aa:7b:b9:f7:8c:3f:fa:c8:14: 37:f7:9e:3d:f8:5c:07:ea:b9:37:88:33:58:7e:29:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:12:ad:04:29:5d:6c:3a:f2:f9:34:7c:9f:5a:1f:da: aa:f3:96:35:41:4c:85:7b:16:cf:2c:39:82:91:9f:7d: 73:ba:e6:4a:39:72:94:e3:54:c4:e0:ef:91:bd:9b:0a: 14:e9:a7:ba:4d:5e:ed:e7:6a:88:9c:df:a8:da:c0:2d: 4b:29:4a:98:07:7a:d1:9e:1a:c4:72:29:fa:f3:67:3f: e1:d0:a6:76:26:bd:ed:fa:ad:78:7f:4e:fb:fc:0e:ee: db:5d:87:80:aa:e3:f5:8d:08:98:83:ed:62:b9:73:57: ec:09:3e:c8:af:54:59:df:ee:a5:9f:62:aa:71:7e:a9: a5:2b:69:ec:09:58:bd:94:57:cd:dc:43:9b:0e:41:4c: 9d:a5:bc:fa:28:36:02:04:5a:02:00:ee:b8:e1:3f:37: f4:8a:a4:a8:cf:a0:fa:db:ff:75:ca:5c:b9:e0:2d:ed: ff:98:8c:8c:19:ee:c6:79:45:5b:83:28:70:e3:60:9b: a6:03:45:53:0f:db:ed:f7:c1:65:ab:8a:37:7f:87:8a: 94:99:b1:9a:7b:bf:3d:6e:8d:2d:87:32:b2:1f:f5:a0: 60:16:9e:48:15:b2:27:44:d5:1e:b2:33:99:4e:1a:6c: a8:35:bf:c8:eb:4e:f2:e8:21:21:86:f8:90:68:4b:c1 Fingerprint (SHA-256): E7:82:DB:4D:CF:F4:92:82:45:31:FD:D9:6C:F7:B7:EE:57:0C:2B:60:82:57:F8:CD:98:33:D8:A4:15:0F:E8:58 Fingerprint (SHA1): D8:38:17:9B:A4:4C:C2:27:4A:BA:5A:F2:A1:5D:38:96:1E:4E:D9:DA Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14618: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181967 (0x672b9cf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 23:53:19 2016 Not After : Fri Jan 08 23:53:19 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fe:42:1e:77:ac:c0:4a:7f:5f:ae:9c:c1:11:e8:59:ae: 13:a5:92:56:2e:0b:f3:e6:92:0e:6d:59:b7:84:d3:b1: e4:9c:a0:1a:e9:cc:c9:e5:26:87:3e:b5:94:5d:d0:bb: 93:cb:32:3c:69:be:c5:b7:b8:69:2c:0a:8f:6f:4d:0c: 64:20:9e:0c:c9:5f:5b:41:18:14:f8:47:b0:dd:22:71: 63:cf:6c:37:49:64:55:66:7e:43:c5:2f:9b:96:51:92: e0:44:7f:5c:65:5e:2e:79:54:02:ea:28:02:c1:e3:f2: 76:95:61:01:08:f2:3d:e5:c3:ab:bb:24:f1:db:be:76: 1f:a3:27:e0:43:0f:07:b6:ff:c1:41:b6:08:6a:1a:63: e8:fd:83:97:ee:67:1e:f9:26:cc:cb:00:87:07:b9:f1: 61:9a:b1:e2:05:98:b1:f9:55:4f:12:54:ec:e9:5f:e2: 29:84:4b:ee:b2:ae:f5:c9:5f:2d:5f:cf:17:3e:f4:1e: e1:b7:a5:61:e5:91:2b:36:fa:86:51:0f:0e:e8:91:a3: 63:82:dd:b7:aa:50:95:b6:94:38:3f:40:eb:ee:51:0f: 8b:b3:e1:86:3a:56:73:04:81:96:c9:17:cc:a5:b2:81: 0d:03:96:2f:de:f8:d4:1d:e2:ee:4b:e4:89:c1:b8:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:f7:4a:14:d3:58:29:19:8c:81:f5:c5:36:23:a5:79: b5:ce:60:2d:85:0c:69:c2:51:ba:8b:d7:f4:f1:1d:99: b7:f6:52:27:18:99:5c:9b:60:28:6c:b1:17:d1:90:c2: 7b:66:7b:51:3f:78:e4:5e:b6:f6:f1:f1:32:5f:03:27: 87:16:b6:2d:4b:90:88:3d:de:24:6e:e3:b0:a4:53:38: b3:8a:7d:04:dd:e6:e0:94:dd:15:92:04:4d:bb:09:98: 80:d2:d5:3d:d5:2d:da:35:f0:79:ed:7b:9f:21:b2:28: 13:39:d1:b8:ef:1a:ba:99:03:31:dc:fc:64:67:6c:9a: 67:c8:8e:8c:84:59:93:d2:08:45:d6:25:ef:09:5c:53: a5:b9:f0:84:58:f3:18:45:b8:5e:a8:4b:ba:9b:35:10: 49:d6:eb:14:e8:e7:f3:cc:36:54:cd:8d:70:b3:44:6b: d8:f1:ee:d8:e8:c9:87:c7:80:c8:18:0d:8c:b1:0a:28: 9d:fa:63:8b:9b:8d:c9:e3:f3:f7:cd:5d:33:f0:c5:98: 3d:2a:76:4f:f2:fc:9b:db:b4:65:c7:8f:92:c6:cf:05: bb:f8:91:b5:66:3d:47:2b:11:87:c1:6c:64:33:06:25: 1e:32:21:e2:1d:83:27:7d:ad:1b:85:84:00:66:7f:98 Fingerprint (SHA-256): D1:CD:54:6F:7E:7E:53:0F:8A:50:BC:4E:38:F2:EC:FE:3E:20:FB:74:8F:E5:70:E5:C4:0E:09:E8:EB:59:22:82 Fingerprint (SHA1): 6F:F4:CE:6D:05:67:69:9B:13:8B:BB:E1:21:65:77:0A:91:E3:B1:CD Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14619: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #14620: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #14621: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #14622: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181967 (0x672b9cf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 23:53:19 2016 Not After : Fri Jan 08 23:53:19 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fe:42:1e:77:ac:c0:4a:7f:5f:ae:9c:c1:11:e8:59:ae: 13:a5:92:56:2e:0b:f3:e6:92:0e:6d:59:b7:84:d3:b1: e4:9c:a0:1a:e9:cc:c9:e5:26:87:3e:b5:94:5d:d0:bb: 93:cb:32:3c:69:be:c5:b7:b8:69:2c:0a:8f:6f:4d:0c: 64:20:9e:0c:c9:5f:5b:41:18:14:f8:47:b0:dd:22:71: 63:cf:6c:37:49:64:55:66:7e:43:c5:2f:9b:96:51:92: e0:44:7f:5c:65:5e:2e:79:54:02:ea:28:02:c1:e3:f2: 76:95:61:01:08:f2:3d:e5:c3:ab:bb:24:f1:db:be:76: 1f:a3:27:e0:43:0f:07:b6:ff:c1:41:b6:08:6a:1a:63: e8:fd:83:97:ee:67:1e:f9:26:cc:cb:00:87:07:b9:f1: 61:9a:b1:e2:05:98:b1:f9:55:4f:12:54:ec:e9:5f:e2: 29:84:4b:ee:b2:ae:f5:c9:5f:2d:5f:cf:17:3e:f4:1e: e1:b7:a5:61:e5:91:2b:36:fa:86:51:0f:0e:e8:91:a3: 63:82:dd:b7:aa:50:95:b6:94:38:3f:40:eb:ee:51:0f: 8b:b3:e1:86:3a:56:73:04:81:96:c9:17:cc:a5:b2:81: 0d:03:96:2f:de:f8:d4:1d:e2:ee:4b:e4:89:c1:b8:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:f7:4a:14:d3:58:29:19:8c:81:f5:c5:36:23:a5:79: b5:ce:60:2d:85:0c:69:c2:51:ba:8b:d7:f4:f1:1d:99: b7:f6:52:27:18:99:5c:9b:60:28:6c:b1:17:d1:90:c2: 7b:66:7b:51:3f:78:e4:5e:b6:f6:f1:f1:32:5f:03:27: 87:16:b6:2d:4b:90:88:3d:de:24:6e:e3:b0:a4:53:38: b3:8a:7d:04:dd:e6:e0:94:dd:15:92:04:4d:bb:09:98: 80:d2:d5:3d:d5:2d:da:35:f0:79:ed:7b:9f:21:b2:28: 13:39:d1:b8:ef:1a:ba:99:03:31:dc:fc:64:67:6c:9a: 67:c8:8e:8c:84:59:93:d2:08:45:d6:25:ef:09:5c:53: a5:b9:f0:84:58:f3:18:45:b8:5e:a8:4b:ba:9b:35:10: 49:d6:eb:14:e8:e7:f3:cc:36:54:cd:8d:70:b3:44:6b: d8:f1:ee:d8:e8:c9:87:c7:80:c8:18:0d:8c:b1:0a:28: 9d:fa:63:8b:9b:8d:c9:e3:f3:f7:cd:5d:33:f0:c5:98: 3d:2a:76:4f:f2:fc:9b:db:b4:65:c7:8f:92:c6:cf:05: bb:f8:91:b5:66:3d:47:2b:11:87:c1:6c:64:33:06:25: 1e:32:21:e2:1d:83:27:7d:ad:1b:85:84:00:66:7f:98 Fingerprint (SHA-256): D1:CD:54:6F:7E:7E:53:0F:8A:50:BC:4E:38:F2:EC:FE:3E:20:FB:74:8F:E5:70:E5:C4:0E:09:E8:EB:59:22:82 Fingerprint (SHA1): 6F:F4:CE:6D:05:67:69:9B:13:8B:BB:E1:21:65:77:0A:91:E3:B1:CD Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14623: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181968 (0x672b9d0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 23:53:30 2016 Not After : Fri Jan 08 23:53:30 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:40:d4:a1:ff:20:aa:96:ba:0a:b1:82:8c:ea:82:30: 30:4e:78:a6:95:e7:75:c0:75:fa:d8:42:96:bc:a9:91: a8:bf:39:18:45:e2:e0:54:c5:d0:9e:08:43:bf:6a:d4: 80:a9:fd:b0:f6:48:11:09:66:8d:31:36:a2:05:e1:31: 93:4e:25:e2:58:6a:65:5b:19:bf:c0:b2:1e:c8:69:04: 23:5b:b9:61:9d:24:8b:e0:fe:4f:a9:ee:36:16:37:b6: c2:1a:db:f2:16:29:db:bc:40:ff:a5:b0:20:dd:b5:b8: af:e5:3f:38:52:f6:76:03:3a:c4:86:34:31:99:cd:f8: 05:11:d8:40:32:88:89:3d:ce:a4:c2:16:d3:46:50:9f: aa:41:9c:07:f2:38:ba:24:a3:07:ad:dd:de:34:ab:1c: c5:f5:58:4c:ef:cf:5e:15:5c:72:97:36:f5:0d:90:f0: 23:6c:46:38:82:6a:78:05:db:ff:77:6c:54:b9:05:01: ea:c4:49:cd:7d:0c:4c:fe:57:63:cf:bd:e9:5f:5f:04: de:a3:1a:c1:d8:64:ef:1c:c9:ed:10:52:08:53:c1:b5: 86:cd:00:ac:61:3a:19:aa:7b:b9:f7:8c:3f:fa:c8:14: 37:f7:9e:3d:f8:5c:07:ea:b9:37:88:33:58:7e:29:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:12:ad:04:29:5d:6c:3a:f2:f9:34:7c:9f:5a:1f:da: aa:f3:96:35:41:4c:85:7b:16:cf:2c:39:82:91:9f:7d: 73:ba:e6:4a:39:72:94:e3:54:c4:e0:ef:91:bd:9b:0a: 14:e9:a7:ba:4d:5e:ed:e7:6a:88:9c:df:a8:da:c0:2d: 4b:29:4a:98:07:7a:d1:9e:1a:c4:72:29:fa:f3:67:3f: e1:d0:a6:76:26:bd:ed:fa:ad:78:7f:4e:fb:fc:0e:ee: db:5d:87:80:aa:e3:f5:8d:08:98:83:ed:62:b9:73:57: ec:09:3e:c8:af:54:59:df:ee:a5:9f:62:aa:71:7e:a9: a5:2b:69:ec:09:58:bd:94:57:cd:dc:43:9b:0e:41:4c: 9d:a5:bc:fa:28:36:02:04:5a:02:00:ee:b8:e1:3f:37: f4:8a:a4:a8:cf:a0:fa:db:ff:75:ca:5c:b9:e0:2d:ed: ff:98:8c:8c:19:ee:c6:79:45:5b:83:28:70:e3:60:9b: a6:03:45:53:0f:db:ed:f7:c1:65:ab:8a:37:7f:87:8a: 94:99:b1:9a:7b:bf:3d:6e:8d:2d:87:32:b2:1f:f5:a0: 60:16:9e:48:15:b2:27:44:d5:1e:b2:33:99:4e:1a:6c: a8:35:bf:c8:eb:4e:f2:e8:21:21:86:f8:90:68:4b:c1 Fingerprint (SHA-256): E7:82:DB:4D:CF:F4:92:82:45:31:FD:D9:6C:F7:B7:EE:57:0C:2B:60:82:57:F8:CD:98:33:D8:A4:15:0F:E8:58 Fingerprint (SHA1): D8:38:17:9B:A4:4C:C2:27:4A:BA:5A:F2:A1:5D:38:96:1E:4E:D9:DA Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14624: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #14625: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #14626: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #14627: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #14628: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #14629: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181968 (0x672b9d0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 23:53:30 2016 Not After : Fri Jan 08 23:53:30 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:40:d4:a1:ff:20:aa:96:ba:0a:b1:82:8c:ea:82:30: 30:4e:78:a6:95:e7:75:c0:75:fa:d8:42:96:bc:a9:91: a8:bf:39:18:45:e2:e0:54:c5:d0:9e:08:43:bf:6a:d4: 80:a9:fd:b0:f6:48:11:09:66:8d:31:36:a2:05:e1:31: 93:4e:25:e2:58:6a:65:5b:19:bf:c0:b2:1e:c8:69:04: 23:5b:b9:61:9d:24:8b:e0:fe:4f:a9:ee:36:16:37:b6: c2:1a:db:f2:16:29:db:bc:40:ff:a5:b0:20:dd:b5:b8: af:e5:3f:38:52:f6:76:03:3a:c4:86:34:31:99:cd:f8: 05:11:d8:40:32:88:89:3d:ce:a4:c2:16:d3:46:50:9f: aa:41:9c:07:f2:38:ba:24:a3:07:ad:dd:de:34:ab:1c: c5:f5:58:4c:ef:cf:5e:15:5c:72:97:36:f5:0d:90:f0: 23:6c:46:38:82:6a:78:05:db:ff:77:6c:54:b9:05:01: ea:c4:49:cd:7d:0c:4c:fe:57:63:cf:bd:e9:5f:5f:04: de:a3:1a:c1:d8:64:ef:1c:c9:ed:10:52:08:53:c1:b5: 86:cd:00:ac:61:3a:19:aa:7b:b9:f7:8c:3f:fa:c8:14: 37:f7:9e:3d:f8:5c:07:ea:b9:37:88:33:58:7e:29:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:12:ad:04:29:5d:6c:3a:f2:f9:34:7c:9f:5a:1f:da: aa:f3:96:35:41:4c:85:7b:16:cf:2c:39:82:91:9f:7d: 73:ba:e6:4a:39:72:94:e3:54:c4:e0:ef:91:bd:9b:0a: 14:e9:a7:ba:4d:5e:ed:e7:6a:88:9c:df:a8:da:c0:2d: 4b:29:4a:98:07:7a:d1:9e:1a:c4:72:29:fa:f3:67:3f: e1:d0:a6:76:26:bd:ed:fa:ad:78:7f:4e:fb:fc:0e:ee: db:5d:87:80:aa:e3:f5:8d:08:98:83:ed:62:b9:73:57: ec:09:3e:c8:af:54:59:df:ee:a5:9f:62:aa:71:7e:a9: a5:2b:69:ec:09:58:bd:94:57:cd:dc:43:9b:0e:41:4c: 9d:a5:bc:fa:28:36:02:04:5a:02:00:ee:b8:e1:3f:37: f4:8a:a4:a8:cf:a0:fa:db:ff:75:ca:5c:b9:e0:2d:ed: ff:98:8c:8c:19:ee:c6:79:45:5b:83:28:70:e3:60:9b: a6:03:45:53:0f:db:ed:f7:c1:65:ab:8a:37:7f:87:8a: 94:99:b1:9a:7b:bf:3d:6e:8d:2d:87:32:b2:1f:f5:a0: 60:16:9e:48:15:b2:27:44:d5:1e:b2:33:99:4e:1a:6c: a8:35:bf:c8:eb:4e:f2:e8:21:21:86:f8:90:68:4b:c1 Fingerprint (SHA-256): E7:82:DB:4D:CF:F4:92:82:45:31:FD:D9:6C:F7:B7:EE:57:0C:2B:60:82:57:F8:CD:98:33:D8:A4:15:0F:E8:58 Fingerprint (SHA1): D8:38:17:9B:A4:4C:C2:27:4A:BA:5A:F2:A1:5D:38:96:1E:4E:D9:DA Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14630: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181968 (0x672b9d0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Jan 08 23:53:30 2016 Not After : Fri Jan 08 23:53:30 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:40:d4:a1:ff:20:aa:96:ba:0a:b1:82:8c:ea:82:30: 30:4e:78:a6:95:e7:75:c0:75:fa:d8:42:96:bc:a9:91: a8:bf:39:18:45:e2:e0:54:c5:d0:9e:08:43:bf:6a:d4: 80:a9:fd:b0:f6:48:11:09:66:8d:31:36:a2:05:e1:31: 93:4e:25:e2:58:6a:65:5b:19:bf:c0:b2:1e:c8:69:04: 23:5b:b9:61:9d:24:8b:e0:fe:4f:a9:ee:36:16:37:b6: c2:1a:db:f2:16:29:db:bc:40:ff:a5:b0:20:dd:b5:b8: af:e5:3f:38:52:f6:76:03:3a:c4:86:34:31:99:cd:f8: 05:11:d8:40:32:88:89:3d:ce:a4:c2:16:d3:46:50:9f: aa:41:9c:07:f2:38:ba:24:a3:07:ad:dd:de:34:ab:1c: c5:f5:58:4c:ef:cf:5e:15:5c:72:97:36:f5:0d:90:f0: 23:6c:46:38:82:6a:78:05:db:ff:77:6c:54:b9:05:01: ea:c4:49:cd:7d:0c:4c:fe:57:63:cf:bd:e9:5f:5f:04: de:a3:1a:c1:d8:64:ef:1c:c9:ed:10:52:08:53:c1:b5: 86:cd:00:ac:61:3a:19:aa:7b:b9:f7:8c:3f:fa:c8:14: 37:f7:9e:3d:f8:5c:07:ea:b9:37:88:33:58:7e:29:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:12:ad:04:29:5d:6c:3a:f2:f9:34:7c:9f:5a:1f:da: aa:f3:96:35:41:4c:85:7b:16:cf:2c:39:82:91:9f:7d: 73:ba:e6:4a:39:72:94:e3:54:c4:e0:ef:91:bd:9b:0a: 14:e9:a7:ba:4d:5e:ed:e7:6a:88:9c:df:a8:da:c0:2d: 4b:29:4a:98:07:7a:d1:9e:1a:c4:72:29:fa:f3:67:3f: e1:d0:a6:76:26:bd:ed:fa:ad:78:7f:4e:fb:fc:0e:ee: db:5d:87:80:aa:e3:f5:8d:08:98:83:ed:62:b9:73:57: ec:09:3e:c8:af:54:59:df:ee:a5:9f:62:aa:71:7e:a9: a5:2b:69:ec:09:58:bd:94:57:cd:dc:43:9b:0e:41:4c: 9d:a5:bc:fa:28:36:02:04:5a:02:00:ee:b8:e1:3f:37: f4:8a:a4:a8:cf:a0:fa:db:ff:75:ca:5c:b9:e0:2d:ed: ff:98:8c:8c:19:ee:c6:79:45:5b:83:28:70:e3:60:9b: a6:03:45:53:0f:db:ed:f7:c1:65:ab:8a:37:7f:87:8a: 94:99:b1:9a:7b:bf:3d:6e:8d:2d:87:32:b2:1f:f5:a0: 60:16:9e:48:15:b2:27:44:d5:1e:b2:33:99:4e:1a:6c: a8:35:bf:c8:eb:4e:f2:e8:21:21:86:f8:90:68:4b:c1 Fingerprint (SHA-256): E7:82:DB:4D:CF:F4:92:82:45:31:FD:D9:6C:F7:B7:EE:57:0C:2B:60:82:57:F8:CD:98:33:D8:A4:15:0F:E8:58 Fingerprint (SHA1): D8:38:17:9B:A4:4C:C2:27:4A:BA:5A:F2:A1:5D:38:96:1E:4E:D9:DA Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14631: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #14632: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #14633: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #14634: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #14635: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #14636: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181967 (0x672b9cf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 23:53:19 2016 Not After : Fri Jan 08 23:53:19 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fe:42:1e:77:ac:c0:4a:7f:5f:ae:9c:c1:11:e8:59:ae: 13:a5:92:56:2e:0b:f3:e6:92:0e:6d:59:b7:84:d3:b1: e4:9c:a0:1a:e9:cc:c9:e5:26:87:3e:b5:94:5d:d0:bb: 93:cb:32:3c:69:be:c5:b7:b8:69:2c:0a:8f:6f:4d:0c: 64:20:9e:0c:c9:5f:5b:41:18:14:f8:47:b0:dd:22:71: 63:cf:6c:37:49:64:55:66:7e:43:c5:2f:9b:96:51:92: e0:44:7f:5c:65:5e:2e:79:54:02:ea:28:02:c1:e3:f2: 76:95:61:01:08:f2:3d:e5:c3:ab:bb:24:f1:db:be:76: 1f:a3:27:e0:43:0f:07:b6:ff:c1:41:b6:08:6a:1a:63: e8:fd:83:97:ee:67:1e:f9:26:cc:cb:00:87:07:b9:f1: 61:9a:b1:e2:05:98:b1:f9:55:4f:12:54:ec:e9:5f:e2: 29:84:4b:ee:b2:ae:f5:c9:5f:2d:5f:cf:17:3e:f4:1e: e1:b7:a5:61:e5:91:2b:36:fa:86:51:0f:0e:e8:91:a3: 63:82:dd:b7:aa:50:95:b6:94:38:3f:40:eb:ee:51:0f: 8b:b3:e1:86:3a:56:73:04:81:96:c9:17:cc:a5:b2:81: 0d:03:96:2f:de:f8:d4:1d:e2:ee:4b:e4:89:c1:b8:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:f7:4a:14:d3:58:29:19:8c:81:f5:c5:36:23:a5:79: b5:ce:60:2d:85:0c:69:c2:51:ba:8b:d7:f4:f1:1d:99: b7:f6:52:27:18:99:5c:9b:60:28:6c:b1:17:d1:90:c2: 7b:66:7b:51:3f:78:e4:5e:b6:f6:f1:f1:32:5f:03:27: 87:16:b6:2d:4b:90:88:3d:de:24:6e:e3:b0:a4:53:38: b3:8a:7d:04:dd:e6:e0:94:dd:15:92:04:4d:bb:09:98: 80:d2:d5:3d:d5:2d:da:35:f0:79:ed:7b:9f:21:b2:28: 13:39:d1:b8:ef:1a:ba:99:03:31:dc:fc:64:67:6c:9a: 67:c8:8e:8c:84:59:93:d2:08:45:d6:25:ef:09:5c:53: a5:b9:f0:84:58:f3:18:45:b8:5e:a8:4b:ba:9b:35:10: 49:d6:eb:14:e8:e7:f3:cc:36:54:cd:8d:70:b3:44:6b: d8:f1:ee:d8:e8:c9:87:c7:80:c8:18:0d:8c:b1:0a:28: 9d:fa:63:8b:9b:8d:c9:e3:f3:f7:cd:5d:33:f0:c5:98: 3d:2a:76:4f:f2:fc:9b:db:b4:65:c7:8f:92:c6:cf:05: bb:f8:91:b5:66:3d:47:2b:11:87:c1:6c:64:33:06:25: 1e:32:21:e2:1d:83:27:7d:ad:1b:85:84:00:66:7f:98 Fingerprint (SHA-256): D1:CD:54:6F:7E:7E:53:0F:8A:50:BC:4E:38:F2:EC:FE:3E:20:FB:74:8F:E5:70:E5:C4:0E:09:E8:EB:59:22:82 Fingerprint (SHA1): 6F:F4:CE:6D:05:67:69:9B:13:8B:BB:E1:21:65:77:0A:91:E3:B1:CD Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14637: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181967 (0x672b9cf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Jan 08 23:53:19 2016 Not After : Fri Jan 08 23:53:19 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fe:42:1e:77:ac:c0:4a:7f:5f:ae:9c:c1:11:e8:59:ae: 13:a5:92:56:2e:0b:f3:e6:92:0e:6d:59:b7:84:d3:b1: e4:9c:a0:1a:e9:cc:c9:e5:26:87:3e:b5:94:5d:d0:bb: 93:cb:32:3c:69:be:c5:b7:b8:69:2c:0a:8f:6f:4d:0c: 64:20:9e:0c:c9:5f:5b:41:18:14:f8:47:b0:dd:22:71: 63:cf:6c:37:49:64:55:66:7e:43:c5:2f:9b:96:51:92: e0:44:7f:5c:65:5e:2e:79:54:02:ea:28:02:c1:e3:f2: 76:95:61:01:08:f2:3d:e5:c3:ab:bb:24:f1:db:be:76: 1f:a3:27:e0:43:0f:07:b6:ff:c1:41:b6:08:6a:1a:63: e8:fd:83:97:ee:67:1e:f9:26:cc:cb:00:87:07:b9:f1: 61:9a:b1:e2:05:98:b1:f9:55:4f:12:54:ec:e9:5f:e2: 29:84:4b:ee:b2:ae:f5:c9:5f:2d:5f:cf:17:3e:f4:1e: e1:b7:a5:61:e5:91:2b:36:fa:86:51:0f:0e:e8:91:a3: 63:82:dd:b7:aa:50:95:b6:94:38:3f:40:eb:ee:51:0f: 8b:b3:e1:86:3a:56:73:04:81:96:c9:17:cc:a5:b2:81: 0d:03:96:2f:de:f8:d4:1d:e2:ee:4b:e4:89:c1:b8:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:f7:4a:14:d3:58:29:19:8c:81:f5:c5:36:23:a5:79: b5:ce:60:2d:85:0c:69:c2:51:ba:8b:d7:f4:f1:1d:99: b7:f6:52:27:18:99:5c:9b:60:28:6c:b1:17:d1:90:c2: 7b:66:7b:51:3f:78:e4:5e:b6:f6:f1:f1:32:5f:03:27: 87:16:b6:2d:4b:90:88:3d:de:24:6e:e3:b0:a4:53:38: b3:8a:7d:04:dd:e6:e0:94:dd:15:92:04:4d:bb:09:98: 80:d2:d5:3d:d5:2d:da:35:f0:79:ed:7b:9f:21:b2:28: 13:39:d1:b8:ef:1a:ba:99:03:31:dc:fc:64:67:6c:9a: 67:c8:8e:8c:84:59:93:d2:08:45:d6:25:ef:09:5c:53: a5:b9:f0:84:58:f3:18:45:b8:5e:a8:4b:ba:9b:35:10: 49:d6:eb:14:e8:e7:f3:cc:36:54:cd:8d:70:b3:44:6b: d8:f1:ee:d8:e8:c9:87:c7:80:c8:18:0d:8c:b1:0a:28: 9d:fa:63:8b:9b:8d:c9:e3:f3:f7:cd:5d:33:f0:c5:98: 3d:2a:76:4f:f2:fc:9b:db:b4:65:c7:8f:92:c6:cf:05: bb:f8:91:b5:66:3d:47:2b:11:87:c1:6c:64:33:06:25: 1e:32:21:e2:1d:83:27:7d:ad:1b:85:84:00:66:7f:98 Fingerprint (SHA-256): D1:CD:54:6F:7E:7E:53:0F:8A:50:BC:4E:38:F2:EC:FE:3E:20:FB:74:8F:E5:70:E5:C4:0E:09:E8:EB:59:22:82 Fingerprint (SHA1): 6F:F4:CE:6D:05:67:69:9B:13:8B:BB:E1:21:65:77:0A:91:E3:B1:CD Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14638: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #14639: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181972 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14640: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #14641: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #14642: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181973 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14643: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #14644: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #14645: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181974 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14646: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #14647: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #14648: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181975 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14649: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #14650: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #14651: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181976 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14652: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #14653: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #14654: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181977 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14655: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #14656: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #14657: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181978 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14658: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #14659: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #14660: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181979 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14661: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #14662: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #14663: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181980 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14664: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #14665: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #14666: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14667: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 108181981 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14668: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14669: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 108181982 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14670: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14671: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 108181983 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14672: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14673: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #14674: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #14675: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14676: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 108181984 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14677: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14678: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 108181985 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14679: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14680: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 108181986 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14681: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14682: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #14683: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #14684: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14685: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 108181987 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14686: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14687: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 108181988 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14688: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14689: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 108181989 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14690: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14691: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #14692: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #14693: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14694: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 108181990 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14695: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14696: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 108181991 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14697: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14698: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 108181992 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14699: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14700: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #14701: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14702: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14703: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 108181993 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14704: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14705: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #14706: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14707: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108181994 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14708: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14709: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181972 (0x672b9d4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Fri Jan 08 23:54:11 2016 Not After : Fri Jan 08 23:54:11 2066 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:dc:38:bf:47:cd:fc:cc:ce:3a:14:85:03:6f:0e:4b: 9e:0a:02:3f:c1:b7:b4:d9:e4:29:84:2c:0d:b7:53:69: 8d:54:0b:db:ca:7b:ec:5d:47:49:e3:d1:68:e5:da:c5: 34:dc:b0:0e:4a:82:0b:0e:1e:91:65:01:de:8b:5f:0a: ff:ef:28:da:59:eb:b5:3e:9f:6a:23:02:9b:5d:ac:92: d7:1e:de:09:3e:b6:f2:b5:ec:77:6b:b9:c3:6e:e3:9f: b1:c7:e6:55:f8:79:53:3c:97:98:95:78:55:9f:73:c8: e0:27:e7:1f:0e:06:b6:01:54:78:5c:f9:14:6c:5e:58: 1d:e7:bc:85:65:14:24:da:2f:9d:75:36:9b:18:fb:a2: f9:dc:3d:02:3f:b5:87:5e:37:71:48:bb:6f:df:92:cc: 65:25:4e:81:f0:5d:48:57:62:e9:dd:6e:ef:fc:6f:66: 26:a3:97:6a:38:ac:a4:e5:e1:89:bb:b0:38:b6:d9:c0: 3a:ad:65:87:fd:6e:80:6b:7c:e0:b9:49:a5:29:77:22: 94:bc:c3:74:d4:41:c8:37:64:6e:ce:fe:87:8d:a5:81: 10:4d:ae:53:90:29:23:45:18:04:66:1a:e1:01:d8:9f: 5e:5b:34:17:6c:e6:fa:c4:59:24:59:c4:29:a2:6f:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:0d:9a:15:b1:e1:19:98:87:54:7a:07:d3:70:44:9e: 29:d7:6a:80:77:87:04:c2:05:bd:1c:c3:b7:d4:a2:5a: 4e:05:36:c7:09:1f:ab:a0:45:93:ad:cf:0a:cc:e8:75: eb:b9:8f:ae:9a:12:97:fc:18:b4:47:20:fe:ea:39:d7: ed:35:c3:e4:47:69:df:86:86:35:bf:16:eb:3b:77:f5: 63:e8:a3:e1:fc:76:37:84:11:76:8e:25:33:7d:cc:06: 1e:5c:ab:ec:61:3d:8a:b0:6e:e9:d9:bf:32:9d:19:50: 9a:c9:e6:a1:38:dc:92:81:ec:80:d0:b0:02:59:45:9b: f7:29:9b:3d:ce:88:44:6f:cd:28:36:ce:6e:f5:89:4c: db:80:aa:d1:73:5c:d1:cf:77:c2:35:c4:c0:91:9a:99: ba:a3:e7:39:7c:6a:bd:28:40:47:f2:94:8c:e3:49:b6: b3:96:b7:c0:8a:2e:3c:0c:ae:fe:b4:0a:f1:cd:a6:17: 4c:79:a2:3e:60:61:fa:37:c4:c3:71:41:62:38:9e:e5: 3a:ba:d9:17:9c:5b:e2:46:4a:03:c3:87:ba:2d:b5:c9: 16:7a:53:54:9f:a1:f4:f3:ac:dd:06:75:7d:e0:95:e6: 1a:f3:7a:93:95:75:ef:4f:8e:b7:23:ac:10:77:8c:8f Fingerprint (SHA-256): CC:9A:F6:0C:C4:00:F9:61:EC:46:60:10:BF:D7:E8:B4:38:31:48:F2:0F:79:57:AF:5B:0E:5E:07:97:5C:65:EF Fingerprint (SHA1): 44:43:38:45:DC:55:58:01:6E:9F:BA:12:D9:1E:59:4B:69:30:D1:DC Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #14710: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181973 (0x672b9d5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Fri Jan 08 23:54:27 2016 Not After : Fri Jan 08 23:54:27 2066 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:6f:b6:b6:d4:5a:e4:55:5a:fd:51:51:09:da:0c:51: 67:86:6d:b8:48:03:73:ca:a5:17:3d:a5:71:3e:2c:e1: 0d:ed:4b:bb:fa:6b:73:6d:45:e9:da:ce:ca:ad:a9:3a: 0e:14:2a:e0:b4:c3:01:dc:33:14:aa:bf:bf:3b:fc:0b: 7c:76:aa:0b:d7:b6:4f:81:eb:ee:ff:50:df:51:02:b3: 22:d7:d7:71:20:e0:cc:17:02:2e:94:69:67:9a:52:f5: 4f:a9:88:6b:84:6e:4a:e4:c3:2c:ab:f2:eb:65:3f:67: 8a:89:46:42:60:fb:b2:55:6b:aa:17:84:aa:51:b1:d2: a9:33:ba:30:1a:60:95:8d:e6:23:22:fe:c1:d6:65:b2: d0:a8:1e:bb:19:55:73:d9:a3:1d:a3:d4:05:11:87:78: 99:28:63:4b:be:77:82:af:cf:94:b2:2e:e4:6f:6d:6a: c4:30:f9:25:6d:69:51:d0:53:13:52:4b:8e:73:91:0b: f1:90:2b:34:52:3d:6a:3d:e9:a2:17:91:54:9b:32:b9: 7f:da:8f:82:8a:5d:b6:ee:b3:9c:3b:a9:7c:a6:17:86: 0c:a0:65:09:00:37:19:a5:4a:60:fc:1e:ae:b1:7a:f0: 33:36:3c:d7:94:e8:4a:c4:f3:7f:a3:cb:ce:43:c7:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 34:71:3c:f6:e0:5c:61:d3:b9:a5:ce:e8:21:78:67:f3: 41:2b:9d:0e:c9:7a:6f:92:1f:99:2c:17:cc:36:49:28: d9:8f:26:51:55:fe:de:0a:f0:4a:6b:d6:f9:26:60:23: c0:2d:73:65:38:c8:4d:b3:77:77:14:4e:84:32:10:c4: ed:ad:cc:32:0e:08:c3:f9:7e:5f:ea:24:14:c5:5b:e3: a2:de:44:44:c0:58:26:28:5e:47:e8:b3:05:5e:85:ca: 0f:72:47:68:b0:9e:3c:89:b2:36:f2:7b:d1:02:b6:c2: fa:42:96:ff:9b:2c:33:64:28:42:21:8b:ca:0c:26:79: fc:92:26:9e:43:49:75:f5:f0:2e:0c:6a:7f:51:41:b2: 84:d7:65:76:31:f2:8b:4b:d2:2a:df:80:d0:a4:18:ee: 9f:20:a2:0c:30:b8:b9:8e:53:eb:93:c3:3d:93:4e:20: 57:ba:9c:b2:c1:0b:d6:ae:58:b4:31:fe:83:ed:6f:98: 92:9a:e1:c1:e8:62:9b:f0:60:a1:e2:1a:6f:4d:52:77: f3:5d:d8:51:4e:8d:32:83:ac:f6:93:e9:82:3f:01:81: 7f:89:08:9f:06:22:08:cf:76:76:e7:77:53:f4:41:05: 10:b4:38:2f:b1:df:74:03:09:d1:8e:21:b2:cc:60:e0 Fingerprint (SHA-256): 4E:62:80:26:1F:4E:EB:8E:25:19:D6:7A:37:7B:3B:6A:D7:E2:AA:70:4B:EF:56:A6:A3:FE:47:34:34:CB:F9:69 Fingerprint (SHA1): 72:B6:19:F1:79:7A:A1:B6:2A:3C:58:8C:CB:4D:1A:AF:00:74:C4:C7 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #14711: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181974 (0x672b9d6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Fri Jan 08 23:54:35 2016 Not After : Fri Jan 08 23:54:35 2066 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:ff:5c:c0:f3:83:d9:3a:6b:d8:61:5d:42:06:4e:34: 04:47:f8:93:49:23:39:06:d2:aa:f9:87:88:53:60:9a: 89:3f:56:e3:6d:8a:ff:88:61:df:f9:2a:f1:92:49:36: ca:a7:28:b8:7a:b4:12:fe:8a:71:4f:dc:7a:52:d9:88: 71:bf:9b:93:ed:72:c9:51:50:72:15:93:c5:c0:50:92: 45:60:a5:c1:bb:59:19:cf:ae:7a:79:99:28:eb:98:5f: 91:12:ea:1d:38:ed:72:5d:1a:98:c7:2a:31:58:13:c1: 54:a8:28:e8:cb:ee:51:e3:e8:f6:0d:3b:e9:7a:af:73: 1f:f8:33:d1:39:5c:2f:48:64:73:b3:06:67:bc:4b:dc: 95:5f:02:43:b2:d2:2c:75:cf:35:35:34:12:ee:d7:4b: 1e:20:f7:f7:4a:a1:42:08:a2:53:d5:4a:78:2a:e7:06: 7d:ab:7b:c1:c7:da:d9:28:88:5b:c7:06:f1:f8:7d:69: 21:e3:5c:74:d9:67:e7:d8:1f:d5:d4:3d:2d:c4:9b:12: c1:ac:17:2e:d9:fb:de:04:18:b5:84:20:03:10:2e:d1: 90:74:1a:d5:9f:d7:2c:04:d1:0c:ef:3b:f8:f1:71:eb: b3:07:56:9b:0b:a7:58:67:57:7b:dd:25:49:b3:5b:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 74:86:df:12:54:fd:7f:14:98:6c:ca:06:33:f5:37:a3: d3:b7:6a:b3:ee:d2:ed:cc:e5:49:e1:a3:d2:d0:d4:83: e9:8c:b3:1f:43:d9:59:7f:b8:20:d3:12:30:0a:89:19: 76:32:ab:57:82:7f:2f:e2:b9:2f:3d:77:14:5f:9c:11: 0e:42:9b:bc:03:72:de:c2:1d:53:c6:8a:ee:e5:4b:76: b0:bd:72:a6:a1:3c:3f:09:12:3f:cc:78:b1:4a:cf:a5: 52:bd:3a:e3:17:e3:dc:b7:51:77:1d:49:bf:70:2a:b7: 5e:00:f2:b4:a9:ab:ca:27:1c:36:3a:ed:2b:86:10:48: 75:45:91:17:8a:be:87:82:cd:cc:44:c7:60:89:70:e3: 27:82:c9:94:a3:21:3b:1c:41:58:22:02:ef:14:ec:2b: 42:47:ec:2d:d7:35:95:3c:20:b6:b0:4c:ff:0f:8d:20: 75:4a:c1:65:7d:fc:40:b5:40:87:26:e4:64:01:ee:d4: e3:47:af:fd:5b:34:e3:40:14:c4:b1:45:4c:8c:61:67: e1:27:7b:c6:69:71:42:b6:db:b6:87:d7:18:d0:a0:3f: fa:12:5a:fc:79:7f:1d:fc:b6:88:b9:f2:f5:de:dc:5c: 08:ca:1a:49:43:44:57:91:d0:e7:fc:45:a2:93:cc:82 Fingerprint (SHA-256): 51:B3:53:6D:0F:38:55:EE:27:89:EE:29:74:53:29:1E:E4:29:26:9C:B9:B5:9D:14:76:51:72:C4:83:C9:14:49 Fingerprint (SHA1): 91:D3:9F:78:6E:98:42:C4:10:FF:87:A1:9B:B4:CA:1E:B1:62:36:99 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #14712: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181975 (0x672b9d7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Fri Jan 08 23:54:47 2016 Not After : Fri Jan 08 23:54:47 2066 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:52:bc:03:01:f1:28:46:16:64:f3:1c:87:f6:b1:70: a2:87:59:3a:36:1d:30:43:d6:c8:6b:eb:9f:c8:6a:75: ec:d9:52:8e:31:40:49:38:5f:5c:95:2a:84:6d:b7:fc: 6b:9e:0b:23:97:1a:22:5b:95:0c:a0:0a:9a:13:82:f4: 88:bd:15:ce:32:74:ef:dc:cb:5b:58:c9:39:56:7b:0f: 59:34:95:81:b7:a2:15:da:e1:c1:92:07:f4:f0:c9:00: 2b:85:2a:6e:5f:3b:77:b5:81:24:9f:f1:59:36:b3:ae: e6:ab:20:9e:4f:4f:bc:c5:8b:45:94:da:fe:a9:55:8b: 5b:69:28:82:6f:4e:ef:4d:c4:fc:75:84:96:08:c6:f7: 88:f0:87:3e:c0:a2:1b:21:f2:e6:1c:6d:34:0e:46:01: 12:b9:98:32:9a:d6:1b:cb:f3:33:cd:b0:d4:36:19:85: d1:bd:4e:c5:6c:4c:ef:5e:71:f5:32:22:49:8d:41:39: 8c:f0:5a:51:81:1e:53:f7:ee:e7:75:b8:55:31:fb:c8: 85:f8:2c:c9:d0:66:02:fc:9d:14:b1:28:fb:18:82:7b: 72:78:5f:e5:8b:c2:2a:ca:49:d5:cb:d4:ad:e1:b3:6c: d0:da:50:12:33:90:96:53:f2:ea:b9:e5:c8:72:34:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:df:3f:5a:d2:7b:99:bc:5f:5a:6b:af:5a:cc:ca:e6: 9d:91:a2:09:d8:0a:8f:24:35:2e:5e:93:d7:77:f3:42: b9:d2:df:5a:e6:cd:bb:77:9c:52:27:1a:bb:a8:58:ec: 8e:31:bd:de:44:4c:92:e2:70:69:8b:1c:d6:0e:6f:94: 9e:4d:89:28:62:68:d0:c5:f5:8e:dd:3b:aa:15:94:98: 17:03:cf:e9:d9:e6:db:7f:c9:3f:5f:38:70:3f:13:0b: 90:5e:72:aa:e7:8d:ef:49:c5:7c:de:8c:1d:cc:02:92: ad:e3:6d:89:38:73:8d:e7:d1:cf:77:e6:51:1c:ee:89: 20:62:81:cc:bb:1e:04:1c:20:97:00:21:60:8f:03:92: 64:0f:c7:ee:fa:0c:9a:33:75:6d:b8:72:08:dd:9f:ed: ee:e2:ee:c0:72:9a:d5:bd:51:58:54:84:f9:ab:40:03: 1c:af:15:1f:ea:f2:ae:d6:cf:11:54:15:69:c0:78:6c: c1:29:5e:12:07:89:af:b9:ba:8c:b8:c0:00:77:7f:ef: a4:05:f1:af:c3:a4:b9:b7:ea:84:d9:fd:45:c2:ab:42: 2c:d0:59:8c:9c:f8:95:7b:e8:e9:cf:bc:44:04:57:5d: d7:3b:f7:0d:28:7f:4d:8b:94:0d:39:cd:9b:03:62:9d Fingerprint (SHA-256): 06:22:87:F3:C7:70:23:7D:E9:48:37:36:3E:F8:3C:80:D9:6B:EE:9C:9A:7F:4F:B8:ED:44:9B:67:9D:73:DE:AF Fingerprint (SHA1): 00:CF:D5:16:10:51:E9:20:F5:5A:22:A2:8E:EC:79:8C:75:1E:EF:2A Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #14713: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181976 (0x672b9d8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Fri Jan 08 23:54:55 2016 Not After : Fri Jan 08 23:54:55 2066 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:5c:e6:e2:ac:21:60:11:ec:6c:33:d6:e6:18:ed:ce: 02:e9:99:d4:cf:a3:f9:15:ad:96:f0:42:d7:f8:26:68: c1:37:0f:5d:be:f0:d9:fa:ca:b5:f8:83:d3:3c:b8:fd: 05:49:c9:01:28:29:78:b9:17:9f:3b:43:ea:37:6f:d3: bb:ab:1a:23:1c:22:af:03:64:3d:40:73:7e:17:c2:59: 1d:ae:c9:83:52:68:8b:ef:54:61:a4:0d:8e:35:f3:59: 24:82:3a:f8:4c:01:f0:85:e3:9d:b1:00:d1:f2:ea:a6: 47:25:c6:4a:57:85:f6:65:59:f7:92:11:8b:0d:5a:53: f0:e2:2d:43:8d:d3:4b:09:81:d8:1e:4d:2e:fe:f7:1d: 09:87:07:b1:66:68:76:eb:bb:8e:ad:ee:bd:30:95:14: 66:57:09:9a:02:8c:e3:e3:e2:e3:31:bf:52:92:29:b2: 42:e9:b4:e5:dd:67:a9:d4:1d:34:08:36:0f:95:9f:3b: 99:83:fb:77:af:8c:e8:fe:21:aa:20:de:4d:06:c7:75: 9c:f9:b7:0d:19:fb:e6:4c:57:42:b0:b1:cc:d6:25:d9: a3:88:f8:a9:fa:ec:1a:d1:1c:c2:c2:ff:45:48:b5:62: da:3c:af:75:b9:0d:94:cb:95:b2:b0:b6:48:0e:98:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:63:78:da:34:61:ee:ab:39:7b:8b:85:e9:f4:65:be: 49:64:ce:79:de:f5:0b:b1:ca:6f:15:d6:76:35:9d:2f: ef:b3:ff:0b:f5:be:37:75:2d:5b:16:3d:6e:b8:89:ff: 6c:0b:9a:30:eb:cf:fe:19:9e:e7:f3:42:fe:7d:f1:04: 7f:51:7e:d8:77:c7:46:14:fb:d3:a6:76:95:a0:a8:2f: 04:24:ec:35:0d:d3:8e:21:4c:68:a1:c7:22:1c:6c:f2: be:96:e0:16:18:30:e9:a9:fe:ee:e2:db:60:e5:8d:e3: 80:ca:e4:8b:56:ce:5c:d8:58:00:04:0a:f1:02:e0:8d: 95:07:26:05:78:86:cf:8e:da:af:7c:af:a8:56:cd:19: d9:29:dc:00:59:51:b2:33:42:31:56:df:08:b3:8d:d9: 0f:2c:2c:28:f4:cb:51:53:be:a0:d3:17:9a:e6:08:c1: 97:7e:99:32:ba:46:30:c4:d5:c2:d7:45:91:0d:82:3b: b5:c0:cf:1c:41:bf:00:04:5a:cf:59:9b:23:0a:ec:3b: 2f:ed:30:17:b2:0e:b0:9c:ac:32:b0:d1:e8:c7:46:77: 39:5d:52:76:bc:34:f3:3c:33:0b:0e:cb:e0:c7:03:01: 9f:f0:e7:a3:b4:84:f2:e3:77:95:e0:38:c6:9c:3b:c2 Fingerprint (SHA-256): D2:BD:70:C5:20:39:71:BA:48:AA:DC:7F:97:34:16:55:96:5A:DF:EE:4D:47:B3:A8:71:68:AF:88:B0:BA:86:19 Fingerprint (SHA1): DD:1E:C5:31:89:D7:96:AC:D6:DE:EE:7A:57:5B:F1:23:AA:CD:2A:33 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #14714: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181977 (0x672b9d9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Fri Jan 08 23:55:04 2016 Not After : Fri Jan 08 23:55:04 2066 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:fe:d5:e1:eb:a8:9a:5f:9f:59:36:56:56:c5:ff:a1: 26:0a:79:b1:97:ec:91:54:e7:70:b3:b1:c2:01:7d:fb: 75:ee:2e:40:74:02:83:2f:38:ed:e9:20:ce:0d:91:4d: 99:87:d9:3b:06:7f:8e:9c:5f:e9:48:21:eb:c9:ea:4b: ee:a1:27:ff:8e:c8:88:ca:88:f4:f6:59:61:06:8e:e7: e9:47:aa:95:02:f8:41:f0:9d:fb:ee:3b:e1:fc:6c:56: a3:4e:f6:be:12:5e:fa:9f:0e:aa:32:5f:f9:c8:11:96: a3:31:af:0d:76:ee:ea:aa:c7:35:1a:51:95:8e:6f:90: 4d:22:e9:84:0f:2d:40:dd:d0:ef:46:92:a1:2a:1c:2f: 17:29:8e:d8:95:f2:2d:29:a2:83:cc:af:05:3a:1a:4d: 4d:29:a0:70:c9:77:08:d4:c1:be:7e:1f:f1:8f:53:c9: 77:74:2f:de:6e:55:5b:88:16:bd:dc:04:1d:75:fb:96: e1:af:35:bf:aa:01:77:cb:6e:e4:7c:b1:a7:06:8c:8c: e8:b5:4f:12:bc:4f:f8:54:bc:81:80:b4:83:0b:32:bc: 2c:91:45:2c:86:0a:b0:bd:8b:ea:72:1d:9f:70:f8:32: ce:1c:5b:1f:c3:5c:1f:a2:8f:44:a7:c2:d6:c3:89:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:16:ba:07:03:dd:0f:4c:c3:20:0b:f2:85:b7:1f:d4: 5b:33:b0:b9:14:f8:c8:b0:78:85:92:56:3a:0a:82:7f: 97:cf:ba:75:ac:ce:88:78:02:14:ff:d3:96:be:a8:2b: 0e:3d:91:e6:c0:ef:0e:98:c5:6a:00:f9:2d:c6:1a:9d: a8:74:94:84:6a:63:84:71:98:84:ca:85:a7:f4:d8:25: 91:1c:f7:84:6c:10:ab:7e:8c:34:18:bd:da:49:eb:e0: ba:67:cb:cd:84:51:e2:8e:24:57:35:29:e6:34:b9:6b: 99:d8:49:43:41:db:36:f2:e4:03:9c:c7:cb:dc:8c:c1: 57:40:ec:e8:48:6d:66:8e:db:eb:1d:b0:97:fc:f1:2b: 15:e8:3e:d2:34:ec:a5:17:53:f3:5b:74:76:03:db:a5: d4:d6:00:d5:46:ea:de:de:ed:bf:9e:6f:bd:ba:27:3e: 4c:60:5a:98:95:c2:ba:f3:4a:06:14:25:74:13:11:bf: 45:5b:96:df:2f:71:90:7d:e8:f4:fe:8a:2a:88:a1:4d: 95:3b:3b:2a:05:b7:07:ba:35:09:e0:7c:05:85:db:ac: f9:16:4c:a2:98:65:2b:ad:0f:59:50:25:d6:fb:b4:24: 44:2e:5b:5b:38:46:e3:40:a8:a0:a5:f2:fd:c7:84:c1 Fingerprint (SHA-256): F0:43:0E:50:C6:6D:2E:A3:6C:AA:AF:37:88:60:44:C9:21:80:F5:EB:AC:77:65:D9:1B:CF:8C:53:28:D7:EA:C1 Fingerprint (SHA1): B1:26:53:D4:46:9B:4A:C3:35:72:33:24:68:3A:57:91:4F:73:76:50 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #14715: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181978 (0x672b9da) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Fri Jan 08 23:55:19 2016 Not After : Fri Jan 08 23:55:19 2066 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:2a:d6:84:9f:93:32:42:d6:e9:78:17:16:15:a1:52: 37:cd:5b:74:75:87:19:71:48:0a:87:68:0a:7c:70:8e: 91:65:60:25:76:90:9e:69:9d:78:ac:81:38:cc:60:3b: a5:fe:d3:52:25:12:5d:c4:86:ca:3b:4d:73:ab:2b:23: de:82:ea:2b:96:c4:ab:23:91:e1:b7:7d:34:b0:24:44: 63:e7:4a:7c:a3:7f:a9:69:b2:d4:65:d2:5e:85:e5:5f: 2f:be:e8:5a:98:7d:c8:75:62:e3:0c:df:45:34:50:c9: c8:cd:64:69:23:b1:2a:87:34:5e:d3:72:96:17:57:dd: fc:39:1e:a8:a5:07:64:a2:d1:70:50:e4:51:bc:b7:14: ed:56:e6:f7:92:db:a0:bb:7a:e5:e1:04:88:ca:50:0d: 74:45:ad:9d:8d:41:b3:50:12:19:fc:a7:af:a9:2b:db: 63:16:78:ba:70:55:01:2a:8a:d8:17:e7:ef:4a:18:73: d5:93:9e:dc:fc:bd:3d:2b:36:80:cf:ff:cf:ac:67:01: ee:ea:e7:c5:96:21:a3:09:4b:ec:46:83:38:2b:4f:90: 0c:68:af:75:7f:c5:8a:1c:3b:ae:74:11:0e:01:94:7b: 20:2e:fd:0d:f3:23:dc:26:e2:3c:21:c8:78:a5:ff:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:d8:61:a6:64:2e:bd:3b:01:db:77:67:46:d3:7c:e7: b8:4e:12:87:64:68:fc:dc:10:27:76:01:af:e1:83:6b: f8:18:29:88:63:a0:e4:a0:3e:1d:ae:18:5f:6b:ce:24: 8f:7d:81:98:c3:48:fe:16:5e:74:b3:0e:bb:7e:48:20: ee:de:4a:85:27:0f:35:fc:cd:1c:7c:70:07:ce:c7:c1: 31:7e:2f:3f:bc:a5:90:98:da:15:a3:fa:6c:23:1a:cb: 7c:c0:b6:1f:56:de:b4:47:33:b8:d7:4d:5b:5e:9b:41: 74:ff:96:e0:8e:3d:21:e1:24:ca:f5:73:d9:d4:35:86: 62:e6:39:be:5f:eb:b9:01:4d:66:56:2f:b7:6f:67:4c: 31:94:70:82:62:a9:0b:9c:13:e5:fd:8a:f8:31:3a:73: 6e:45:c5:c2:6f:e5:51:7f:be:29:5e:c1:f6:7c:bb:aa: cb:5a:37:dd:e4:0a:ef:36:00:4f:4d:c3:27:a6:2f:a6: 2d:51:e2:5e:b5:19:80:56:1c:ce:5a:15:11:32:d6:d4: 46:69:f2:cc:11:25:12:bb:45:42:7e:c3:7b:bd:9c:5b: d5:e7:ba:b5:ce:b3:f9:d8:70:98:fe:6f:2a:ef:ce:d5: 5b:a4:a4:9d:65:ba:c8:aa:31:f2:c8:ae:d4:78:02:43 Fingerprint (SHA-256): 20:87:D6:14:51:9B:28:17:99:7D:09:E2:58:7B:22:D8:03:6B:17:E2:D5:92:63:B7:57:85:EE:FB:00:E5:99:B8 Fingerprint (SHA1): 0E:C2:61:A9:06:C1:98:70:0A:5D:F5:7C:0D:1C:11:95:D5:8A:73:4F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #14716: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181979 (0x672b9db) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Fri Jan 08 23:55:36 2016 Not After : Fri Jan 08 23:55:36 2066 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:c4:51:ad:3f:c8:42:be:4c:2f:e0:8a:ca:9b:99:8e: 43:e0:a3:11:73:b0:03:92:61:c6:67:62:f7:e9:10:ee: a4:f9:c5:c6:b0:ab:12:ab:be:5f:1f:85:9e:d4:01:93: 64:d6:ef:3a:4f:7b:b0:49:31:c4:f3:24:4a:4a:36:6e: 98:5d:bd:8e:6c:eb:89:4c:e5:3b:72:4e:35:21:7e:4e: 65:f8:d6:42:06:8d:34:00:97:3f:c5:be:ca:bd:9f:38: c4:34:e1:40:2c:8a:a4:24:4e:47:96:c3:f2:d8:1e:37: 6a:ad:19:1b:92:09:52:98:35:e8:49:81:0b:5b:63:7e: e4:c6:ad:f9:af:78:c8:4f:f6:43:f8:85:18:ea:47:b8: 77:28:8c:a5:7d:3f:2f:6f:75:c7:e6:dc:5e:3c:69:72: 4c:59:df:71:57:1f:90:39:e8:95:d7:6e:e7:14:57:35: cb:8c:99:f0:cc:e6:d0:88:90:b4:6f:21:63:84:eb:0f: b2:26:2e:d3:8a:60:13:b5:95:88:f6:1e:4c:d9:a7:37: 89:f5:ae:15:e2:52:fb:4a:5d:f6:c4:48:f9:79:fc:07: 9f:c0:eb:e9:e1:a3:31:18:46:99:9c:38:63:e1:48:31: d5:84:f7:3f:05:91:85:17:cf:ad:7d:60:b5:a5:ba:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 80:9c:ef:09:0b:cb:4f:76:bf:a2:dc:05:89:4b:dc:b5: 0a:54:21:49:87:28:e1:0d:69:7c:fc:ff:4c:e2:1d:a3: 0c:8c:12:7d:a2:fd:46:0b:ee:1a:c5:08:b3:10:0e:69: 3b:2d:96:e3:d9:33:01:b7:5f:c2:7b:cd:b6:a1:bf:67: 4b:41:6b:9c:a8:0f:72:ae:ab:15:f0:17:b5:15:ad:50: 31:05:82:4a:c6:31:e1:d6:4f:4d:5d:bf:29:a2:e5:66: a2:d5:8b:3e:17:5e:df:74:41:ee:6e:0e:2a:32:75:3e: 57:16:1e:78:41:50:8f:91:46:64:1e:7c:67:16:56:5c: cb:5b:27:0c:6d:eb:03:a9:2d:4e:3d:a9:73:13:59:ff: 7c:66:21:2c:e0:f7:99:f7:93:98:01:af:9f:b1:15:68: ae:0c:94:c5:ed:d8:be:d6:8a:cd:e3:26:e6:dd:52:ec: 49:03:c1:95:e0:bc:1e:e6:1d:a5:27:2e:d2:01:7c:5b: 35:26:45:7e:b8:f2:f8:a4:80:1d:68:0d:ab:e0:3d:c8: 76:a5:7d:0d:7b:8b:ee:76:ab:12:7d:b6:01:eb:7e:31: 9f:d9:6b:93:9a:4d:fb:f5:2c:47:35:1f:46:78:45:17: 35:23:b3:c4:16:19:88:7f:e7:21:50:4f:44:d1:ca:bc Fingerprint (SHA-256): 16:D3:07:CC:85:95:9D:66:C6:48:E0:BA:68:A0:7B:BE:E0:E7:19:A3:C4:3B:C8:48:A4:1A:6E:93:5A:48:2D:19 Fingerprint (SHA1): 05:F2:B4:57:1A:BC:89:3E:21:98:60:74:9E:57:26:60:1F:AC:1A:B7 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #14717: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181980 (0x672b9dc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Fri Jan 08 23:56:03 2016 Not After : Fri Jan 08 23:56:03 2066 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:84:7c:35:e4:09:c8:3d:36:e6:c3:10:da:9d:d4:7c: bb:fa:88:37:79:28:dc:01:d8:9f:0f:93:2b:50:35:27: 84:5b:53:84:f8:59:27:ed:b7:df:c0:cd:da:1e:e7:b8: 28:01:e7:80:bf:90:f0:82:db:61:a7:40:67:7a:99:7e: 02:e7:d7:81:f0:a9:6f:5a:fe:b9:43:fc:bc:8b:6c:d0: 0f:ae:59:a7:91:8c:eb:3f:8b:e6:8e:28:bc:02:98:c5: 0f:ee:05:94:a1:43:76:11:7e:38:7c:97:cf:4b:1a:9d: 7b:8b:6b:3e:aa:94:e6:89:8f:fc:64:b4:3d:8f:b4:0f: 02:9c:3a:14:98:7b:b0:14:83:1d:bd:72:97:ee:dd:f8: f1:fd:77:b2:ff:00:25:61:e8:b8:4c:39:52:38:4e:4b: 8e:1e:64:39:74:ed:f3:17:32:f0:6a:72:db:72:aa:06: d5:b3:58:e5:21:dd:ac:4b:91:91:ca:40:c6:7f:42:93: 2b:f2:ac:f8:82:9a:ea:ee:78:b6:5f:17:ec:aa:49:bf: dd:49:11:17:d2:e6:67:74:9c:0b:e0:6f:74:72:8f:b9: 8b:20:4c:35:2c:16:c5:93:18:f5:b9:c9:78:29:78:75: a3:2f:34:98:3b:cc:6f:af:fd:a2:42:4e:05:20:57:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 71:73:e6:0a:64:0b:b7:35:56:30:2a:f7:0b:57:2d:01: b1:29:bc:2f:25:2b:97:a3:c2:57:63:29:4d:45:df:55: b8:ad:59:a5:af:7c:88:29:3f:96:0c:a3:e8:07:30:6d: 3d:94:f4:cb:e6:5f:ab:e9:c2:70:0b:5f:28:d4:60:5d: e5:5f:19:09:99:fd:bb:67:08:4a:b5:8c:a5:f0:32:66: c4:a9:08:81:94:f0:48:f0:2f:6c:81:ef:3c:da:2a:92: b4:70:48:64:78:55:fe:b4:aa:f4:ee:e1:9e:0d:7f:bc: a2:27:fb:2f:fe:42:f6:f6:61:d6:ed:40:4f:e2:53:0d: 54:a1:50:4b:7f:81:52:9f:6c:97:b8:4c:f1:2d:ae:19: d4:09:ba:c8:3f:14:1c:c7:9c:8a:97:b7:55:21:05:52: 56:68:c8:cf:06:b6:79:13:d3:f4:e2:37:bd:0e:02:06: 1b:a0:da:b9:0f:94:9c:0b:ff:44:12:6d:96:69:4b:2c: 6f:95:54:20:17:e1:fe:87:1f:e8:bc:9d:a7:72:1b:a3: 8b:7f:3f:2c:5d:f6:b4:df:f9:34:18:2c:01:c1:2d:9c: 23:b7:20:16:36:96:df:71:8b:c7:81:b9:5b:4c:75:15: 82:7a:eb:9e:a7:3a:63:e4:d6:9e:97:c0:c1:41:e5:b4 Fingerprint (SHA-256): C5:41:65:97:94:14:E5:6B:DA:EC:CD:7A:D0:70:3A:5B:2F:AC:DE:FA:45:AD:72:DD:4C:99:97:0B:9D:EE:C6:E5 Fingerprint (SHA1): C3:DB:38:AC:F3:AB:92:55:51:00:51:60:68:41:DB:2B:59:7E:24:4E Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #14718: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #14719: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181995 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14720: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #14721: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14722: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14723: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108181996 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14724: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14725: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14726: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14727: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108181997 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14728: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14729: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #14730: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14731: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108181998 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14732: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14733: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14734: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181995 (0x672b9eb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:58:02 2016 Not After : Fri Jan 08 23:58:02 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:04:49:84:f5:c2:d1:68:c6:07:9b:fe:2c:21:a9:a1: c1:0d:b7:69:19:d9:96:33:ed:03:34:ea:52:7f:a8:c2: cf:ca:f2:47:7b:48:dc:74:72:15:0f:2e:f8:2a:d9:bc: 95:54:53:88:ec:2f:e8:ca:52:1a:51:4f:eb:fd:fc:36: a0:9d:34:e9:86:ca:cf:6d:3b:cb:6c:9a:c7:5c:21:3e: c3:d9:e4:ac:b7:b3:f1:05:56:6b:87:7d:75:cc:f0:8c: 0a:b3:45:54:97:f6:67:46:ff:34:94:e5:93:3c:81:53: 9d:56:61:5b:16:98:4e:c2:b6:c2:08:3b:cc:40:88:98: 79:9d:5c:8a:d1:53:77:8c:d6:32:63:40:3e:5e:65:36: 1d:eb:fc:12:98:ad:dc:61:28:c3:13:be:42:41:a4:a6: fc:d2:64:bf:89:0f:38:75:68:8e:f8:ed:bb:31:bf:44: 33:92:2a:b9:af:80:02:98:b2:34:cf:68:bd:97:0b:4a: f7:59:cf:a2:86:2f:c3:8a:58:05:32:b2:6d:07:9e:5d: 88:b4:30:bc:33:84:72:66:6d:3d:e8:42:41:db:00:f1: ba:cb:96:cd:ff:ac:f7:ba:e8:ab:3a:34:95:da:b7:d8: cb:2f:a4:df:cf:06:36:74:e3:51:6e:4c:d6:8c:1d:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 52:89:d4:b2:09:80:25:6f:77:6d:04:2f:f8:de:bd:7f: 6c:01:4e:0a:e6:1a:f9:f5:66:69:61:af:9e:17:81:5b: ac:91:e0:52:c7:0d:77:0d:fe:24:9b:aa:6e:c8:85:bd: 4d:64:0b:68:6b:32:86:97:8c:bf:60:8a:2b:10:f5:ce: 30:48:3c:d0:e7:99:7c:14:40:78:8e:52:13:bd:b3:74: a6:07:ff:0d:80:7c:fb:97:00:cd:f2:85:f3:30:06:e6: 53:6d:f2:e4:93:a2:0e:d2:45:ad:33:59:a8:40:39:51: 70:8a:cc:06:55:1f:84:1c:af:17:43:4c:1b:0f:b5:21: c0:5f:85:50:89:cc:09:a4:fb:ce:a3:c4:15:05:77:b0: 89:ed:96:c1:7f:18:44:a1:ab:92:f0:cf:c6:49:1c:12: 7c:74:7f:07:1c:35:91:1c:66:c1:0f:20:f5:d0:f0:95: 4f:08:8c:4f:96:44:bc:d5:31:8b:e2:0e:d1:cc:8d:f5: 7e:bc:ba:d3:e9:e4:9b:ed:09:5b:61:bd:79:fa:6a:91: e4:76:73:0a:2c:27:1d:0c:81:7f:aa:db:84:92:d8:94: d5:03:b5:d6:d9:42:dc:93:c8:62:90:ff:ad:00:9a:05: 46:6c:47:ec:10:f5:66:fc:1c:ba:cd:81:29:82:54:77 Fingerprint (SHA-256): 5F:91:8C:DE:4C:7F:37:26:70:51:29:3D:D5:B5:DE:AC:EC:08:D5:5A:94:37:10:D1:1B:BD:C7:01:3E:13:DD:1A Fingerprint (SHA1): 20:84:DD:F3:3F:6B:17:06:9B:0A:63:1E:8F:7F:E7:6E:31:3E:A4:65 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14735: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14736: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181996 (0x672b9ec) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:58:13 2016 Not After : Fri Jan 08 23:58:13 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:b6:0c:36:56:d9:cd:9a:00:4c:26:ec:b4:d5:a1:58: 36:11:c8:ba:5c:96:65:3f:a7:fc:95:bc:86:a0:8f:a5: 2b:62:c7:12:fc:95:d7:8a:82:d6:fc:5e:b7:4f:bb:77: 71:02:39:8e:e9:ac:f0:49:4a:11:7c:20:7e:01:1a:17: 11:46:06:68:5b:b3:f3:ad:79:09:77:2d:5e:ce:32:13: 73:b7:a9:b1:2a:e7:26:4d:fd:4f:eb:7c:1c:7a:72:54: 3f:a4:6f:46:49:7a:79:13:d8:54:a5:bf:92:f8:40:e7: 23:d8:00:c0:65:4d:7c:ba:d3:0f:9c:4c:af:d3:c6:b3: 50:a6:90:3c:9c:9c:c0:4b:d2:40:c1:93:7e:38:98:0a: 8c:81:9b:77:d5:57:a3:5d:b1:19:21:49:48:fa:a0:05: 70:27:d6:00:45:5e:e1:bb:3c:dc:74:61:0c:f9:05:4c: ad:a7:db:fd:1d:6f:9b:49:05:fe:5a:a8:56:15:bd:95: 49:10:0e:4a:0e:6b:78:c3:84:a6:67:dc:e3:e6:0d:e1: 52:20:fc:9b:bd:1f:4c:4a:cd:10:aa:30:1a:fe:39:c3: 93:06:ab:1f:6d:f2:2d:e8:99:b8:92:bb:cd:ee:e2:b8: 4e:be:b6:e3:89:0a:8b:91:34:6c:31:4e:64:7d:7e:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:7b:3e:83:d3:96:85:b3:37:53:b2:2a:aa:00:ef:b2: 28:d7:8e:4e:6f:8c:89:53:be:55:6f:52:a5:80:fc:52: 50:bd:0c:e7:99:37:88:28:22:2a:cc:07:cd:6b:58:b2: 1e:31:66:59:0b:19:35:73:1d:56:9b:d5:4a:ed:3b:f4: f7:d8:b7:7c:46:4c:b4:c6:a3:dc:3b:31:d2:83:4f:fe: b4:e2:2e:84:55:4e:26:b3:00:b9:ab:0d:65:72:41:1a: e8:6a:3a:8b:f8:e0:2e:f4:ed:70:4e:5d:a4:a7:b1:92: 90:94:4a:c1:ce:7c:cf:95:26:71:0d:f6:1f:d8:81:58: ae:96:f1:76:25:20:4d:88:ff:62:13:27:4a:17:28:e5: 7b:2d:24:a3:e5:94:de:9a:1e:04:95:95:26:75:35:2f: a2:46:c7:22:75:2c:7e:66:22:e1:4d:11:3e:24:72:48: 81:53:06:bc:6f:4e:bb:54:eb:8a:06:dd:18:da:32:dd: 11:75:31:28:07:9c:ca:f1:6f:14:ba:2a:aa:02:31:da: 9b:ed:59:a5:7e:9d:f5:e7:d9:a7:07:ac:45:d1:5f:91: d2:76:4a:fe:45:f5:a6:ab:07:09:c5:98:68:9d:7b:8d: 37:42:1d:f8:5d:1f:1e:76:01:71:70:5b:c0:d4:12:92 Fingerprint (SHA-256): CA:4C:E1:EA:5D:21:D5:8D:58:1A:E1:E1:71:D2:64:08:49:07:68:B9:D2:6C:26:4B:35:F0:C9:A6:B7:59:28:82 Fingerprint (SHA1): 95:74:90:FE:9A:6F:0C:5A:18:8C:29:79:BB:1C:26:1F:B7:17:E5:B6 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14737: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14738: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181997 (0x672b9ed) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 23:58:29 2016 Not After : Fri Jan 08 23:58:29 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:2c:4e:38:59:0a:c3:d3:df:6d:4a:7c:80:66:72:8a: 87:af:97:9e:73:05:c6:86:63:83:be:eb:5b:9e:8a:97: b8:d4:58:12:7d:eb:0d:49:85:36:76:1c:d0:97:b8:6f: ba:c4:b5:c0:1b:5e:3a:4f:61:9b:e8:7d:d4:9b:fe:a3: 4b:05:c9:91:6d:15:ee:19:f5:50:64:04:57:db:82:f9: 98:50:43:4e:0a:31:8a:cd:ac:ee:47:a5:e2:21:8e:d7: 6b:ad:7d:53:70:c6:ee:09:02:37:16:2e:61:10:d1:8f: ce:f0:e8:2c:25:ef:f7:1c:e4:b5:e4:45:e1:18:fb:51: 56:14:5f:ca:96:74:f6:ca:7a:b2:0d:bd:9b:20:c5:f0: d0:01:98:d9:0e:4a:d3:88:3c:3b:e1:2a:c5:f1:1c:34: 31:eb:5b:2c:a4:54:37:01:98:44:26:6c:b9:dd:b8:16: de:03:2a:11:b1:80:ca:65:f2:6a:10:37:ce:62:ca:2f: 35:11:61:d1:18:21:25:fb:42:1d:29:af:24:8b:d9:76: 76:c4:a2:79:40:71:c0:a1:88:f5:06:75:6e:9c:6d:26: 20:ee:14:12:49:4c:b3:53:9f:d9:af:07:f8:1a:fc:8e: 76:93:fb:45:b0:85:bb:4f:a1:2a:97:2d:a8:c3:97:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:3e:8b:63:a7:41:b8:a7:f4:08:a1:9e:8c:70:e9:62: ee:39:55:c0:29:22:d0:a8:5e:46:8e:18:33:44:79:33: d7:95:00:48:9a:07:f6:21:44:c0:a5:66:44:d3:70:2c: 0b:ba:90:4a:72:91:3d:1a:f5:9f:a3:95:08:3c:7d:21: be:5b:af:b8:f2:2a:f6:a8:a8:5e:13:8b:8f:ce:ba:11: eb:29:ce:1c:dd:d0:05:c0:72:81:60:2d:11:8e:14:c3: 8a:85:dc:5d:b9:a1:c9:d3:ce:a8:25:49:05:52:16:1e: 91:1a:45:43:4a:12:2a:27:31:c0:dc:c6:ff:db:f0:1d: a8:f8:ad:e0:e6:5c:7f:ac:3f:eb:3a:31:6f:27:98:fa: d1:32:c1:89:b7:d7:e8:be:f3:8f:f9:d2:13:0d:0b:27: 7e:d7:0d:e4:58:07:d2:ad:9b:f3:f9:bb:f6:2f:30:63: 44:2a:2b:a3:0a:b7:63:95:c4:01:25:b9:57:8c:8d:6d: 1b:e6:e5:c6:60:8c:df:57:13:ef:2c:57:fb:c1:c0:57: aa:6c:7a:3f:4d:4c:ec:f4:19:f7:34:7c:4d:b5:fa:0e: 24:41:d7:28:d0:4f:27:a6:3c:48:83:dd:e1:56:1c:89: 6b:12:fa:e5:a1:e0:48:29:a4:69:10:e7:8a:33:d1:a0 Fingerprint (SHA-256): 19:1C:9E:CE:AA:39:C1:1C:EC:2E:32:0A:28:82:E6:D6:C2:B4:E2:79:00:C0:88:82:C4:B3:9E:E8:AD:5C:AE:D0 Fingerprint (SHA1): 61:AB:FD:3C:BE:0C:0E:9D:5E:8F:A6:DB:B1:EC:CD:85:A7:43:C6:3F Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #14739: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14740: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #14741: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #14742: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #14743: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181995 (0x672b9eb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:58:02 2016 Not After : Fri Jan 08 23:58:02 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:04:49:84:f5:c2:d1:68:c6:07:9b:fe:2c:21:a9:a1: c1:0d:b7:69:19:d9:96:33:ed:03:34:ea:52:7f:a8:c2: cf:ca:f2:47:7b:48:dc:74:72:15:0f:2e:f8:2a:d9:bc: 95:54:53:88:ec:2f:e8:ca:52:1a:51:4f:eb:fd:fc:36: a0:9d:34:e9:86:ca:cf:6d:3b:cb:6c:9a:c7:5c:21:3e: c3:d9:e4:ac:b7:b3:f1:05:56:6b:87:7d:75:cc:f0:8c: 0a:b3:45:54:97:f6:67:46:ff:34:94:e5:93:3c:81:53: 9d:56:61:5b:16:98:4e:c2:b6:c2:08:3b:cc:40:88:98: 79:9d:5c:8a:d1:53:77:8c:d6:32:63:40:3e:5e:65:36: 1d:eb:fc:12:98:ad:dc:61:28:c3:13:be:42:41:a4:a6: fc:d2:64:bf:89:0f:38:75:68:8e:f8:ed:bb:31:bf:44: 33:92:2a:b9:af:80:02:98:b2:34:cf:68:bd:97:0b:4a: f7:59:cf:a2:86:2f:c3:8a:58:05:32:b2:6d:07:9e:5d: 88:b4:30:bc:33:84:72:66:6d:3d:e8:42:41:db:00:f1: ba:cb:96:cd:ff:ac:f7:ba:e8:ab:3a:34:95:da:b7:d8: cb:2f:a4:df:cf:06:36:74:e3:51:6e:4c:d6:8c:1d:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 52:89:d4:b2:09:80:25:6f:77:6d:04:2f:f8:de:bd:7f: 6c:01:4e:0a:e6:1a:f9:f5:66:69:61:af:9e:17:81:5b: ac:91:e0:52:c7:0d:77:0d:fe:24:9b:aa:6e:c8:85:bd: 4d:64:0b:68:6b:32:86:97:8c:bf:60:8a:2b:10:f5:ce: 30:48:3c:d0:e7:99:7c:14:40:78:8e:52:13:bd:b3:74: a6:07:ff:0d:80:7c:fb:97:00:cd:f2:85:f3:30:06:e6: 53:6d:f2:e4:93:a2:0e:d2:45:ad:33:59:a8:40:39:51: 70:8a:cc:06:55:1f:84:1c:af:17:43:4c:1b:0f:b5:21: c0:5f:85:50:89:cc:09:a4:fb:ce:a3:c4:15:05:77:b0: 89:ed:96:c1:7f:18:44:a1:ab:92:f0:cf:c6:49:1c:12: 7c:74:7f:07:1c:35:91:1c:66:c1:0f:20:f5:d0:f0:95: 4f:08:8c:4f:96:44:bc:d5:31:8b:e2:0e:d1:cc:8d:f5: 7e:bc:ba:d3:e9:e4:9b:ed:09:5b:61:bd:79:fa:6a:91: e4:76:73:0a:2c:27:1d:0c:81:7f:aa:db:84:92:d8:94: d5:03:b5:d6:d9:42:dc:93:c8:62:90:ff:ad:00:9a:05: 46:6c:47:ec:10:f5:66:fc:1c:ba:cd:81:29:82:54:77 Fingerprint (SHA-256): 5F:91:8C:DE:4C:7F:37:26:70:51:29:3D:D5:B5:DE:AC:EC:08:D5:5A:94:37:10:D1:1B:BD:C7:01:3E:13:DD:1A Fingerprint (SHA1): 20:84:DD:F3:3F:6B:17:06:9B:0A:63:1E:8F:7F:E7:6E:31:3E:A4:65 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14744: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14745: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181996 (0x672b9ec) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:58:13 2016 Not After : Fri Jan 08 23:58:13 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:b6:0c:36:56:d9:cd:9a:00:4c:26:ec:b4:d5:a1:58: 36:11:c8:ba:5c:96:65:3f:a7:fc:95:bc:86:a0:8f:a5: 2b:62:c7:12:fc:95:d7:8a:82:d6:fc:5e:b7:4f:bb:77: 71:02:39:8e:e9:ac:f0:49:4a:11:7c:20:7e:01:1a:17: 11:46:06:68:5b:b3:f3:ad:79:09:77:2d:5e:ce:32:13: 73:b7:a9:b1:2a:e7:26:4d:fd:4f:eb:7c:1c:7a:72:54: 3f:a4:6f:46:49:7a:79:13:d8:54:a5:bf:92:f8:40:e7: 23:d8:00:c0:65:4d:7c:ba:d3:0f:9c:4c:af:d3:c6:b3: 50:a6:90:3c:9c:9c:c0:4b:d2:40:c1:93:7e:38:98:0a: 8c:81:9b:77:d5:57:a3:5d:b1:19:21:49:48:fa:a0:05: 70:27:d6:00:45:5e:e1:bb:3c:dc:74:61:0c:f9:05:4c: ad:a7:db:fd:1d:6f:9b:49:05:fe:5a:a8:56:15:bd:95: 49:10:0e:4a:0e:6b:78:c3:84:a6:67:dc:e3:e6:0d:e1: 52:20:fc:9b:bd:1f:4c:4a:cd:10:aa:30:1a:fe:39:c3: 93:06:ab:1f:6d:f2:2d:e8:99:b8:92:bb:cd:ee:e2:b8: 4e:be:b6:e3:89:0a:8b:91:34:6c:31:4e:64:7d:7e:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:7b:3e:83:d3:96:85:b3:37:53:b2:2a:aa:00:ef:b2: 28:d7:8e:4e:6f:8c:89:53:be:55:6f:52:a5:80:fc:52: 50:bd:0c:e7:99:37:88:28:22:2a:cc:07:cd:6b:58:b2: 1e:31:66:59:0b:19:35:73:1d:56:9b:d5:4a:ed:3b:f4: f7:d8:b7:7c:46:4c:b4:c6:a3:dc:3b:31:d2:83:4f:fe: b4:e2:2e:84:55:4e:26:b3:00:b9:ab:0d:65:72:41:1a: e8:6a:3a:8b:f8:e0:2e:f4:ed:70:4e:5d:a4:a7:b1:92: 90:94:4a:c1:ce:7c:cf:95:26:71:0d:f6:1f:d8:81:58: ae:96:f1:76:25:20:4d:88:ff:62:13:27:4a:17:28:e5: 7b:2d:24:a3:e5:94:de:9a:1e:04:95:95:26:75:35:2f: a2:46:c7:22:75:2c:7e:66:22:e1:4d:11:3e:24:72:48: 81:53:06:bc:6f:4e:bb:54:eb:8a:06:dd:18:da:32:dd: 11:75:31:28:07:9c:ca:f1:6f:14:ba:2a:aa:02:31:da: 9b:ed:59:a5:7e:9d:f5:e7:d9:a7:07:ac:45:d1:5f:91: d2:76:4a:fe:45:f5:a6:ab:07:09:c5:98:68:9d:7b:8d: 37:42:1d:f8:5d:1f:1e:76:01:71:70:5b:c0:d4:12:92 Fingerprint (SHA-256): CA:4C:E1:EA:5D:21:D5:8D:58:1A:E1:E1:71:D2:64:08:49:07:68:B9:D2:6C:26:4B:35:F0:C9:A6:B7:59:28:82 Fingerprint (SHA1): 95:74:90:FE:9A:6F:0C:5A:18:8C:29:79:BB:1C:26:1F:B7:17:E5:B6 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14746: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14747: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181997 (0x672b9ed) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 23:58:29 2016 Not After : Fri Jan 08 23:58:29 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:2c:4e:38:59:0a:c3:d3:df:6d:4a:7c:80:66:72:8a: 87:af:97:9e:73:05:c6:86:63:83:be:eb:5b:9e:8a:97: b8:d4:58:12:7d:eb:0d:49:85:36:76:1c:d0:97:b8:6f: ba:c4:b5:c0:1b:5e:3a:4f:61:9b:e8:7d:d4:9b:fe:a3: 4b:05:c9:91:6d:15:ee:19:f5:50:64:04:57:db:82:f9: 98:50:43:4e:0a:31:8a:cd:ac:ee:47:a5:e2:21:8e:d7: 6b:ad:7d:53:70:c6:ee:09:02:37:16:2e:61:10:d1:8f: ce:f0:e8:2c:25:ef:f7:1c:e4:b5:e4:45:e1:18:fb:51: 56:14:5f:ca:96:74:f6:ca:7a:b2:0d:bd:9b:20:c5:f0: d0:01:98:d9:0e:4a:d3:88:3c:3b:e1:2a:c5:f1:1c:34: 31:eb:5b:2c:a4:54:37:01:98:44:26:6c:b9:dd:b8:16: de:03:2a:11:b1:80:ca:65:f2:6a:10:37:ce:62:ca:2f: 35:11:61:d1:18:21:25:fb:42:1d:29:af:24:8b:d9:76: 76:c4:a2:79:40:71:c0:a1:88:f5:06:75:6e:9c:6d:26: 20:ee:14:12:49:4c:b3:53:9f:d9:af:07:f8:1a:fc:8e: 76:93:fb:45:b0:85:bb:4f:a1:2a:97:2d:a8:c3:97:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:3e:8b:63:a7:41:b8:a7:f4:08:a1:9e:8c:70:e9:62: ee:39:55:c0:29:22:d0:a8:5e:46:8e:18:33:44:79:33: d7:95:00:48:9a:07:f6:21:44:c0:a5:66:44:d3:70:2c: 0b:ba:90:4a:72:91:3d:1a:f5:9f:a3:95:08:3c:7d:21: be:5b:af:b8:f2:2a:f6:a8:a8:5e:13:8b:8f:ce:ba:11: eb:29:ce:1c:dd:d0:05:c0:72:81:60:2d:11:8e:14:c3: 8a:85:dc:5d:b9:a1:c9:d3:ce:a8:25:49:05:52:16:1e: 91:1a:45:43:4a:12:2a:27:31:c0:dc:c6:ff:db:f0:1d: a8:f8:ad:e0:e6:5c:7f:ac:3f:eb:3a:31:6f:27:98:fa: d1:32:c1:89:b7:d7:e8:be:f3:8f:f9:d2:13:0d:0b:27: 7e:d7:0d:e4:58:07:d2:ad:9b:f3:f9:bb:f6:2f:30:63: 44:2a:2b:a3:0a:b7:63:95:c4:01:25:b9:57:8c:8d:6d: 1b:e6:e5:c6:60:8c:df:57:13:ef:2c:57:fb:c1:c0:57: aa:6c:7a:3f:4d:4c:ec:f4:19:f7:34:7c:4d:b5:fa:0e: 24:41:d7:28:d0:4f:27:a6:3c:48:83:dd:e1:56:1c:89: 6b:12:fa:e5:a1:e0:48:29:a4:69:10:e7:8a:33:d1:a0 Fingerprint (SHA-256): 19:1C:9E:CE:AA:39:C1:1C:EC:2E:32:0A:28:82:E6:D6:C2:B4:E2:79:00:C0:88:82:C4:B3:9E:E8:AD:5C:AE:D0 Fingerprint (SHA1): 61:AB:FD:3C:BE:0C:0E:9D:5E:8F:A6:DB:B1:EC:CD:85:A7:43:C6:3F Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #14748: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14749: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #14750: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108181999 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14751: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #14752: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14753: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14754: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108182000 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14755: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14756: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14757: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14758: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108182001 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14759: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14760: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #14761: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14762: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 108182002 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14763: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14764: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #14765: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14766: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 108182003 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14767: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14768: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14769: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181999 (0x672b9ef) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:59:09 2016 Not After : Fri Jan 08 23:59:09 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:d0:f1:3d:09:ea:44:95:e1:f4:eb:77:59:58:a1:67: 97:17:19:c3:ad:15:5d:47:fc:ff:a6:1c:92:b4:d4:7e: 1e:db:31:c3:36:21:fd:af:fa:7a:0a:89:ef:b4:09:03: dc:16:cd:8f:87:0e:95:c7:55:5c:b7:43:84:70:22:06: 55:30:2b:71:2b:5e:d3:68:a6:53:f0:88:89:2c:05:12: 6a:1f:64:eb:6d:84:55:d4:36:83:8a:42:4a:9c:3b:a3: 6e:31:8f:42:13:36:ed:21:44:e2:10:cd:3e:bd:24:86: bf:32:a4:90:5d:c1:fe:58:1c:bb:36:d2:3c:02:df:76: e0:b4:bc:15:f2:f1:b6:25:40:77:0c:36:69:23:b8:23: 33:69:ef:c5:27:c6:38:03:f3:d3:ef:ea:b6:4f:35:6a: 32:18:47:28:31:ad:2b:19:0e:19:a0:13:c9:33:1d:79: 1e:6d:0f:92:39:bf:df:e7:d4:ae:bd:46:b1:9f:d5:99: 37:51:9e:8f:17:c7:b4:c5:14:af:f3:b3:89:77:c6:12: c1:3c:88:26:88:af:51:fb:39:d0:2c:f4:fc:fb:dd:14: 57:71:a4:93:0c:f9:78:34:6f:89:a1:1f:17:dd:19:b3: c8:d4:c3:be:17:84:6f:d0:c4:06:3f:28:77:72:e5:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:8b:1b:2c:09:00:bd:6a:58:4d:7a:f6:cd:17:fc:3b: 0e:0d:98:ab:fa:fe:c5:ed:61:f7:62:bc:0a:4a:5c:56: 81:66:47:a9:f6:18:69:5d:2f:0e:61:21:af:ea:26:64: f2:c9:89:ad:39:02:17:1b:bf:c5:c0:30:ba:7e:44:eb: a5:d7:b2:f9:a3:3f:92:86:a6:33:a4:e0:79:93:aa:5e: 8a:cf:2e:71:42:6f:93:4f:f6:70:ad:85:15:94:71:a0: af:73:53:20:f4:73:65:bd:61:3b:93:4e:ff:67:59:b1: 35:0d:86:3f:62:69:a5:fa:65:0d:a8:cf:04:19:de:0d: e6:b3:a5:31:fd:ec:23:28:fa:4f:19:38:87:e8:30:f4: 1d:33:94:ab:0f:57:85:07:23:84:4b:df:5a:88:f4:70: b7:33:3b:05:76:58:7a:f0:ba:ef:6b:a0:04:37:5a:6b: 7f:19:98:45:f1:b1:5b:2b:ad:05:fc:c8:ef:a1:9e:f9: 31:68:30:6c:2c:0b:19:a5:ae:f6:a8:f0:41:5e:1c:1d: fd:40:ac:a8:ac:3e:51:01:9f:06:df:87:b3:27:1a:b3: de:96:1e:1a:ae:f2:20:bf:e2:d7:14:50:9b:1a:df:d0: ab:e8:eb:0a:de:97:5f:8a:da:e3:6f:7d:e5:ae:b2:1d Fingerprint (SHA-256): 7E:43:41:B6:04:74:B9:BB:56:1D:98:1E:F8:5E:C1:51:EF:1B:6B:B2:00:6C:5D:BA:94:3A:15:99:1B:72:B6:DC Fingerprint (SHA1): 2E:00:41:C5:3F:B7:6F:31:90:2A:34:B8:1D:A0:95:24:8C:72:7B:B3 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14770: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14771: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182000 (0x672b9f0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:59:24 2016 Not After : Fri Jan 08 23:59:24 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:bb:18:65:f9:d6:44:74:4a:3a:f9:ef:80:7c:ce:9e: 74:8d:0e:5c:5a:56:ae:dc:38:76:a1:1a:ca:0f:cc:d0: 57:cf:4e:97:ae:55:c1:08:f8:7f:4c:e7:45:1f:44:70: 0d:07:91:e8:3c:35:69:73:4d:ce:24:96:31:d6:a4:da: 62:ec:38:72:cd:65:8d:8d:98:61:0f:40:cd:77:7b:76: b5:98:31:c0:ef:3b:e2:74:ee:43:86:ef:ff:7a:1f:1e: 67:52:a6:79:36:25:af:41:28:65:31:85:05:41:2c:fc: 0b:ae:b7:91:12:e6:f4:13:df:0d:56:67:5f:e5:ae:8b: d2:72:cd:1c:d9:a4:cb:80:7b:f3:83:f8:ed:fa:09:1a: d9:bb:94:eb:4f:03:5c:99:8e:1d:0b:2b:94:07:92:f6: 04:6e:c9:bc:83:5f:ea:b9:b3:e8:dd:89:e0:c4:9d:ea: d2:cf:09:a7:1d:28:1f:47:73:3a:ec:14:d7:8c:c4:8d: e1:57:f0:f2:74:7d:c5:25:f4:dd:9d:f8:e3:11:65:f5: a8:6d:62:90:d9:fe:9e:8d:7b:df:ba:12:65:2f:3a:2a: e6:ba:16:0b:fb:34:32:ea:ca:47:05:31:b4:3d:ed:e6: dd:a6:dc:1c:11:0e:b4:f4:0e:4c:c4:d6:9b:81:b6:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:86:07:d0:41:ae:f9:50:b1:1a:2f:8e:3e:48:a0:6d: 37:b9:64:33:52:5d:4b:3e:8a:07:12:66:9a:f1:9f:bf: d6:a3:35:25:5e:8b:5e:2b:d9:ea:eb:42:de:89:4f:7a: 7d:f7:f3:e7:e8:69:72:6a:59:6c:91:50:90:04:5b:8a: 8d:c6:02:8f:78:86:62:6c:23:f1:da:c7:7b:81:bf:26: fe:c7:f9:5f:38:c3:3a:66:4b:1a:a2:21:ac:06:cd:3c: 7d:c3:e6:5f:e9:e8:51:b7:9e:31:97:88:ff:d9:23:d8: 17:79:36:be:73:77:ed:60:88:a8:b4:ce:da:b8:fd:59: 39:71:0a:00:1b:6c:d7:0b:96:7b:7a:b9:ab:54:f2:22: 0b:d1:41:58:8b:44:65:3f:5d:b3:e6:b0:c9:f0:d0:8a: fe:aa:31:da:1b:3b:2c:ee:a3:2c:0f:06:86:14:c7:34: 22:47:4a:2b:b2:57:e1:8e:24:55:f6:dc:02:ad:e3:3b: d8:52:ea:89:9a:fb:2d:45:f0:dc:31:17:b1:0f:55:17: 2e:83:f9:51:34:41:37:8c:d5:d3:14:33:8e:7a:1f:e9: b5:b4:10:fa:b4:c4:da:e4:73:97:ae:64:b0:e2:82:c5: 30:0d:4f:51:38:8f:eb:77:b7:61:15:18:95:be:0c:97 Fingerprint (SHA-256): 27:5E:DA:07:95:7E:C2:34:94:73:DC:D6:98:EB:ED:8A:94:80:5B:D6:33:F1:F7:15:4C:5B:8B:03:4B:F7:8C:0F Fingerprint (SHA1): 84:E8:AD:A1:1E:E5:F3:90:1F:D8:49:90:3B:1E:0D:FC:49:49:AE:CA Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14772: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14773: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182001 (0x672b9f1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 23:59:43 2016 Not After : Fri Jan 08 23:59:43 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:57:61:37:40:22:65:1d:b0:1a:75:89:2e:5c:5d:51: 91:0d:8b:9d:ac:96:f8:58:58:93:03:67:29:79:fa:ba: 24:4a:7e:f4:77:48:df:d9:8e:85:e0:78:c7:19:ff:44: 8c:7f:09:c5:05:1c:3c:74:2f:87:08:83:77:8f:27:ad: cf:ec:c0:d3:f4:38:0a:d2:3b:97:55:e5:32:44:dd:3b: 18:4f:5a:80:eb:89:d2:5e:0d:8e:e9:4f:fb:f5:02:70: 5c:bc:32:2f:aa:05:9f:20:5a:ca:2a:19:ea:20:dc:8e: 5b:e5:f4:72:a4:fd:0d:49:85:d2:e4:4f:2d:5f:4b:f0: 07:e8:8d:37:c4:5e:b6:b7:3a:8f:85:8e:97:15:4d:42: d3:60:69:35:cb:a6:ee:bb:c6:f6:20:af:04:9c:65:a8: 8b:e0:e6:48:64:3b:f2:7d:ed:65:9b:14:c9:bd:c9:a9: 7d:fd:b4:2f:6d:a0:4f:ec:cc:3d:a9:df:92:41:ba:7f: a8:51:ea:24:fd:b0:00:14:b5:05:0b:e4:68:bf:78:5e: eb:da:ca:11:d1:0d:b4:cf:7a:97:91:41:d1:3d:91:7e: b1:ab:ff:71:4b:f9:a6:c5:44:d8:d2:b8:ce:2b:5b:da: e9:11:40:b3:12:9c:d6:8e:25:c0:25:1a:17:fb:b6:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:14:6f:e2:11:40:c3:a7:74:b0:37:49:0f:42:2b:06: 57:63:72:d6:97:28:27:d8:4f:2d:c7:ff:ea:73:de:0c: 57:21:62:e5:f2:6c:1a:ae:f9:06:21:df:3e:f9:3f:be: 0a:7e:40:66:40:95:fa:9a:66:c9:b6:4d:3b:40:ce:cc: cc:c7:33:6e:ad:77:66:7d:83:37:ae:bd:e3:66:90:33: c6:b3:03:ec:51:c6:c8:2f:40:b5:4a:54:7d:7e:a9:26: 00:66:ce:0b:30:1a:70:d0:05:da:cf:b4:3c:ac:37:57: 32:63:38:d7:c8:a6:2f:d2:3d:b2:99:33:38:0d:8a:72: 60:a5:46:18:8d:54:75:64:50:75:fb:89:62:36:eb:98: 02:a9:e3:66:f7:3e:4f:76:30:02:1a:71:b9:65:04:1d: d3:41:c7:7d:9f:65:8d:39:65:15:2b:67:4c:7f:9f:2c: 57:7b:bf:b2:fe:44:12:d8:0a:bc:e5:9d:a1:0d:12:f1: 27:b9:79:fa:d5:81:89:4a:ee:06:73:3e:6e:fe:a2:55: 2d:a4:6e:28:c4:2b:79:b2:34:7a:10:29:65:78:85:54: f2:95:94:98:84:00:49:4a:f8:06:cf:02:9c:e0:f3:ad: 34:38:d4:41:b4:2f:68:3f:96:99:90:41:a7:d9:99:fa Fingerprint (SHA-256): 73:AC:24:11:2D:54:92:0D:E0:F6:F5:E4:24:01:8A:4A:20:3D:34:68:6A:7F:9A:02:A7:08:08:21:AB:D0:4A:D2 Fingerprint (SHA1): 0E:FD:A3:6B:8F:95:3E:9B:D6:65:5E:31:37:BF:B2:4F:71:64:E4:1B Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #14774: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14775: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #14776: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #14777: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #14778: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181999 (0x672b9ef) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:59:09 2016 Not After : Fri Jan 08 23:59:09 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:d0:f1:3d:09:ea:44:95:e1:f4:eb:77:59:58:a1:67: 97:17:19:c3:ad:15:5d:47:fc:ff:a6:1c:92:b4:d4:7e: 1e:db:31:c3:36:21:fd:af:fa:7a:0a:89:ef:b4:09:03: dc:16:cd:8f:87:0e:95:c7:55:5c:b7:43:84:70:22:06: 55:30:2b:71:2b:5e:d3:68:a6:53:f0:88:89:2c:05:12: 6a:1f:64:eb:6d:84:55:d4:36:83:8a:42:4a:9c:3b:a3: 6e:31:8f:42:13:36:ed:21:44:e2:10:cd:3e:bd:24:86: bf:32:a4:90:5d:c1:fe:58:1c:bb:36:d2:3c:02:df:76: e0:b4:bc:15:f2:f1:b6:25:40:77:0c:36:69:23:b8:23: 33:69:ef:c5:27:c6:38:03:f3:d3:ef:ea:b6:4f:35:6a: 32:18:47:28:31:ad:2b:19:0e:19:a0:13:c9:33:1d:79: 1e:6d:0f:92:39:bf:df:e7:d4:ae:bd:46:b1:9f:d5:99: 37:51:9e:8f:17:c7:b4:c5:14:af:f3:b3:89:77:c6:12: c1:3c:88:26:88:af:51:fb:39:d0:2c:f4:fc:fb:dd:14: 57:71:a4:93:0c:f9:78:34:6f:89:a1:1f:17:dd:19:b3: c8:d4:c3:be:17:84:6f:d0:c4:06:3f:28:77:72:e5:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:8b:1b:2c:09:00:bd:6a:58:4d:7a:f6:cd:17:fc:3b: 0e:0d:98:ab:fa:fe:c5:ed:61:f7:62:bc:0a:4a:5c:56: 81:66:47:a9:f6:18:69:5d:2f:0e:61:21:af:ea:26:64: f2:c9:89:ad:39:02:17:1b:bf:c5:c0:30:ba:7e:44:eb: a5:d7:b2:f9:a3:3f:92:86:a6:33:a4:e0:79:93:aa:5e: 8a:cf:2e:71:42:6f:93:4f:f6:70:ad:85:15:94:71:a0: af:73:53:20:f4:73:65:bd:61:3b:93:4e:ff:67:59:b1: 35:0d:86:3f:62:69:a5:fa:65:0d:a8:cf:04:19:de:0d: e6:b3:a5:31:fd:ec:23:28:fa:4f:19:38:87:e8:30:f4: 1d:33:94:ab:0f:57:85:07:23:84:4b:df:5a:88:f4:70: b7:33:3b:05:76:58:7a:f0:ba:ef:6b:a0:04:37:5a:6b: 7f:19:98:45:f1:b1:5b:2b:ad:05:fc:c8:ef:a1:9e:f9: 31:68:30:6c:2c:0b:19:a5:ae:f6:a8:f0:41:5e:1c:1d: fd:40:ac:a8:ac:3e:51:01:9f:06:df:87:b3:27:1a:b3: de:96:1e:1a:ae:f2:20:bf:e2:d7:14:50:9b:1a:df:d0: ab:e8:eb:0a:de:97:5f:8a:da:e3:6f:7d:e5:ae:b2:1d Fingerprint (SHA-256): 7E:43:41:B6:04:74:B9:BB:56:1D:98:1E:F8:5E:C1:51:EF:1B:6B:B2:00:6C:5D:BA:94:3A:15:99:1B:72:B6:DC Fingerprint (SHA1): 2E:00:41:C5:3F:B7:6F:31:90:2A:34:B8:1D:A0:95:24:8C:72:7B:B3 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14779: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14780: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182000 (0x672b9f0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:59:24 2016 Not After : Fri Jan 08 23:59:24 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:bb:18:65:f9:d6:44:74:4a:3a:f9:ef:80:7c:ce:9e: 74:8d:0e:5c:5a:56:ae:dc:38:76:a1:1a:ca:0f:cc:d0: 57:cf:4e:97:ae:55:c1:08:f8:7f:4c:e7:45:1f:44:70: 0d:07:91:e8:3c:35:69:73:4d:ce:24:96:31:d6:a4:da: 62:ec:38:72:cd:65:8d:8d:98:61:0f:40:cd:77:7b:76: b5:98:31:c0:ef:3b:e2:74:ee:43:86:ef:ff:7a:1f:1e: 67:52:a6:79:36:25:af:41:28:65:31:85:05:41:2c:fc: 0b:ae:b7:91:12:e6:f4:13:df:0d:56:67:5f:e5:ae:8b: d2:72:cd:1c:d9:a4:cb:80:7b:f3:83:f8:ed:fa:09:1a: d9:bb:94:eb:4f:03:5c:99:8e:1d:0b:2b:94:07:92:f6: 04:6e:c9:bc:83:5f:ea:b9:b3:e8:dd:89:e0:c4:9d:ea: d2:cf:09:a7:1d:28:1f:47:73:3a:ec:14:d7:8c:c4:8d: e1:57:f0:f2:74:7d:c5:25:f4:dd:9d:f8:e3:11:65:f5: a8:6d:62:90:d9:fe:9e:8d:7b:df:ba:12:65:2f:3a:2a: e6:ba:16:0b:fb:34:32:ea:ca:47:05:31:b4:3d:ed:e6: dd:a6:dc:1c:11:0e:b4:f4:0e:4c:c4:d6:9b:81:b6:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:86:07:d0:41:ae:f9:50:b1:1a:2f:8e:3e:48:a0:6d: 37:b9:64:33:52:5d:4b:3e:8a:07:12:66:9a:f1:9f:bf: d6:a3:35:25:5e:8b:5e:2b:d9:ea:eb:42:de:89:4f:7a: 7d:f7:f3:e7:e8:69:72:6a:59:6c:91:50:90:04:5b:8a: 8d:c6:02:8f:78:86:62:6c:23:f1:da:c7:7b:81:bf:26: fe:c7:f9:5f:38:c3:3a:66:4b:1a:a2:21:ac:06:cd:3c: 7d:c3:e6:5f:e9:e8:51:b7:9e:31:97:88:ff:d9:23:d8: 17:79:36:be:73:77:ed:60:88:a8:b4:ce:da:b8:fd:59: 39:71:0a:00:1b:6c:d7:0b:96:7b:7a:b9:ab:54:f2:22: 0b:d1:41:58:8b:44:65:3f:5d:b3:e6:b0:c9:f0:d0:8a: fe:aa:31:da:1b:3b:2c:ee:a3:2c:0f:06:86:14:c7:34: 22:47:4a:2b:b2:57:e1:8e:24:55:f6:dc:02:ad:e3:3b: d8:52:ea:89:9a:fb:2d:45:f0:dc:31:17:b1:0f:55:17: 2e:83:f9:51:34:41:37:8c:d5:d3:14:33:8e:7a:1f:e9: b5:b4:10:fa:b4:c4:da:e4:73:97:ae:64:b0:e2:82:c5: 30:0d:4f:51:38:8f:eb:77:b7:61:15:18:95:be:0c:97 Fingerprint (SHA-256): 27:5E:DA:07:95:7E:C2:34:94:73:DC:D6:98:EB:ED:8A:94:80:5B:D6:33:F1:F7:15:4C:5B:8B:03:4B:F7:8C:0F Fingerprint (SHA1): 84:E8:AD:A1:1E:E5:F3:90:1F:D8:49:90:3B:1E:0D:FC:49:49:AE:CA Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14781: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14782: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182001 (0x672b9f1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 23:59:43 2016 Not After : Fri Jan 08 23:59:43 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:57:61:37:40:22:65:1d:b0:1a:75:89:2e:5c:5d:51: 91:0d:8b:9d:ac:96:f8:58:58:93:03:67:29:79:fa:ba: 24:4a:7e:f4:77:48:df:d9:8e:85:e0:78:c7:19:ff:44: 8c:7f:09:c5:05:1c:3c:74:2f:87:08:83:77:8f:27:ad: cf:ec:c0:d3:f4:38:0a:d2:3b:97:55:e5:32:44:dd:3b: 18:4f:5a:80:eb:89:d2:5e:0d:8e:e9:4f:fb:f5:02:70: 5c:bc:32:2f:aa:05:9f:20:5a:ca:2a:19:ea:20:dc:8e: 5b:e5:f4:72:a4:fd:0d:49:85:d2:e4:4f:2d:5f:4b:f0: 07:e8:8d:37:c4:5e:b6:b7:3a:8f:85:8e:97:15:4d:42: d3:60:69:35:cb:a6:ee:bb:c6:f6:20:af:04:9c:65:a8: 8b:e0:e6:48:64:3b:f2:7d:ed:65:9b:14:c9:bd:c9:a9: 7d:fd:b4:2f:6d:a0:4f:ec:cc:3d:a9:df:92:41:ba:7f: a8:51:ea:24:fd:b0:00:14:b5:05:0b:e4:68:bf:78:5e: eb:da:ca:11:d1:0d:b4:cf:7a:97:91:41:d1:3d:91:7e: b1:ab:ff:71:4b:f9:a6:c5:44:d8:d2:b8:ce:2b:5b:da: e9:11:40:b3:12:9c:d6:8e:25:c0:25:1a:17:fb:b6:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:14:6f:e2:11:40:c3:a7:74:b0:37:49:0f:42:2b:06: 57:63:72:d6:97:28:27:d8:4f:2d:c7:ff:ea:73:de:0c: 57:21:62:e5:f2:6c:1a:ae:f9:06:21:df:3e:f9:3f:be: 0a:7e:40:66:40:95:fa:9a:66:c9:b6:4d:3b:40:ce:cc: cc:c7:33:6e:ad:77:66:7d:83:37:ae:bd:e3:66:90:33: c6:b3:03:ec:51:c6:c8:2f:40:b5:4a:54:7d:7e:a9:26: 00:66:ce:0b:30:1a:70:d0:05:da:cf:b4:3c:ac:37:57: 32:63:38:d7:c8:a6:2f:d2:3d:b2:99:33:38:0d:8a:72: 60:a5:46:18:8d:54:75:64:50:75:fb:89:62:36:eb:98: 02:a9:e3:66:f7:3e:4f:76:30:02:1a:71:b9:65:04:1d: d3:41:c7:7d:9f:65:8d:39:65:15:2b:67:4c:7f:9f:2c: 57:7b:bf:b2:fe:44:12:d8:0a:bc:e5:9d:a1:0d:12:f1: 27:b9:79:fa:d5:81:89:4a:ee:06:73:3e:6e:fe:a2:55: 2d:a4:6e:28:c4:2b:79:b2:34:7a:10:29:65:78:85:54: f2:95:94:98:84:00:49:4a:f8:06:cf:02:9c:e0:f3:ad: 34:38:d4:41:b4:2f:68:3f:96:99:90:41:a7:d9:99:fa Fingerprint (SHA-256): 73:AC:24:11:2D:54:92:0D:E0:F6:F5:E4:24:01:8A:4A:20:3D:34:68:6A:7F:9A:02:A7:08:08:21:AB:D0:4A:D2 Fingerprint (SHA1): 0E:FD:A3:6B:8F:95:3E:9B:D6:65:5E:31:37:BF:B2:4F:71:64:E4:1B Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #14783: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14784: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181999 (0x672b9ef) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:59:09 2016 Not After : Fri Jan 08 23:59:09 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:d0:f1:3d:09:ea:44:95:e1:f4:eb:77:59:58:a1:67: 97:17:19:c3:ad:15:5d:47:fc:ff:a6:1c:92:b4:d4:7e: 1e:db:31:c3:36:21:fd:af:fa:7a:0a:89:ef:b4:09:03: dc:16:cd:8f:87:0e:95:c7:55:5c:b7:43:84:70:22:06: 55:30:2b:71:2b:5e:d3:68:a6:53:f0:88:89:2c:05:12: 6a:1f:64:eb:6d:84:55:d4:36:83:8a:42:4a:9c:3b:a3: 6e:31:8f:42:13:36:ed:21:44:e2:10:cd:3e:bd:24:86: bf:32:a4:90:5d:c1:fe:58:1c:bb:36:d2:3c:02:df:76: e0:b4:bc:15:f2:f1:b6:25:40:77:0c:36:69:23:b8:23: 33:69:ef:c5:27:c6:38:03:f3:d3:ef:ea:b6:4f:35:6a: 32:18:47:28:31:ad:2b:19:0e:19:a0:13:c9:33:1d:79: 1e:6d:0f:92:39:bf:df:e7:d4:ae:bd:46:b1:9f:d5:99: 37:51:9e:8f:17:c7:b4:c5:14:af:f3:b3:89:77:c6:12: c1:3c:88:26:88:af:51:fb:39:d0:2c:f4:fc:fb:dd:14: 57:71:a4:93:0c:f9:78:34:6f:89:a1:1f:17:dd:19:b3: c8:d4:c3:be:17:84:6f:d0:c4:06:3f:28:77:72:e5:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:8b:1b:2c:09:00:bd:6a:58:4d:7a:f6:cd:17:fc:3b: 0e:0d:98:ab:fa:fe:c5:ed:61:f7:62:bc:0a:4a:5c:56: 81:66:47:a9:f6:18:69:5d:2f:0e:61:21:af:ea:26:64: f2:c9:89:ad:39:02:17:1b:bf:c5:c0:30:ba:7e:44:eb: a5:d7:b2:f9:a3:3f:92:86:a6:33:a4:e0:79:93:aa:5e: 8a:cf:2e:71:42:6f:93:4f:f6:70:ad:85:15:94:71:a0: af:73:53:20:f4:73:65:bd:61:3b:93:4e:ff:67:59:b1: 35:0d:86:3f:62:69:a5:fa:65:0d:a8:cf:04:19:de:0d: e6:b3:a5:31:fd:ec:23:28:fa:4f:19:38:87:e8:30:f4: 1d:33:94:ab:0f:57:85:07:23:84:4b:df:5a:88:f4:70: b7:33:3b:05:76:58:7a:f0:ba:ef:6b:a0:04:37:5a:6b: 7f:19:98:45:f1:b1:5b:2b:ad:05:fc:c8:ef:a1:9e:f9: 31:68:30:6c:2c:0b:19:a5:ae:f6:a8:f0:41:5e:1c:1d: fd:40:ac:a8:ac:3e:51:01:9f:06:df:87:b3:27:1a:b3: de:96:1e:1a:ae:f2:20:bf:e2:d7:14:50:9b:1a:df:d0: ab:e8:eb:0a:de:97:5f:8a:da:e3:6f:7d:e5:ae:b2:1d Fingerprint (SHA-256): 7E:43:41:B6:04:74:B9:BB:56:1D:98:1E:F8:5E:C1:51:EF:1B:6B:B2:00:6C:5D:BA:94:3A:15:99:1B:72:B6:DC Fingerprint (SHA1): 2E:00:41:C5:3F:B7:6F:31:90:2A:34:B8:1D:A0:95:24:8C:72:7B:B3 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14785: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108181999 (0x672b9ef) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:59:09 2016 Not After : Fri Jan 08 23:59:09 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:d0:f1:3d:09:ea:44:95:e1:f4:eb:77:59:58:a1:67: 97:17:19:c3:ad:15:5d:47:fc:ff:a6:1c:92:b4:d4:7e: 1e:db:31:c3:36:21:fd:af:fa:7a:0a:89:ef:b4:09:03: dc:16:cd:8f:87:0e:95:c7:55:5c:b7:43:84:70:22:06: 55:30:2b:71:2b:5e:d3:68:a6:53:f0:88:89:2c:05:12: 6a:1f:64:eb:6d:84:55:d4:36:83:8a:42:4a:9c:3b:a3: 6e:31:8f:42:13:36:ed:21:44:e2:10:cd:3e:bd:24:86: bf:32:a4:90:5d:c1:fe:58:1c:bb:36:d2:3c:02:df:76: e0:b4:bc:15:f2:f1:b6:25:40:77:0c:36:69:23:b8:23: 33:69:ef:c5:27:c6:38:03:f3:d3:ef:ea:b6:4f:35:6a: 32:18:47:28:31:ad:2b:19:0e:19:a0:13:c9:33:1d:79: 1e:6d:0f:92:39:bf:df:e7:d4:ae:bd:46:b1:9f:d5:99: 37:51:9e:8f:17:c7:b4:c5:14:af:f3:b3:89:77:c6:12: c1:3c:88:26:88:af:51:fb:39:d0:2c:f4:fc:fb:dd:14: 57:71:a4:93:0c:f9:78:34:6f:89:a1:1f:17:dd:19:b3: c8:d4:c3:be:17:84:6f:d0:c4:06:3f:28:77:72:e5:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:8b:1b:2c:09:00:bd:6a:58:4d:7a:f6:cd:17:fc:3b: 0e:0d:98:ab:fa:fe:c5:ed:61:f7:62:bc:0a:4a:5c:56: 81:66:47:a9:f6:18:69:5d:2f:0e:61:21:af:ea:26:64: f2:c9:89:ad:39:02:17:1b:bf:c5:c0:30:ba:7e:44:eb: a5:d7:b2:f9:a3:3f:92:86:a6:33:a4:e0:79:93:aa:5e: 8a:cf:2e:71:42:6f:93:4f:f6:70:ad:85:15:94:71:a0: af:73:53:20:f4:73:65:bd:61:3b:93:4e:ff:67:59:b1: 35:0d:86:3f:62:69:a5:fa:65:0d:a8:cf:04:19:de:0d: e6:b3:a5:31:fd:ec:23:28:fa:4f:19:38:87:e8:30:f4: 1d:33:94:ab:0f:57:85:07:23:84:4b:df:5a:88:f4:70: b7:33:3b:05:76:58:7a:f0:ba:ef:6b:a0:04:37:5a:6b: 7f:19:98:45:f1:b1:5b:2b:ad:05:fc:c8:ef:a1:9e:f9: 31:68:30:6c:2c:0b:19:a5:ae:f6:a8:f0:41:5e:1c:1d: fd:40:ac:a8:ac:3e:51:01:9f:06:df:87:b3:27:1a:b3: de:96:1e:1a:ae:f2:20:bf:e2:d7:14:50:9b:1a:df:d0: ab:e8:eb:0a:de:97:5f:8a:da:e3:6f:7d:e5:ae:b2:1d Fingerprint (SHA-256): 7E:43:41:B6:04:74:B9:BB:56:1D:98:1E:F8:5E:C1:51:EF:1B:6B:B2:00:6C:5D:BA:94:3A:15:99:1B:72:B6:DC Fingerprint (SHA1): 2E:00:41:C5:3F:B7:6F:31:90:2A:34:B8:1D:A0:95:24:8C:72:7B:B3 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14786: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182000 (0x672b9f0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:59:24 2016 Not After : Fri Jan 08 23:59:24 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:bb:18:65:f9:d6:44:74:4a:3a:f9:ef:80:7c:ce:9e: 74:8d:0e:5c:5a:56:ae:dc:38:76:a1:1a:ca:0f:cc:d0: 57:cf:4e:97:ae:55:c1:08:f8:7f:4c:e7:45:1f:44:70: 0d:07:91:e8:3c:35:69:73:4d:ce:24:96:31:d6:a4:da: 62:ec:38:72:cd:65:8d:8d:98:61:0f:40:cd:77:7b:76: b5:98:31:c0:ef:3b:e2:74:ee:43:86:ef:ff:7a:1f:1e: 67:52:a6:79:36:25:af:41:28:65:31:85:05:41:2c:fc: 0b:ae:b7:91:12:e6:f4:13:df:0d:56:67:5f:e5:ae:8b: d2:72:cd:1c:d9:a4:cb:80:7b:f3:83:f8:ed:fa:09:1a: d9:bb:94:eb:4f:03:5c:99:8e:1d:0b:2b:94:07:92:f6: 04:6e:c9:bc:83:5f:ea:b9:b3:e8:dd:89:e0:c4:9d:ea: d2:cf:09:a7:1d:28:1f:47:73:3a:ec:14:d7:8c:c4:8d: e1:57:f0:f2:74:7d:c5:25:f4:dd:9d:f8:e3:11:65:f5: a8:6d:62:90:d9:fe:9e:8d:7b:df:ba:12:65:2f:3a:2a: e6:ba:16:0b:fb:34:32:ea:ca:47:05:31:b4:3d:ed:e6: dd:a6:dc:1c:11:0e:b4:f4:0e:4c:c4:d6:9b:81:b6:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:86:07:d0:41:ae:f9:50:b1:1a:2f:8e:3e:48:a0:6d: 37:b9:64:33:52:5d:4b:3e:8a:07:12:66:9a:f1:9f:bf: d6:a3:35:25:5e:8b:5e:2b:d9:ea:eb:42:de:89:4f:7a: 7d:f7:f3:e7:e8:69:72:6a:59:6c:91:50:90:04:5b:8a: 8d:c6:02:8f:78:86:62:6c:23:f1:da:c7:7b:81:bf:26: fe:c7:f9:5f:38:c3:3a:66:4b:1a:a2:21:ac:06:cd:3c: 7d:c3:e6:5f:e9:e8:51:b7:9e:31:97:88:ff:d9:23:d8: 17:79:36:be:73:77:ed:60:88:a8:b4:ce:da:b8:fd:59: 39:71:0a:00:1b:6c:d7:0b:96:7b:7a:b9:ab:54:f2:22: 0b:d1:41:58:8b:44:65:3f:5d:b3:e6:b0:c9:f0:d0:8a: fe:aa:31:da:1b:3b:2c:ee:a3:2c:0f:06:86:14:c7:34: 22:47:4a:2b:b2:57:e1:8e:24:55:f6:dc:02:ad:e3:3b: d8:52:ea:89:9a:fb:2d:45:f0:dc:31:17:b1:0f:55:17: 2e:83:f9:51:34:41:37:8c:d5:d3:14:33:8e:7a:1f:e9: b5:b4:10:fa:b4:c4:da:e4:73:97:ae:64:b0:e2:82:c5: 30:0d:4f:51:38:8f:eb:77:b7:61:15:18:95:be:0c:97 Fingerprint (SHA-256): 27:5E:DA:07:95:7E:C2:34:94:73:DC:D6:98:EB:ED:8A:94:80:5B:D6:33:F1:F7:15:4C:5B:8B:03:4B:F7:8C:0F Fingerprint (SHA1): 84:E8:AD:A1:1E:E5:F3:90:1F:D8:49:90:3B:1E:0D:FC:49:49:AE:CA Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14787: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182000 (0x672b9f0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Jan 08 23:59:24 2016 Not After : Fri Jan 08 23:59:24 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:bb:18:65:f9:d6:44:74:4a:3a:f9:ef:80:7c:ce:9e: 74:8d:0e:5c:5a:56:ae:dc:38:76:a1:1a:ca:0f:cc:d0: 57:cf:4e:97:ae:55:c1:08:f8:7f:4c:e7:45:1f:44:70: 0d:07:91:e8:3c:35:69:73:4d:ce:24:96:31:d6:a4:da: 62:ec:38:72:cd:65:8d:8d:98:61:0f:40:cd:77:7b:76: b5:98:31:c0:ef:3b:e2:74:ee:43:86:ef:ff:7a:1f:1e: 67:52:a6:79:36:25:af:41:28:65:31:85:05:41:2c:fc: 0b:ae:b7:91:12:e6:f4:13:df:0d:56:67:5f:e5:ae:8b: d2:72:cd:1c:d9:a4:cb:80:7b:f3:83:f8:ed:fa:09:1a: d9:bb:94:eb:4f:03:5c:99:8e:1d:0b:2b:94:07:92:f6: 04:6e:c9:bc:83:5f:ea:b9:b3:e8:dd:89:e0:c4:9d:ea: d2:cf:09:a7:1d:28:1f:47:73:3a:ec:14:d7:8c:c4:8d: e1:57:f0:f2:74:7d:c5:25:f4:dd:9d:f8:e3:11:65:f5: a8:6d:62:90:d9:fe:9e:8d:7b:df:ba:12:65:2f:3a:2a: e6:ba:16:0b:fb:34:32:ea:ca:47:05:31:b4:3d:ed:e6: dd:a6:dc:1c:11:0e:b4:f4:0e:4c:c4:d6:9b:81:b6:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:86:07:d0:41:ae:f9:50:b1:1a:2f:8e:3e:48:a0:6d: 37:b9:64:33:52:5d:4b:3e:8a:07:12:66:9a:f1:9f:bf: d6:a3:35:25:5e:8b:5e:2b:d9:ea:eb:42:de:89:4f:7a: 7d:f7:f3:e7:e8:69:72:6a:59:6c:91:50:90:04:5b:8a: 8d:c6:02:8f:78:86:62:6c:23:f1:da:c7:7b:81:bf:26: fe:c7:f9:5f:38:c3:3a:66:4b:1a:a2:21:ac:06:cd:3c: 7d:c3:e6:5f:e9:e8:51:b7:9e:31:97:88:ff:d9:23:d8: 17:79:36:be:73:77:ed:60:88:a8:b4:ce:da:b8:fd:59: 39:71:0a:00:1b:6c:d7:0b:96:7b:7a:b9:ab:54:f2:22: 0b:d1:41:58:8b:44:65:3f:5d:b3:e6:b0:c9:f0:d0:8a: fe:aa:31:da:1b:3b:2c:ee:a3:2c:0f:06:86:14:c7:34: 22:47:4a:2b:b2:57:e1:8e:24:55:f6:dc:02:ad:e3:3b: d8:52:ea:89:9a:fb:2d:45:f0:dc:31:17:b1:0f:55:17: 2e:83:f9:51:34:41:37:8c:d5:d3:14:33:8e:7a:1f:e9: b5:b4:10:fa:b4:c4:da:e4:73:97:ae:64:b0:e2:82:c5: 30:0d:4f:51:38:8f:eb:77:b7:61:15:18:95:be:0c:97 Fingerprint (SHA-256): 27:5E:DA:07:95:7E:C2:34:94:73:DC:D6:98:EB:ED:8A:94:80:5B:D6:33:F1:F7:15:4C:5B:8B:03:4B:F7:8C:0F Fingerprint (SHA1): 84:E8:AD:A1:1E:E5:F3:90:1F:D8:49:90:3B:1E:0D:FC:49:49:AE:CA Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14788: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182001 (0x672b9f1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 23:59:43 2016 Not After : Fri Jan 08 23:59:43 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:57:61:37:40:22:65:1d:b0:1a:75:89:2e:5c:5d:51: 91:0d:8b:9d:ac:96:f8:58:58:93:03:67:29:79:fa:ba: 24:4a:7e:f4:77:48:df:d9:8e:85:e0:78:c7:19:ff:44: 8c:7f:09:c5:05:1c:3c:74:2f:87:08:83:77:8f:27:ad: cf:ec:c0:d3:f4:38:0a:d2:3b:97:55:e5:32:44:dd:3b: 18:4f:5a:80:eb:89:d2:5e:0d:8e:e9:4f:fb:f5:02:70: 5c:bc:32:2f:aa:05:9f:20:5a:ca:2a:19:ea:20:dc:8e: 5b:e5:f4:72:a4:fd:0d:49:85:d2:e4:4f:2d:5f:4b:f0: 07:e8:8d:37:c4:5e:b6:b7:3a:8f:85:8e:97:15:4d:42: d3:60:69:35:cb:a6:ee:bb:c6:f6:20:af:04:9c:65:a8: 8b:e0:e6:48:64:3b:f2:7d:ed:65:9b:14:c9:bd:c9:a9: 7d:fd:b4:2f:6d:a0:4f:ec:cc:3d:a9:df:92:41:ba:7f: a8:51:ea:24:fd:b0:00:14:b5:05:0b:e4:68:bf:78:5e: eb:da:ca:11:d1:0d:b4:cf:7a:97:91:41:d1:3d:91:7e: b1:ab:ff:71:4b:f9:a6:c5:44:d8:d2:b8:ce:2b:5b:da: e9:11:40:b3:12:9c:d6:8e:25:c0:25:1a:17:fb:b6:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:14:6f:e2:11:40:c3:a7:74:b0:37:49:0f:42:2b:06: 57:63:72:d6:97:28:27:d8:4f:2d:c7:ff:ea:73:de:0c: 57:21:62:e5:f2:6c:1a:ae:f9:06:21:df:3e:f9:3f:be: 0a:7e:40:66:40:95:fa:9a:66:c9:b6:4d:3b:40:ce:cc: cc:c7:33:6e:ad:77:66:7d:83:37:ae:bd:e3:66:90:33: c6:b3:03:ec:51:c6:c8:2f:40:b5:4a:54:7d:7e:a9:26: 00:66:ce:0b:30:1a:70:d0:05:da:cf:b4:3c:ac:37:57: 32:63:38:d7:c8:a6:2f:d2:3d:b2:99:33:38:0d:8a:72: 60:a5:46:18:8d:54:75:64:50:75:fb:89:62:36:eb:98: 02:a9:e3:66:f7:3e:4f:76:30:02:1a:71:b9:65:04:1d: d3:41:c7:7d:9f:65:8d:39:65:15:2b:67:4c:7f:9f:2c: 57:7b:bf:b2:fe:44:12:d8:0a:bc:e5:9d:a1:0d:12:f1: 27:b9:79:fa:d5:81:89:4a:ee:06:73:3e:6e:fe:a2:55: 2d:a4:6e:28:c4:2b:79:b2:34:7a:10:29:65:78:85:54: f2:95:94:98:84:00:49:4a:f8:06:cf:02:9c:e0:f3:ad: 34:38:d4:41:b4:2f:68:3f:96:99:90:41:a7:d9:99:fa Fingerprint (SHA-256): 73:AC:24:11:2D:54:92:0D:E0:F6:F5:E4:24:01:8A:4A:20:3D:34:68:6A:7F:9A:02:A7:08:08:21:AB:D0:4A:D2 Fingerprint (SHA1): 0E:FD:A3:6B:8F:95:3E:9B:D6:65:5E:31:37:BF:B2:4F:71:64:E4:1B Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #14789: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182001 (0x672b9f1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Jan 08 23:59:43 2016 Not After : Fri Jan 08 23:59:43 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:57:61:37:40:22:65:1d:b0:1a:75:89:2e:5c:5d:51: 91:0d:8b:9d:ac:96:f8:58:58:93:03:67:29:79:fa:ba: 24:4a:7e:f4:77:48:df:d9:8e:85:e0:78:c7:19:ff:44: 8c:7f:09:c5:05:1c:3c:74:2f:87:08:83:77:8f:27:ad: cf:ec:c0:d3:f4:38:0a:d2:3b:97:55:e5:32:44:dd:3b: 18:4f:5a:80:eb:89:d2:5e:0d:8e:e9:4f:fb:f5:02:70: 5c:bc:32:2f:aa:05:9f:20:5a:ca:2a:19:ea:20:dc:8e: 5b:e5:f4:72:a4:fd:0d:49:85:d2:e4:4f:2d:5f:4b:f0: 07:e8:8d:37:c4:5e:b6:b7:3a:8f:85:8e:97:15:4d:42: d3:60:69:35:cb:a6:ee:bb:c6:f6:20:af:04:9c:65:a8: 8b:e0:e6:48:64:3b:f2:7d:ed:65:9b:14:c9:bd:c9:a9: 7d:fd:b4:2f:6d:a0:4f:ec:cc:3d:a9:df:92:41:ba:7f: a8:51:ea:24:fd:b0:00:14:b5:05:0b:e4:68:bf:78:5e: eb:da:ca:11:d1:0d:b4:cf:7a:97:91:41:d1:3d:91:7e: b1:ab:ff:71:4b:f9:a6:c5:44:d8:d2:b8:ce:2b:5b:da: e9:11:40:b3:12:9c:d6:8e:25:c0:25:1a:17:fb:b6:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:14:6f:e2:11:40:c3:a7:74:b0:37:49:0f:42:2b:06: 57:63:72:d6:97:28:27:d8:4f:2d:c7:ff:ea:73:de:0c: 57:21:62:e5:f2:6c:1a:ae:f9:06:21:df:3e:f9:3f:be: 0a:7e:40:66:40:95:fa:9a:66:c9:b6:4d:3b:40:ce:cc: cc:c7:33:6e:ad:77:66:7d:83:37:ae:bd:e3:66:90:33: c6:b3:03:ec:51:c6:c8:2f:40:b5:4a:54:7d:7e:a9:26: 00:66:ce:0b:30:1a:70:d0:05:da:cf:b4:3c:ac:37:57: 32:63:38:d7:c8:a6:2f:d2:3d:b2:99:33:38:0d:8a:72: 60:a5:46:18:8d:54:75:64:50:75:fb:89:62:36:eb:98: 02:a9:e3:66:f7:3e:4f:76:30:02:1a:71:b9:65:04:1d: d3:41:c7:7d:9f:65:8d:39:65:15:2b:67:4c:7f:9f:2c: 57:7b:bf:b2:fe:44:12:d8:0a:bc:e5:9d:a1:0d:12:f1: 27:b9:79:fa:d5:81:89:4a:ee:06:73:3e:6e:fe:a2:55: 2d:a4:6e:28:c4:2b:79:b2:34:7a:10:29:65:78:85:54: f2:95:94:98:84:00:49:4a:f8:06:cf:02:9c:e0:f3:ad: 34:38:d4:41:b4:2f:68:3f:96:99:90:41:a7:d9:99:fa Fingerprint (SHA-256): 73:AC:24:11:2D:54:92:0D:E0:F6:F5:E4:24:01:8A:4A:20:3D:34:68:6A:7F:9A:02:A7:08:08:21:AB:D0:4A:D2 Fingerprint (SHA1): 0E:FD:A3:6B:8F:95:3E:9B:D6:65:5E:31:37:BF:B2:4F:71:64:E4:1B Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #14790: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #14791: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108182004 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14792: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #14793: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14794: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14795: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108182005 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14796: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14797: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14798: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14799: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108182006 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #14800: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14801: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #14802: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14803: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 108182007 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14804: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14805: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #14806: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14807: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 108182008 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14808: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14809: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #14810: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14811: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 108182009 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14812: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14813: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #14814: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14815: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 108182010 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14816: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14817: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14818: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #14819: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #14820: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #14821: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #14822: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182004 (0x672b9f4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Sat Jan 09 00:00:36 2016 Not After : Sat Jan 09 00:00:36 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:64:82:da:e9:40:dd:12:e9:26:6a:4e:99:4e:3e:c3: e0:8b:04:51:51:f1:b1:08:cc:d3:04:e8:92:3a:04:4b: 80:e9:e5:18:ce:84:cf:0a:dd:30:7e:4e:4b:47:29:b8: d1:25:d1:d6:b2:b5:5f:13:95:02:50:ce:01:3b:f6:bf: 1f:00:9a:81:5d:71:17:d1:f2:02:c1:6b:de:29:23:b8: 5f:f3:9c:1a:75:59:69:ca:36:54:c1:43:53:1e:20:2a: ec:36:50:fe:d6:2c:f7:d2:53:20:2c:73:e2:9f:c8:61: 38:ef:47:c3:65:04:24:f3:7a:ad:c1:62:da:d7:b8:c4: ff:5a:e3:56:94:13:25:d1:65:d4:7c:a0:8d:45:ec:30: 44:e8:93:c7:e8:ff:65:90:00:65:e7:e6:a0:76:ae:d5: 82:eb:7e:b6:c6:3e:e2:09:0c:a2:da:25:93:f9:c8:f8: 29:64:e0:98:97:3e:80:38:62:6b:35:d0:c0:26:1f:b2: 21:ff:06:2b:0d:9e:72:64:ca:3d:d5:79:18:3b:39:0a: 3e:91:21:0d:b2:e3:5a:9d:b6:64:b7:cb:a6:03:61:2a: db:a8:eb:19:e4:30:0d:93:ac:cc:e7:ed:78:37:92:e3: bc:02:13:13:c5:ec:89:db:c5:a1:24:8d:e8:ad:2b:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 63:97:16:ba:d8:76:f7:07:e8:fd:e5:f0:bc:e5:e3:e5: 2f:99:1f:dd:f2:ce:56:b5:1f:54:76:c9:f7:f9:e7:b0: f5:75:6a:6e:4c:2f:f3:d7:78:d9:cb:aa:a7:6f:c0:d3: 89:3a:1e:9d:4a:c6:13:a9:f2:b9:37:c7:fd:15:7c:0e: 69:93:bd:8a:17:39:dc:08:d4:0d:7e:16:d3:8d:2c:68: 2c:5c:fb:40:8c:0e:fb:6c:9a:17:18:b5:8a:2b:c2:15: b5:16:91:63:55:84:32:5d:5f:94:f8:42:76:09:43:36: e9:30:de:bd:6c:ba:61:f5:8d:81:a1:e0:f9:d1:e9:46: 2c:16:39:36:2a:48:90:03:e4:c4:5d:61:20:4f:6c:9e: 04:d9:65:6c:39:8b:9a:8e:14:f5:40:f9:c5:20:6d:c5: d5:2c:b7:91:8e:93:23:74:c9:87:8c:88:de:b7:1d:8c: 83:e4:50:29:24:dd:5f:75:67:1f:e5:bd:82:21:46:db: b7:8b:63:4e:ce:3b:b7:20:1e:4f:76:40:1b:b0:81:7e: 80:ce:e9:b1:f5:5b:91:06:ca:ac:e8:1a:70:c8:50:7e: 79:52:78:c3:78:84:d6:71:f4:bf:29:20:28:f0:56:a2: 5a:2d:f6:38:a5:67:70:ee:42:92:fa:73:a6:1d:18:5c Fingerprint (SHA-256): 52:4A:D1:7F:92:FA:6A:CD:6D:F9:E7:2B:60:F3:1E:CB:4C:99:BD:22:4B:5B:E3:B6:6B:28:1F:2B:DA:F0:8D:D2 Fingerprint (SHA1): 26:08:AA:A9:03:D8:FF:F2:00:DB:5B:FD:86:81:12:B6:47:96:5B:ED Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14823: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14824: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14825: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14826: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182004 (0x672b9f4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Sat Jan 09 00:00:36 2016 Not After : Sat Jan 09 00:00:36 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:64:82:da:e9:40:dd:12:e9:26:6a:4e:99:4e:3e:c3: e0:8b:04:51:51:f1:b1:08:cc:d3:04:e8:92:3a:04:4b: 80:e9:e5:18:ce:84:cf:0a:dd:30:7e:4e:4b:47:29:b8: d1:25:d1:d6:b2:b5:5f:13:95:02:50:ce:01:3b:f6:bf: 1f:00:9a:81:5d:71:17:d1:f2:02:c1:6b:de:29:23:b8: 5f:f3:9c:1a:75:59:69:ca:36:54:c1:43:53:1e:20:2a: ec:36:50:fe:d6:2c:f7:d2:53:20:2c:73:e2:9f:c8:61: 38:ef:47:c3:65:04:24:f3:7a:ad:c1:62:da:d7:b8:c4: ff:5a:e3:56:94:13:25:d1:65:d4:7c:a0:8d:45:ec:30: 44:e8:93:c7:e8:ff:65:90:00:65:e7:e6:a0:76:ae:d5: 82:eb:7e:b6:c6:3e:e2:09:0c:a2:da:25:93:f9:c8:f8: 29:64:e0:98:97:3e:80:38:62:6b:35:d0:c0:26:1f:b2: 21:ff:06:2b:0d:9e:72:64:ca:3d:d5:79:18:3b:39:0a: 3e:91:21:0d:b2:e3:5a:9d:b6:64:b7:cb:a6:03:61:2a: db:a8:eb:19:e4:30:0d:93:ac:cc:e7:ed:78:37:92:e3: bc:02:13:13:c5:ec:89:db:c5:a1:24:8d:e8:ad:2b:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 63:97:16:ba:d8:76:f7:07:e8:fd:e5:f0:bc:e5:e3:e5: 2f:99:1f:dd:f2:ce:56:b5:1f:54:76:c9:f7:f9:e7:b0: f5:75:6a:6e:4c:2f:f3:d7:78:d9:cb:aa:a7:6f:c0:d3: 89:3a:1e:9d:4a:c6:13:a9:f2:b9:37:c7:fd:15:7c:0e: 69:93:bd:8a:17:39:dc:08:d4:0d:7e:16:d3:8d:2c:68: 2c:5c:fb:40:8c:0e:fb:6c:9a:17:18:b5:8a:2b:c2:15: b5:16:91:63:55:84:32:5d:5f:94:f8:42:76:09:43:36: e9:30:de:bd:6c:ba:61:f5:8d:81:a1:e0:f9:d1:e9:46: 2c:16:39:36:2a:48:90:03:e4:c4:5d:61:20:4f:6c:9e: 04:d9:65:6c:39:8b:9a:8e:14:f5:40:f9:c5:20:6d:c5: d5:2c:b7:91:8e:93:23:74:c9:87:8c:88:de:b7:1d:8c: 83:e4:50:29:24:dd:5f:75:67:1f:e5:bd:82:21:46:db: b7:8b:63:4e:ce:3b:b7:20:1e:4f:76:40:1b:b0:81:7e: 80:ce:e9:b1:f5:5b:91:06:ca:ac:e8:1a:70:c8:50:7e: 79:52:78:c3:78:84:d6:71:f4:bf:29:20:28:f0:56:a2: 5a:2d:f6:38:a5:67:70:ee:42:92:fa:73:a6:1d:18:5c Fingerprint (SHA-256): 52:4A:D1:7F:92:FA:6A:CD:6D:F9:E7:2B:60:F3:1E:CB:4C:99:BD:22:4B:5B:E3:B6:6B:28:1F:2B:DA:F0:8D:D2 Fingerprint (SHA1): 26:08:AA:A9:03:D8:FF:F2:00:DB:5B:FD:86:81:12:B6:47:96:5B:ED Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14827: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14828: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #14829: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108182011 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14830: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #14831: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14832: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14833: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108182012 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #14834: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14835: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #14836: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14837: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 108182013 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14838: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14839: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #14840: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14841: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 108182014 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14842: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14843: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #14844: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14845: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 108182015 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14846: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14847: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #14848: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14849: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 108182016 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14850: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14851: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #14852: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14853: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 108182017 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14854: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14855: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #14856: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14857: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 108182018 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14858: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14859: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #14860: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14861: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 108182019 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #14862: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14863: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #14864: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14865: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 108182020 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14866: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14867: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #14868: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14869: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 108182021 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14870: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14871: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #14872: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14873: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 108182022 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14874: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14875: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #14876: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14877: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 108182023 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14878: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14879: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #14880: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14881: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 108182024 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14882: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14883: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #14884: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14885: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 108182025 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14886: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14887: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #14888: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14889: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 108182026 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14890: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14891: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #14892: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14893: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 108182027 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14894: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14895: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #14896: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14897: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 108182028 --extCP --extIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #14898: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14899: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #14900: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14901: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 108182029 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14902: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14903: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #14904: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14905: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 108182030 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14906: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14907: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #14908: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14909: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 108182031 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14910: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14911: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #14912: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14913: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 108182032 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14914: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14915: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #14916: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14917: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 108182033 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14918: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14919: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #14920: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14921: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 108182034 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14922: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14923: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #14924: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14925: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 108182035 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14926: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14927: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #14928: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14929: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 108182036 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14930: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14931: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #14932: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14933: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 108182037 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14934: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14935: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #14936: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14937: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 108182038 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14938: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14939: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #14940: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14941: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 108182039 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14942: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14943: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #14944: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14945: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 108182040 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14946: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14947: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14948: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182011 (0x672b9fb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Sat Jan 09 00:02:21 2016 Not After : Sat Jan 09 00:02:21 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:5e:5c:f1:31:e2:0b:04:2c:3d:0b:d7:8b:07:a8:2e: 9a:b2:63:9b:22:55:c7:e0:87:c7:96:06:e6:ce:f2:e7: c9:de:38:42:96:8d:8c:b7:44:b0:9c:e9:9a:8d:01:5b: 27:51:d2:1c:77:4d:97:c3:27:25:4c:7a:60:ff:6b:68: 70:c8:f3:6d:a5:3d:d7:fe:6a:e4:ae:df:b4:a2:ff:98: a2:d7:be:87:ae:33:1d:4a:a6:9b:76:08:2e:e1:99:37: e4:97:e1:9d:b2:ee:e5:64:91:4a:e5:65:8d:ad:12:da: cb:01:49:fb:a1:fe:93:a1:48:03:e9:e5:fd:8b:a6:95: 7d:82:8a:e6:22:08:97:2f:7e:e3:a7:d9:93:3d:b2:b7: 42:de:df:7a:11:4e:39:45:51:2c:9b:51:43:3c:24:af: 6d:d9:73:7c:4f:57:ee:b6:8a:8d:20:77:3c:41:33:26: 24:5b:e4:fe:74:60:fc:4d:bf:80:41:10:20:d6:56:b7: 21:67:52:08:67:9f:42:fa:18:1c:17:d6:4e:3b:bf:9d: d6:19:89:75:9d:87:12:e2:59:3c:8b:1f:23:81:12:f5: f3:5a:28:5d:35:8b:99:0f:af:5d:bf:c2:20:91:a5:01: e0:c6:61:b3:c1:ec:53:5e:be:bd:f5:b2:81:e4:09:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:d6:c4:92:d0:ef:06:c1:7b:07:b0:89:6b:4a:eb:01: 7a:71:9a:c8:c9:80:23:2d:81:58:cf:5d:19:eb:a3:ae: 9c:aa:41:e9:77:a0:77:60:3c:97:6f:51:72:b0:15:16: a7:d7:7b:29:0a:af:74:4a:50:2b:1f:ad:cf:5f:ca:d3: 15:c8:b7:31:88:50:b4:88:6b:1f:67:6c:f6:c5:91:0c: 0c:89:8d:d5:60:64:9a:39:6e:e7:a5:d7:72:5f:27:52: ea:a6:69:8f:17:dd:f0:4d:fe:c7:52:86:c5:74:16:35: 53:c8:ac:60:95:c3:77:d1:00:08:ba:15:b2:cb:21:28: 9d:2d:79:16:b1:ee:af:78:f4:f1:32:57:7c:02:fa:1d: 57:00:96:2e:f2:0e:36:9f:5d:09:14:a7:42:27:9e:d5: f4:91:48:48:c4:81:86:ea:eb:e8:f2:df:b1:42:45:82: f7:d0:d0:66:43:71:a4:8a:03:a1:d3:d6:49:13:8e:d9: 3b:f2:69:83:51:85:0d:73:24:eb:15:a5:53:5e:46:54: dc:0a:f7:5c:76:5d:81:f0:27:e2:d9:ec:2e:18:33:18: a3:a0:77:77:48:a6:72:e1:6a:18:ba:93:02:8c:65:f7: b1:3f:7a:b4:bc:84:0c:2d:76:24:72:58:0d:25:e2:51 Fingerprint (SHA-256): 0A:69:A2:BC:B5:BE:A9:37:4C:64:BD:85:E6:DB:A7:8B:08:73:F8:F8:20:6A:20:FF:3E:2A:76:0F:D2:70:74:E0 Fingerprint (SHA1): 2D:42:DB:6F:3A:50:67:85:5F:89:12:EF:12:18:4E:78:12:D7:5A:4E Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14949: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14950: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182011 (0x672b9fb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Sat Jan 09 00:02:21 2016 Not After : Sat Jan 09 00:02:21 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:5e:5c:f1:31:e2:0b:04:2c:3d:0b:d7:8b:07:a8:2e: 9a:b2:63:9b:22:55:c7:e0:87:c7:96:06:e6:ce:f2:e7: c9:de:38:42:96:8d:8c:b7:44:b0:9c:e9:9a:8d:01:5b: 27:51:d2:1c:77:4d:97:c3:27:25:4c:7a:60:ff:6b:68: 70:c8:f3:6d:a5:3d:d7:fe:6a:e4:ae:df:b4:a2:ff:98: a2:d7:be:87:ae:33:1d:4a:a6:9b:76:08:2e:e1:99:37: e4:97:e1:9d:b2:ee:e5:64:91:4a:e5:65:8d:ad:12:da: cb:01:49:fb:a1:fe:93:a1:48:03:e9:e5:fd:8b:a6:95: 7d:82:8a:e6:22:08:97:2f:7e:e3:a7:d9:93:3d:b2:b7: 42:de:df:7a:11:4e:39:45:51:2c:9b:51:43:3c:24:af: 6d:d9:73:7c:4f:57:ee:b6:8a:8d:20:77:3c:41:33:26: 24:5b:e4:fe:74:60:fc:4d:bf:80:41:10:20:d6:56:b7: 21:67:52:08:67:9f:42:fa:18:1c:17:d6:4e:3b:bf:9d: d6:19:89:75:9d:87:12:e2:59:3c:8b:1f:23:81:12:f5: f3:5a:28:5d:35:8b:99:0f:af:5d:bf:c2:20:91:a5:01: e0:c6:61:b3:c1:ec:53:5e:be:bd:f5:b2:81:e4:09:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:d6:c4:92:d0:ef:06:c1:7b:07:b0:89:6b:4a:eb:01: 7a:71:9a:c8:c9:80:23:2d:81:58:cf:5d:19:eb:a3:ae: 9c:aa:41:e9:77:a0:77:60:3c:97:6f:51:72:b0:15:16: a7:d7:7b:29:0a:af:74:4a:50:2b:1f:ad:cf:5f:ca:d3: 15:c8:b7:31:88:50:b4:88:6b:1f:67:6c:f6:c5:91:0c: 0c:89:8d:d5:60:64:9a:39:6e:e7:a5:d7:72:5f:27:52: ea:a6:69:8f:17:dd:f0:4d:fe:c7:52:86:c5:74:16:35: 53:c8:ac:60:95:c3:77:d1:00:08:ba:15:b2:cb:21:28: 9d:2d:79:16:b1:ee:af:78:f4:f1:32:57:7c:02:fa:1d: 57:00:96:2e:f2:0e:36:9f:5d:09:14:a7:42:27:9e:d5: f4:91:48:48:c4:81:86:ea:eb:e8:f2:df:b1:42:45:82: f7:d0:d0:66:43:71:a4:8a:03:a1:d3:d6:49:13:8e:d9: 3b:f2:69:83:51:85:0d:73:24:eb:15:a5:53:5e:46:54: dc:0a:f7:5c:76:5d:81:f0:27:e2:d9:ec:2e:18:33:18: a3:a0:77:77:48:a6:72:e1:6a:18:ba:93:02:8c:65:f7: b1:3f:7a:b4:bc:84:0c:2d:76:24:72:58:0d:25:e2:51 Fingerprint (SHA-256): 0A:69:A2:BC:B5:BE:A9:37:4C:64:BD:85:E6:DB:A7:8B:08:73:F8:F8:20:6A:20:FF:3E:2A:76:0F:D2:70:74:E0 Fingerprint (SHA1): 2D:42:DB:6F:3A:50:67:85:5F:89:12:EF:12:18:4E:78:12:D7:5A:4E Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14951: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14952: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14953: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14954: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182011 (0x672b9fb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Sat Jan 09 00:02:21 2016 Not After : Sat Jan 09 00:02:21 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:5e:5c:f1:31:e2:0b:04:2c:3d:0b:d7:8b:07:a8:2e: 9a:b2:63:9b:22:55:c7:e0:87:c7:96:06:e6:ce:f2:e7: c9:de:38:42:96:8d:8c:b7:44:b0:9c:e9:9a:8d:01:5b: 27:51:d2:1c:77:4d:97:c3:27:25:4c:7a:60:ff:6b:68: 70:c8:f3:6d:a5:3d:d7:fe:6a:e4:ae:df:b4:a2:ff:98: a2:d7:be:87:ae:33:1d:4a:a6:9b:76:08:2e:e1:99:37: e4:97:e1:9d:b2:ee:e5:64:91:4a:e5:65:8d:ad:12:da: cb:01:49:fb:a1:fe:93:a1:48:03:e9:e5:fd:8b:a6:95: 7d:82:8a:e6:22:08:97:2f:7e:e3:a7:d9:93:3d:b2:b7: 42:de:df:7a:11:4e:39:45:51:2c:9b:51:43:3c:24:af: 6d:d9:73:7c:4f:57:ee:b6:8a:8d:20:77:3c:41:33:26: 24:5b:e4:fe:74:60:fc:4d:bf:80:41:10:20:d6:56:b7: 21:67:52:08:67:9f:42:fa:18:1c:17:d6:4e:3b:bf:9d: d6:19:89:75:9d:87:12:e2:59:3c:8b:1f:23:81:12:f5: f3:5a:28:5d:35:8b:99:0f:af:5d:bf:c2:20:91:a5:01: e0:c6:61:b3:c1:ec:53:5e:be:bd:f5:b2:81:e4:09:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:d6:c4:92:d0:ef:06:c1:7b:07:b0:89:6b:4a:eb:01: 7a:71:9a:c8:c9:80:23:2d:81:58:cf:5d:19:eb:a3:ae: 9c:aa:41:e9:77:a0:77:60:3c:97:6f:51:72:b0:15:16: a7:d7:7b:29:0a:af:74:4a:50:2b:1f:ad:cf:5f:ca:d3: 15:c8:b7:31:88:50:b4:88:6b:1f:67:6c:f6:c5:91:0c: 0c:89:8d:d5:60:64:9a:39:6e:e7:a5:d7:72:5f:27:52: ea:a6:69:8f:17:dd:f0:4d:fe:c7:52:86:c5:74:16:35: 53:c8:ac:60:95:c3:77:d1:00:08:ba:15:b2:cb:21:28: 9d:2d:79:16:b1:ee:af:78:f4:f1:32:57:7c:02:fa:1d: 57:00:96:2e:f2:0e:36:9f:5d:09:14:a7:42:27:9e:d5: f4:91:48:48:c4:81:86:ea:eb:e8:f2:df:b1:42:45:82: f7:d0:d0:66:43:71:a4:8a:03:a1:d3:d6:49:13:8e:d9: 3b:f2:69:83:51:85:0d:73:24:eb:15:a5:53:5e:46:54: dc:0a:f7:5c:76:5d:81:f0:27:e2:d9:ec:2e:18:33:18: a3:a0:77:77:48:a6:72:e1:6a:18:ba:93:02:8c:65:f7: b1:3f:7a:b4:bc:84:0c:2d:76:24:72:58:0d:25:e2:51 Fingerprint (SHA-256): 0A:69:A2:BC:B5:BE:A9:37:4C:64:BD:85:E6:DB:A7:8B:08:73:F8:F8:20:6A:20:FF:3E:2A:76:0F:D2:70:74:E0 Fingerprint (SHA1): 2D:42:DB:6F:3A:50:67:85:5F:89:12:EF:12:18:4E:78:12:D7:5A:4E Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14955: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14956: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14957: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14958: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182011 (0x672b9fb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Sat Jan 09 00:02:21 2016 Not After : Sat Jan 09 00:02:21 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:5e:5c:f1:31:e2:0b:04:2c:3d:0b:d7:8b:07:a8:2e: 9a:b2:63:9b:22:55:c7:e0:87:c7:96:06:e6:ce:f2:e7: c9:de:38:42:96:8d:8c:b7:44:b0:9c:e9:9a:8d:01:5b: 27:51:d2:1c:77:4d:97:c3:27:25:4c:7a:60:ff:6b:68: 70:c8:f3:6d:a5:3d:d7:fe:6a:e4:ae:df:b4:a2:ff:98: a2:d7:be:87:ae:33:1d:4a:a6:9b:76:08:2e:e1:99:37: e4:97:e1:9d:b2:ee:e5:64:91:4a:e5:65:8d:ad:12:da: cb:01:49:fb:a1:fe:93:a1:48:03:e9:e5:fd:8b:a6:95: 7d:82:8a:e6:22:08:97:2f:7e:e3:a7:d9:93:3d:b2:b7: 42:de:df:7a:11:4e:39:45:51:2c:9b:51:43:3c:24:af: 6d:d9:73:7c:4f:57:ee:b6:8a:8d:20:77:3c:41:33:26: 24:5b:e4:fe:74:60:fc:4d:bf:80:41:10:20:d6:56:b7: 21:67:52:08:67:9f:42:fa:18:1c:17:d6:4e:3b:bf:9d: d6:19:89:75:9d:87:12:e2:59:3c:8b:1f:23:81:12:f5: f3:5a:28:5d:35:8b:99:0f:af:5d:bf:c2:20:91:a5:01: e0:c6:61:b3:c1:ec:53:5e:be:bd:f5:b2:81:e4:09:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:d6:c4:92:d0:ef:06:c1:7b:07:b0:89:6b:4a:eb:01: 7a:71:9a:c8:c9:80:23:2d:81:58:cf:5d:19:eb:a3:ae: 9c:aa:41:e9:77:a0:77:60:3c:97:6f:51:72:b0:15:16: a7:d7:7b:29:0a:af:74:4a:50:2b:1f:ad:cf:5f:ca:d3: 15:c8:b7:31:88:50:b4:88:6b:1f:67:6c:f6:c5:91:0c: 0c:89:8d:d5:60:64:9a:39:6e:e7:a5:d7:72:5f:27:52: ea:a6:69:8f:17:dd:f0:4d:fe:c7:52:86:c5:74:16:35: 53:c8:ac:60:95:c3:77:d1:00:08:ba:15:b2:cb:21:28: 9d:2d:79:16:b1:ee:af:78:f4:f1:32:57:7c:02:fa:1d: 57:00:96:2e:f2:0e:36:9f:5d:09:14:a7:42:27:9e:d5: f4:91:48:48:c4:81:86:ea:eb:e8:f2:df:b1:42:45:82: f7:d0:d0:66:43:71:a4:8a:03:a1:d3:d6:49:13:8e:d9: 3b:f2:69:83:51:85:0d:73:24:eb:15:a5:53:5e:46:54: dc:0a:f7:5c:76:5d:81:f0:27:e2:d9:ec:2e:18:33:18: a3:a0:77:77:48:a6:72:e1:6a:18:ba:93:02:8c:65:f7: b1:3f:7a:b4:bc:84:0c:2d:76:24:72:58:0d:25:e2:51 Fingerprint (SHA-256): 0A:69:A2:BC:B5:BE:A9:37:4C:64:BD:85:E6:DB:A7:8B:08:73:F8:F8:20:6A:20:FF:3E:2A:76:0F:D2:70:74:E0 Fingerprint (SHA1): 2D:42:DB:6F:3A:50:67:85:5F:89:12:EF:12:18:4E:78:12:D7:5A:4E Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14959: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182011 (0x672b9fb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Sat Jan 09 00:02:21 2016 Not After : Sat Jan 09 00:02:21 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:5e:5c:f1:31:e2:0b:04:2c:3d:0b:d7:8b:07:a8:2e: 9a:b2:63:9b:22:55:c7:e0:87:c7:96:06:e6:ce:f2:e7: c9:de:38:42:96:8d:8c:b7:44:b0:9c:e9:9a:8d:01:5b: 27:51:d2:1c:77:4d:97:c3:27:25:4c:7a:60:ff:6b:68: 70:c8:f3:6d:a5:3d:d7:fe:6a:e4:ae:df:b4:a2:ff:98: a2:d7:be:87:ae:33:1d:4a:a6:9b:76:08:2e:e1:99:37: e4:97:e1:9d:b2:ee:e5:64:91:4a:e5:65:8d:ad:12:da: cb:01:49:fb:a1:fe:93:a1:48:03:e9:e5:fd:8b:a6:95: 7d:82:8a:e6:22:08:97:2f:7e:e3:a7:d9:93:3d:b2:b7: 42:de:df:7a:11:4e:39:45:51:2c:9b:51:43:3c:24:af: 6d:d9:73:7c:4f:57:ee:b6:8a:8d:20:77:3c:41:33:26: 24:5b:e4:fe:74:60:fc:4d:bf:80:41:10:20:d6:56:b7: 21:67:52:08:67:9f:42:fa:18:1c:17:d6:4e:3b:bf:9d: d6:19:89:75:9d:87:12:e2:59:3c:8b:1f:23:81:12:f5: f3:5a:28:5d:35:8b:99:0f:af:5d:bf:c2:20:91:a5:01: e0:c6:61:b3:c1:ec:53:5e:be:bd:f5:b2:81:e4:09:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:d6:c4:92:d0:ef:06:c1:7b:07:b0:89:6b:4a:eb:01: 7a:71:9a:c8:c9:80:23:2d:81:58:cf:5d:19:eb:a3:ae: 9c:aa:41:e9:77:a0:77:60:3c:97:6f:51:72:b0:15:16: a7:d7:7b:29:0a:af:74:4a:50:2b:1f:ad:cf:5f:ca:d3: 15:c8:b7:31:88:50:b4:88:6b:1f:67:6c:f6:c5:91:0c: 0c:89:8d:d5:60:64:9a:39:6e:e7:a5:d7:72:5f:27:52: ea:a6:69:8f:17:dd:f0:4d:fe:c7:52:86:c5:74:16:35: 53:c8:ac:60:95:c3:77:d1:00:08:ba:15:b2:cb:21:28: 9d:2d:79:16:b1:ee:af:78:f4:f1:32:57:7c:02:fa:1d: 57:00:96:2e:f2:0e:36:9f:5d:09:14:a7:42:27:9e:d5: f4:91:48:48:c4:81:86:ea:eb:e8:f2:df:b1:42:45:82: f7:d0:d0:66:43:71:a4:8a:03:a1:d3:d6:49:13:8e:d9: 3b:f2:69:83:51:85:0d:73:24:eb:15:a5:53:5e:46:54: dc:0a:f7:5c:76:5d:81:f0:27:e2:d9:ec:2e:18:33:18: a3:a0:77:77:48:a6:72:e1:6a:18:ba:93:02:8c:65:f7: b1:3f:7a:b4:bc:84:0c:2d:76:24:72:58:0d:25:e2:51 Fingerprint (SHA-256): 0A:69:A2:BC:B5:BE:A9:37:4C:64:BD:85:E6:DB:A7:8B:08:73:F8:F8:20:6A:20:FF:3E:2A:76:0F:D2:70:74:E0 Fingerprint (SHA1): 2D:42:DB:6F:3A:50:67:85:5F:89:12:EF:12:18:4E:78:12:D7:5A:4E Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14960: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14961: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182011 (0x672b9fb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Sat Jan 09 00:02:21 2016 Not After : Sat Jan 09 00:02:21 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:5e:5c:f1:31:e2:0b:04:2c:3d:0b:d7:8b:07:a8:2e: 9a:b2:63:9b:22:55:c7:e0:87:c7:96:06:e6:ce:f2:e7: c9:de:38:42:96:8d:8c:b7:44:b0:9c:e9:9a:8d:01:5b: 27:51:d2:1c:77:4d:97:c3:27:25:4c:7a:60:ff:6b:68: 70:c8:f3:6d:a5:3d:d7:fe:6a:e4:ae:df:b4:a2:ff:98: a2:d7:be:87:ae:33:1d:4a:a6:9b:76:08:2e:e1:99:37: e4:97:e1:9d:b2:ee:e5:64:91:4a:e5:65:8d:ad:12:da: cb:01:49:fb:a1:fe:93:a1:48:03:e9:e5:fd:8b:a6:95: 7d:82:8a:e6:22:08:97:2f:7e:e3:a7:d9:93:3d:b2:b7: 42:de:df:7a:11:4e:39:45:51:2c:9b:51:43:3c:24:af: 6d:d9:73:7c:4f:57:ee:b6:8a:8d:20:77:3c:41:33:26: 24:5b:e4:fe:74:60:fc:4d:bf:80:41:10:20:d6:56:b7: 21:67:52:08:67:9f:42:fa:18:1c:17:d6:4e:3b:bf:9d: d6:19:89:75:9d:87:12:e2:59:3c:8b:1f:23:81:12:f5: f3:5a:28:5d:35:8b:99:0f:af:5d:bf:c2:20:91:a5:01: e0:c6:61:b3:c1:ec:53:5e:be:bd:f5:b2:81:e4:09:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:d6:c4:92:d0:ef:06:c1:7b:07:b0:89:6b:4a:eb:01: 7a:71:9a:c8:c9:80:23:2d:81:58:cf:5d:19:eb:a3:ae: 9c:aa:41:e9:77:a0:77:60:3c:97:6f:51:72:b0:15:16: a7:d7:7b:29:0a:af:74:4a:50:2b:1f:ad:cf:5f:ca:d3: 15:c8:b7:31:88:50:b4:88:6b:1f:67:6c:f6:c5:91:0c: 0c:89:8d:d5:60:64:9a:39:6e:e7:a5:d7:72:5f:27:52: ea:a6:69:8f:17:dd:f0:4d:fe:c7:52:86:c5:74:16:35: 53:c8:ac:60:95:c3:77:d1:00:08:ba:15:b2:cb:21:28: 9d:2d:79:16:b1:ee:af:78:f4:f1:32:57:7c:02:fa:1d: 57:00:96:2e:f2:0e:36:9f:5d:09:14:a7:42:27:9e:d5: f4:91:48:48:c4:81:86:ea:eb:e8:f2:df:b1:42:45:82: f7:d0:d0:66:43:71:a4:8a:03:a1:d3:d6:49:13:8e:d9: 3b:f2:69:83:51:85:0d:73:24:eb:15:a5:53:5e:46:54: dc:0a:f7:5c:76:5d:81:f0:27:e2:d9:ec:2e:18:33:18: a3:a0:77:77:48:a6:72:e1:6a:18:ba:93:02:8c:65:f7: b1:3f:7a:b4:bc:84:0c:2d:76:24:72:58:0d:25:e2:51 Fingerprint (SHA-256): 0A:69:A2:BC:B5:BE:A9:37:4C:64:BD:85:E6:DB:A7:8B:08:73:F8:F8:20:6A:20:FF:3E:2A:76:0F:D2:70:74:E0 Fingerprint (SHA1): 2D:42:DB:6F:3A:50:67:85:5F:89:12:EF:12:18:4E:78:12:D7:5A:4E Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14962: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14963: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14964: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14965: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182011 (0x672b9fb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Sat Jan 09 00:02:21 2016 Not After : Sat Jan 09 00:02:21 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:5e:5c:f1:31:e2:0b:04:2c:3d:0b:d7:8b:07:a8:2e: 9a:b2:63:9b:22:55:c7:e0:87:c7:96:06:e6:ce:f2:e7: c9:de:38:42:96:8d:8c:b7:44:b0:9c:e9:9a:8d:01:5b: 27:51:d2:1c:77:4d:97:c3:27:25:4c:7a:60:ff:6b:68: 70:c8:f3:6d:a5:3d:d7:fe:6a:e4:ae:df:b4:a2:ff:98: a2:d7:be:87:ae:33:1d:4a:a6:9b:76:08:2e:e1:99:37: e4:97:e1:9d:b2:ee:e5:64:91:4a:e5:65:8d:ad:12:da: cb:01:49:fb:a1:fe:93:a1:48:03:e9:e5:fd:8b:a6:95: 7d:82:8a:e6:22:08:97:2f:7e:e3:a7:d9:93:3d:b2:b7: 42:de:df:7a:11:4e:39:45:51:2c:9b:51:43:3c:24:af: 6d:d9:73:7c:4f:57:ee:b6:8a:8d:20:77:3c:41:33:26: 24:5b:e4:fe:74:60:fc:4d:bf:80:41:10:20:d6:56:b7: 21:67:52:08:67:9f:42:fa:18:1c:17:d6:4e:3b:bf:9d: d6:19:89:75:9d:87:12:e2:59:3c:8b:1f:23:81:12:f5: f3:5a:28:5d:35:8b:99:0f:af:5d:bf:c2:20:91:a5:01: e0:c6:61:b3:c1:ec:53:5e:be:bd:f5:b2:81:e4:09:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:d6:c4:92:d0:ef:06:c1:7b:07:b0:89:6b:4a:eb:01: 7a:71:9a:c8:c9:80:23:2d:81:58:cf:5d:19:eb:a3:ae: 9c:aa:41:e9:77:a0:77:60:3c:97:6f:51:72:b0:15:16: a7:d7:7b:29:0a:af:74:4a:50:2b:1f:ad:cf:5f:ca:d3: 15:c8:b7:31:88:50:b4:88:6b:1f:67:6c:f6:c5:91:0c: 0c:89:8d:d5:60:64:9a:39:6e:e7:a5:d7:72:5f:27:52: ea:a6:69:8f:17:dd:f0:4d:fe:c7:52:86:c5:74:16:35: 53:c8:ac:60:95:c3:77:d1:00:08:ba:15:b2:cb:21:28: 9d:2d:79:16:b1:ee:af:78:f4:f1:32:57:7c:02:fa:1d: 57:00:96:2e:f2:0e:36:9f:5d:09:14:a7:42:27:9e:d5: f4:91:48:48:c4:81:86:ea:eb:e8:f2:df:b1:42:45:82: f7:d0:d0:66:43:71:a4:8a:03:a1:d3:d6:49:13:8e:d9: 3b:f2:69:83:51:85:0d:73:24:eb:15:a5:53:5e:46:54: dc:0a:f7:5c:76:5d:81:f0:27:e2:d9:ec:2e:18:33:18: a3:a0:77:77:48:a6:72:e1:6a:18:ba:93:02:8c:65:f7: b1:3f:7a:b4:bc:84:0c:2d:76:24:72:58:0d:25:e2:51 Fingerprint (SHA-256): 0A:69:A2:BC:B5:BE:A9:37:4C:64:BD:85:E6:DB:A7:8B:08:73:F8:F8:20:6A:20:FF:3E:2A:76:0F:D2:70:74:E0 Fingerprint (SHA1): 2D:42:DB:6F:3A:50:67:85:5F:89:12:EF:12:18:4E:78:12:D7:5A:4E Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14966: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182011 (0x672b9fb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Sat Jan 09 00:02:21 2016 Not After : Sat Jan 09 00:02:21 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:5e:5c:f1:31:e2:0b:04:2c:3d:0b:d7:8b:07:a8:2e: 9a:b2:63:9b:22:55:c7:e0:87:c7:96:06:e6:ce:f2:e7: c9:de:38:42:96:8d:8c:b7:44:b0:9c:e9:9a:8d:01:5b: 27:51:d2:1c:77:4d:97:c3:27:25:4c:7a:60:ff:6b:68: 70:c8:f3:6d:a5:3d:d7:fe:6a:e4:ae:df:b4:a2:ff:98: a2:d7:be:87:ae:33:1d:4a:a6:9b:76:08:2e:e1:99:37: e4:97:e1:9d:b2:ee:e5:64:91:4a:e5:65:8d:ad:12:da: cb:01:49:fb:a1:fe:93:a1:48:03:e9:e5:fd:8b:a6:95: 7d:82:8a:e6:22:08:97:2f:7e:e3:a7:d9:93:3d:b2:b7: 42:de:df:7a:11:4e:39:45:51:2c:9b:51:43:3c:24:af: 6d:d9:73:7c:4f:57:ee:b6:8a:8d:20:77:3c:41:33:26: 24:5b:e4:fe:74:60:fc:4d:bf:80:41:10:20:d6:56:b7: 21:67:52:08:67:9f:42:fa:18:1c:17:d6:4e:3b:bf:9d: d6:19:89:75:9d:87:12:e2:59:3c:8b:1f:23:81:12:f5: f3:5a:28:5d:35:8b:99:0f:af:5d:bf:c2:20:91:a5:01: e0:c6:61:b3:c1:ec:53:5e:be:bd:f5:b2:81:e4:09:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:d6:c4:92:d0:ef:06:c1:7b:07:b0:89:6b:4a:eb:01: 7a:71:9a:c8:c9:80:23:2d:81:58:cf:5d:19:eb:a3:ae: 9c:aa:41:e9:77:a0:77:60:3c:97:6f:51:72:b0:15:16: a7:d7:7b:29:0a:af:74:4a:50:2b:1f:ad:cf:5f:ca:d3: 15:c8:b7:31:88:50:b4:88:6b:1f:67:6c:f6:c5:91:0c: 0c:89:8d:d5:60:64:9a:39:6e:e7:a5:d7:72:5f:27:52: ea:a6:69:8f:17:dd:f0:4d:fe:c7:52:86:c5:74:16:35: 53:c8:ac:60:95:c3:77:d1:00:08:ba:15:b2:cb:21:28: 9d:2d:79:16:b1:ee:af:78:f4:f1:32:57:7c:02:fa:1d: 57:00:96:2e:f2:0e:36:9f:5d:09:14:a7:42:27:9e:d5: f4:91:48:48:c4:81:86:ea:eb:e8:f2:df:b1:42:45:82: f7:d0:d0:66:43:71:a4:8a:03:a1:d3:d6:49:13:8e:d9: 3b:f2:69:83:51:85:0d:73:24:eb:15:a5:53:5e:46:54: dc:0a:f7:5c:76:5d:81:f0:27:e2:d9:ec:2e:18:33:18: a3:a0:77:77:48:a6:72:e1:6a:18:ba:93:02:8c:65:f7: b1:3f:7a:b4:bc:84:0c:2d:76:24:72:58:0d:25:e2:51 Fingerprint (SHA-256): 0A:69:A2:BC:B5:BE:A9:37:4C:64:BD:85:E6:DB:A7:8B:08:73:F8:F8:20:6A:20:FF:3E:2A:76:0F:D2:70:74:E0 Fingerprint (SHA1): 2D:42:DB:6F:3A:50:67:85:5F:89:12:EF:12:18:4E:78:12:D7:5A:4E Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #14967: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182011 (0x672b9fb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Sat Jan 09 00:02:21 2016 Not After : Sat Jan 09 00:02:21 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:5e:5c:f1:31:e2:0b:04:2c:3d:0b:d7:8b:07:a8:2e: 9a:b2:63:9b:22:55:c7:e0:87:c7:96:06:e6:ce:f2:e7: c9:de:38:42:96:8d:8c:b7:44:b0:9c:e9:9a:8d:01:5b: 27:51:d2:1c:77:4d:97:c3:27:25:4c:7a:60:ff:6b:68: 70:c8:f3:6d:a5:3d:d7:fe:6a:e4:ae:df:b4:a2:ff:98: a2:d7:be:87:ae:33:1d:4a:a6:9b:76:08:2e:e1:99:37: e4:97:e1:9d:b2:ee:e5:64:91:4a:e5:65:8d:ad:12:da: cb:01:49:fb:a1:fe:93:a1:48:03:e9:e5:fd:8b:a6:95: 7d:82:8a:e6:22:08:97:2f:7e:e3:a7:d9:93:3d:b2:b7: 42:de:df:7a:11:4e:39:45:51:2c:9b:51:43:3c:24:af: 6d:d9:73:7c:4f:57:ee:b6:8a:8d:20:77:3c:41:33:26: 24:5b:e4:fe:74:60:fc:4d:bf:80:41:10:20:d6:56:b7: 21:67:52:08:67:9f:42:fa:18:1c:17:d6:4e:3b:bf:9d: d6:19:89:75:9d:87:12:e2:59:3c:8b:1f:23:81:12:f5: f3:5a:28:5d:35:8b:99:0f:af:5d:bf:c2:20:91:a5:01: e0:c6:61:b3:c1:ec:53:5e:be:bd:f5:b2:81:e4:09:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:d6:c4:92:d0:ef:06:c1:7b:07:b0:89:6b:4a:eb:01: 7a:71:9a:c8:c9:80:23:2d:81:58:cf:5d:19:eb:a3:ae: 9c:aa:41:e9:77:a0:77:60:3c:97:6f:51:72:b0:15:16: a7:d7:7b:29:0a:af:74:4a:50:2b:1f:ad:cf:5f:ca:d3: 15:c8:b7:31:88:50:b4:88:6b:1f:67:6c:f6:c5:91:0c: 0c:89:8d:d5:60:64:9a:39:6e:e7:a5:d7:72:5f:27:52: ea:a6:69:8f:17:dd:f0:4d:fe:c7:52:86:c5:74:16:35: 53:c8:ac:60:95:c3:77:d1:00:08:ba:15:b2:cb:21:28: 9d:2d:79:16:b1:ee:af:78:f4:f1:32:57:7c:02:fa:1d: 57:00:96:2e:f2:0e:36:9f:5d:09:14:a7:42:27:9e:d5: f4:91:48:48:c4:81:86:ea:eb:e8:f2:df:b1:42:45:82: f7:d0:d0:66:43:71:a4:8a:03:a1:d3:d6:49:13:8e:d9: 3b:f2:69:83:51:85:0d:73:24:eb:15:a5:53:5e:46:54: dc:0a:f7:5c:76:5d:81:f0:27:e2:d9:ec:2e:18:33:18: a3:a0:77:77:48:a6:72:e1:6a:18:ba:93:02:8c:65:f7: b1:3f:7a:b4:bc:84:0c:2d:76:24:72:58:0d:25:e2:51 Fingerprint (SHA-256): 0A:69:A2:BC:B5:BE:A9:37:4C:64:BD:85:E6:DB:A7:8B:08:73:F8:F8:20:6A:20:FF:3E:2A:76:0F:D2:70:74:E0 Fingerprint (SHA1): 2D:42:DB:6F:3A:50:67:85:5F:89:12:EF:12:18:4E:78:12:D7:5A:4E Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #14968: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182011 (0x672b9fb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Sat Jan 09 00:02:21 2016 Not After : Sat Jan 09 00:02:21 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:5e:5c:f1:31:e2:0b:04:2c:3d:0b:d7:8b:07:a8:2e: 9a:b2:63:9b:22:55:c7:e0:87:c7:96:06:e6:ce:f2:e7: c9:de:38:42:96:8d:8c:b7:44:b0:9c:e9:9a:8d:01:5b: 27:51:d2:1c:77:4d:97:c3:27:25:4c:7a:60:ff:6b:68: 70:c8:f3:6d:a5:3d:d7:fe:6a:e4:ae:df:b4:a2:ff:98: a2:d7:be:87:ae:33:1d:4a:a6:9b:76:08:2e:e1:99:37: e4:97:e1:9d:b2:ee:e5:64:91:4a:e5:65:8d:ad:12:da: cb:01:49:fb:a1:fe:93:a1:48:03:e9:e5:fd:8b:a6:95: 7d:82:8a:e6:22:08:97:2f:7e:e3:a7:d9:93:3d:b2:b7: 42:de:df:7a:11:4e:39:45:51:2c:9b:51:43:3c:24:af: 6d:d9:73:7c:4f:57:ee:b6:8a:8d:20:77:3c:41:33:26: 24:5b:e4:fe:74:60:fc:4d:bf:80:41:10:20:d6:56:b7: 21:67:52:08:67:9f:42:fa:18:1c:17:d6:4e:3b:bf:9d: d6:19:89:75:9d:87:12:e2:59:3c:8b:1f:23:81:12:f5: f3:5a:28:5d:35:8b:99:0f:af:5d:bf:c2:20:91:a5:01: e0:c6:61:b3:c1:ec:53:5e:be:bd:f5:b2:81:e4:09:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:d6:c4:92:d0:ef:06:c1:7b:07:b0:89:6b:4a:eb:01: 7a:71:9a:c8:c9:80:23:2d:81:58:cf:5d:19:eb:a3:ae: 9c:aa:41:e9:77:a0:77:60:3c:97:6f:51:72:b0:15:16: a7:d7:7b:29:0a:af:74:4a:50:2b:1f:ad:cf:5f:ca:d3: 15:c8:b7:31:88:50:b4:88:6b:1f:67:6c:f6:c5:91:0c: 0c:89:8d:d5:60:64:9a:39:6e:e7:a5:d7:72:5f:27:52: ea:a6:69:8f:17:dd:f0:4d:fe:c7:52:86:c5:74:16:35: 53:c8:ac:60:95:c3:77:d1:00:08:ba:15:b2:cb:21:28: 9d:2d:79:16:b1:ee:af:78:f4:f1:32:57:7c:02:fa:1d: 57:00:96:2e:f2:0e:36:9f:5d:09:14:a7:42:27:9e:d5: f4:91:48:48:c4:81:86:ea:eb:e8:f2:df:b1:42:45:82: f7:d0:d0:66:43:71:a4:8a:03:a1:d3:d6:49:13:8e:d9: 3b:f2:69:83:51:85:0d:73:24:eb:15:a5:53:5e:46:54: dc:0a:f7:5c:76:5d:81:f0:27:e2:d9:ec:2e:18:33:18: a3:a0:77:77:48:a6:72:e1:6a:18:ba:93:02:8c:65:f7: b1:3f:7a:b4:bc:84:0c:2d:76:24:72:58:0d:25:e2:51 Fingerprint (SHA-256): 0A:69:A2:BC:B5:BE:A9:37:4C:64:BD:85:E6:DB:A7:8B:08:73:F8:F8:20:6A:20:FF:3E:2A:76:0F:D2:70:74:E0 Fingerprint (SHA1): 2D:42:DB:6F:3A:50:67:85:5F:89:12:EF:12:18:4E:78:12:D7:5A:4E Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #14969: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182011 (0x672b9fb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Sat Jan 09 00:02:21 2016 Not After : Sat Jan 09 00:02:21 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:5e:5c:f1:31:e2:0b:04:2c:3d:0b:d7:8b:07:a8:2e: 9a:b2:63:9b:22:55:c7:e0:87:c7:96:06:e6:ce:f2:e7: c9:de:38:42:96:8d:8c:b7:44:b0:9c:e9:9a:8d:01:5b: 27:51:d2:1c:77:4d:97:c3:27:25:4c:7a:60:ff:6b:68: 70:c8:f3:6d:a5:3d:d7:fe:6a:e4:ae:df:b4:a2:ff:98: a2:d7:be:87:ae:33:1d:4a:a6:9b:76:08:2e:e1:99:37: e4:97:e1:9d:b2:ee:e5:64:91:4a:e5:65:8d:ad:12:da: cb:01:49:fb:a1:fe:93:a1:48:03:e9:e5:fd:8b:a6:95: 7d:82:8a:e6:22:08:97:2f:7e:e3:a7:d9:93:3d:b2:b7: 42:de:df:7a:11:4e:39:45:51:2c:9b:51:43:3c:24:af: 6d:d9:73:7c:4f:57:ee:b6:8a:8d:20:77:3c:41:33:26: 24:5b:e4:fe:74:60:fc:4d:bf:80:41:10:20:d6:56:b7: 21:67:52:08:67:9f:42:fa:18:1c:17:d6:4e:3b:bf:9d: d6:19:89:75:9d:87:12:e2:59:3c:8b:1f:23:81:12:f5: f3:5a:28:5d:35:8b:99:0f:af:5d:bf:c2:20:91:a5:01: e0:c6:61:b3:c1:ec:53:5e:be:bd:f5:b2:81:e4:09:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:d6:c4:92:d0:ef:06:c1:7b:07:b0:89:6b:4a:eb:01: 7a:71:9a:c8:c9:80:23:2d:81:58:cf:5d:19:eb:a3:ae: 9c:aa:41:e9:77:a0:77:60:3c:97:6f:51:72:b0:15:16: a7:d7:7b:29:0a:af:74:4a:50:2b:1f:ad:cf:5f:ca:d3: 15:c8:b7:31:88:50:b4:88:6b:1f:67:6c:f6:c5:91:0c: 0c:89:8d:d5:60:64:9a:39:6e:e7:a5:d7:72:5f:27:52: ea:a6:69:8f:17:dd:f0:4d:fe:c7:52:86:c5:74:16:35: 53:c8:ac:60:95:c3:77:d1:00:08:ba:15:b2:cb:21:28: 9d:2d:79:16:b1:ee:af:78:f4:f1:32:57:7c:02:fa:1d: 57:00:96:2e:f2:0e:36:9f:5d:09:14:a7:42:27:9e:d5: f4:91:48:48:c4:81:86:ea:eb:e8:f2:df:b1:42:45:82: f7:d0:d0:66:43:71:a4:8a:03:a1:d3:d6:49:13:8e:d9: 3b:f2:69:83:51:85:0d:73:24:eb:15:a5:53:5e:46:54: dc:0a:f7:5c:76:5d:81:f0:27:e2:d9:ec:2e:18:33:18: a3:a0:77:77:48:a6:72:e1:6a:18:ba:93:02:8c:65:f7: b1:3f:7a:b4:bc:84:0c:2d:76:24:72:58:0d:25:e2:51 Fingerprint (SHA-256): 0A:69:A2:BC:B5:BE:A9:37:4C:64:BD:85:E6:DB:A7:8B:08:73:F8:F8:20:6A:20:FF:3E:2A:76:0F:D2:70:74:E0 Fingerprint (SHA1): 2D:42:DB:6F:3A:50:67:85:5F:89:12:EF:12:18:4E:78:12:D7:5A:4E Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #14970: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182011 (0x672b9fb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Sat Jan 09 00:02:21 2016 Not After : Sat Jan 09 00:02:21 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:5e:5c:f1:31:e2:0b:04:2c:3d:0b:d7:8b:07:a8:2e: 9a:b2:63:9b:22:55:c7:e0:87:c7:96:06:e6:ce:f2:e7: c9:de:38:42:96:8d:8c:b7:44:b0:9c:e9:9a:8d:01:5b: 27:51:d2:1c:77:4d:97:c3:27:25:4c:7a:60:ff:6b:68: 70:c8:f3:6d:a5:3d:d7:fe:6a:e4:ae:df:b4:a2:ff:98: a2:d7:be:87:ae:33:1d:4a:a6:9b:76:08:2e:e1:99:37: e4:97:e1:9d:b2:ee:e5:64:91:4a:e5:65:8d:ad:12:da: cb:01:49:fb:a1:fe:93:a1:48:03:e9:e5:fd:8b:a6:95: 7d:82:8a:e6:22:08:97:2f:7e:e3:a7:d9:93:3d:b2:b7: 42:de:df:7a:11:4e:39:45:51:2c:9b:51:43:3c:24:af: 6d:d9:73:7c:4f:57:ee:b6:8a:8d:20:77:3c:41:33:26: 24:5b:e4:fe:74:60:fc:4d:bf:80:41:10:20:d6:56:b7: 21:67:52:08:67:9f:42:fa:18:1c:17:d6:4e:3b:bf:9d: d6:19:89:75:9d:87:12:e2:59:3c:8b:1f:23:81:12:f5: f3:5a:28:5d:35:8b:99:0f:af:5d:bf:c2:20:91:a5:01: e0:c6:61:b3:c1:ec:53:5e:be:bd:f5:b2:81:e4:09:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:d6:c4:92:d0:ef:06:c1:7b:07:b0:89:6b:4a:eb:01: 7a:71:9a:c8:c9:80:23:2d:81:58:cf:5d:19:eb:a3:ae: 9c:aa:41:e9:77:a0:77:60:3c:97:6f:51:72:b0:15:16: a7:d7:7b:29:0a:af:74:4a:50:2b:1f:ad:cf:5f:ca:d3: 15:c8:b7:31:88:50:b4:88:6b:1f:67:6c:f6:c5:91:0c: 0c:89:8d:d5:60:64:9a:39:6e:e7:a5:d7:72:5f:27:52: ea:a6:69:8f:17:dd:f0:4d:fe:c7:52:86:c5:74:16:35: 53:c8:ac:60:95:c3:77:d1:00:08:ba:15:b2:cb:21:28: 9d:2d:79:16:b1:ee:af:78:f4:f1:32:57:7c:02:fa:1d: 57:00:96:2e:f2:0e:36:9f:5d:09:14:a7:42:27:9e:d5: f4:91:48:48:c4:81:86:ea:eb:e8:f2:df:b1:42:45:82: f7:d0:d0:66:43:71:a4:8a:03:a1:d3:d6:49:13:8e:d9: 3b:f2:69:83:51:85:0d:73:24:eb:15:a5:53:5e:46:54: dc:0a:f7:5c:76:5d:81:f0:27:e2:d9:ec:2e:18:33:18: a3:a0:77:77:48:a6:72:e1:6a:18:ba:93:02:8c:65:f7: b1:3f:7a:b4:bc:84:0c:2d:76:24:72:58:0d:25:e2:51 Fingerprint (SHA-256): 0A:69:A2:BC:B5:BE:A9:37:4C:64:BD:85:E6:DB:A7:8B:08:73:F8:F8:20:6A:20:FF:3E:2A:76:0F:D2:70:74:E0 Fingerprint (SHA1): 2D:42:DB:6F:3A:50:67:85:5F:89:12:EF:12:18:4E:78:12:D7:5A:4E Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #14971: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14972: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #14973: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108182041 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14974: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #14975: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #14976: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14977: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 108182042 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14978: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14979: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #14980: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14981: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 108182043 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14982: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14983: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #14984: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14985: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 108182044 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14986: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14987: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #14988: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14989: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 108182045 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14990: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14991: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #14992: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14993: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 108182046 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14994: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14995: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #14996: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14997: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 108182047 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14998: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14999: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #15000: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182041 (0x672ba19) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Sat Jan 09 00:09:07 2016 Not After : Sat Jan 09 00:09:07 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:3c:24:07:79:37:ed:87:41:d6:90:52:07:ca:5b:7e: a2:ab:a3:37:ea:b8:3a:bf:4d:b1:1a:41:37:16:de:d6: 51:12:2f:08:f3:30:7d:28:0b:12:76:42:e6:75:7e:50: 27:12:c9:cd:bc:4d:f0:7d:42:28:86:bb:08:79:21:a1: e3:d4:3d:2c:77:3b:8d:fd:7d:90:ef:70:2a:cc:74:9f: 6f:f3:2b:5f:e8:94:07:e7:0f:76:4d:bb:f8:89:78:52: 28:49:fb:2d:d9:15:f6:fe:8c:e8:19:fc:e9:f4:ed:59: 75:bf:6a:80:dc:48:a6:18:ee:87:50:1a:59:8b:d6:b8: e9:26:ed:77:56:2a:62:db:91:2c:ba:9d:d9:6c:aa:93: bc:47:46:1e:11:b5:09:ef:99:a5:1c:2b:28:54:ca:83: b4:59:b3:4f:3e:bd:a7:ed:8d:97:4a:c1:8c:f4:86:06: c2:f2:8a:37:10:e9:df:06:4b:65:64:82:5d:4f:05:3f: 59:65:38:c0:62:cf:8d:17:30:c4:53:35:66:b4:71:cd: 65:4d:a7:31:f0:9b:7a:ac:46:43:75:8b:b8:c0:db:4c: 56:74:80:ea:4f:10:4f:ea:d9:3f:26:4e:a0:a8:00:bd: 01:4a:30:76:d5:80:88:fc:e1:16:a5:a9:46:26:2f:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 74:db:e5:62:73:93:c6:f0:c5:47:74:b4:0f:ae:e4:63: c2:e9:16:c0:41:7e:62:24:0c:3c:01:ec:3a:3f:1c:c7: b8:8d:4b:a5:b4:60:8b:30:2e:78:3d:73:80:97:6d:3c: 4c:97:77:d0:26:65:1e:fb:bf:3b:f2:a0:65:bb:6f:44: 35:de:d5:c5:c7:c7:9c:c2:d0:78:bf:78:6d:21:0c:f3: 38:a9:26:e6:01:3a:f0:6f:36:73:ca:62:32:09:1f:06: 61:ed:38:13:90:56:46:e1:e5:41:3e:2e:ca:e0:7a:92: b4:24:29:d3:52:28:c8:6c:ff:d1:97:9b:a8:4e:4b:cd: 1a:db:7e:39:ae:8b:f5:e8:3d:f7:0d:d2:1f:89:87:b4: 95:87:80:bf:ff:bf:48:98:bf:3f:5f:3f:07:36:ca:52: c9:c8:2e:f2:74:cd:fc:1f:d6:fd:97:c4:d7:a1:9e:ef: 54:a8:9b:9a:12:ad:56:1e:60:70:ec:cc:ff:b7:6f:db: d6:99:9e:67:ff:6a:d6:24:e9:45:0c:20:aa:82:f8:68: cb:b5:d5:10:f9:a2:2c:46:52:17:69:c2:a1:04:43:72: 8c:f4:e8:47:2e:20:81:d5:86:17:8a:fa:5a:49:f1:eb: b0:fe:20:72:b9:f6:3c:52:6a:cb:c1:c0:15:42:4f:d6 Fingerprint (SHA-256): B3:D6:14:2D:07:16:B7:7E:7B:7D:7A:54:84:03:AD:03:60:2C:21:F2:4D:BC:C1:A6:8B:4C:F3:9E:50:BB:01:12 Fingerprint (SHA1): FD:F4:A1:9F:82:B8:B1:5A:98:6A:BC:22:56:59:74:13:35:CF:DA:0F Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #15001: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15002: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15003: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #15004: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182041 (0x672ba19) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Sat Jan 09 00:09:07 2016 Not After : Sat Jan 09 00:09:07 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:3c:24:07:79:37:ed:87:41:d6:90:52:07:ca:5b:7e: a2:ab:a3:37:ea:b8:3a:bf:4d:b1:1a:41:37:16:de:d6: 51:12:2f:08:f3:30:7d:28:0b:12:76:42:e6:75:7e:50: 27:12:c9:cd:bc:4d:f0:7d:42:28:86:bb:08:79:21:a1: e3:d4:3d:2c:77:3b:8d:fd:7d:90:ef:70:2a:cc:74:9f: 6f:f3:2b:5f:e8:94:07:e7:0f:76:4d:bb:f8:89:78:52: 28:49:fb:2d:d9:15:f6:fe:8c:e8:19:fc:e9:f4:ed:59: 75:bf:6a:80:dc:48:a6:18:ee:87:50:1a:59:8b:d6:b8: e9:26:ed:77:56:2a:62:db:91:2c:ba:9d:d9:6c:aa:93: bc:47:46:1e:11:b5:09:ef:99:a5:1c:2b:28:54:ca:83: b4:59:b3:4f:3e:bd:a7:ed:8d:97:4a:c1:8c:f4:86:06: c2:f2:8a:37:10:e9:df:06:4b:65:64:82:5d:4f:05:3f: 59:65:38:c0:62:cf:8d:17:30:c4:53:35:66:b4:71:cd: 65:4d:a7:31:f0:9b:7a:ac:46:43:75:8b:b8:c0:db:4c: 56:74:80:ea:4f:10:4f:ea:d9:3f:26:4e:a0:a8:00:bd: 01:4a:30:76:d5:80:88:fc:e1:16:a5:a9:46:26:2f:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 74:db:e5:62:73:93:c6:f0:c5:47:74:b4:0f:ae:e4:63: c2:e9:16:c0:41:7e:62:24:0c:3c:01:ec:3a:3f:1c:c7: b8:8d:4b:a5:b4:60:8b:30:2e:78:3d:73:80:97:6d:3c: 4c:97:77:d0:26:65:1e:fb:bf:3b:f2:a0:65:bb:6f:44: 35:de:d5:c5:c7:c7:9c:c2:d0:78:bf:78:6d:21:0c:f3: 38:a9:26:e6:01:3a:f0:6f:36:73:ca:62:32:09:1f:06: 61:ed:38:13:90:56:46:e1:e5:41:3e:2e:ca:e0:7a:92: b4:24:29:d3:52:28:c8:6c:ff:d1:97:9b:a8:4e:4b:cd: 1a:db:7e:39:ae:8b:f5:e8:3d:f7:0d:d2:1f:89:87:b4: 95:87:80:bf:ff:bf:48:98:bf:3f:5f:3f:07:36:ca:52: c9:c8:2e:f2:74:cd:fc:1f:d6:fd:97:c4:d7:a1:9e:ef: 54:a8:9b:9a:12:ad:56:1e:60:70:ec:cc:ff:b7:6f:db: d6:99:9e:67:ff:6a:d6:24:e9:45:0c:20:aa:82:f8:68: cb:b5:d5:10:f9:a2:2c:46:52:17:69:c2:a1:04:43:72: 8c:f4:e8:47:2e:20:81:d5:86:17:8a:fa:5a:49:f1:eb: b0:fe:20:72:b9:f6:3c:52:6a:cb:c1:c0:15:42:4f:d6 Fingerprint (SHA-256): B3:D6:14:2D:07:16:B7:7E:7B:7D:7A:54:84:03:AD:03:60:2C:21:F2:4D:BC:C1:A6:8B:4C:F3:9E:50:BB:01:12 Fingerprint (SHA1): FD:F4:A1:9F:82:B8:B1:5A:98:6A:BC:22:56:59:74:13:35:CF:DA:0F Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #15005: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15006: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15007: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #15008: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108182048 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15009: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #15010: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #15011: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15012: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108182049 --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #15013: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15014: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #15015: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15016: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108182050 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15017: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15018: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #15019: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15020: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108182051 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15021: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15022: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #15023: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #15024: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #15025: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #15026: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182048 (0x672ba20) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Sat Jan 09 00:10:53 2016 Not After : Sat Jan 09 00:10:53 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:96:1e:aa:9d:75:47:37:f6:4e:26:41:47:80:9b:14: 8e:06:78:09:d8:40:64:ce:3e:16:46:c4:44:66:a6:c3: 27:2f:a8:ef:df:d8:9d:83:e2:20:1c:5d:4c:ae:dd:56: 8b:94:99:c0:bc:16:81:34:75:96:12:b4:4a:07:59:a6: 8d:04:97:f9:60:ad:2f:f0:8a:7d:e8:70:b0:49:84:b7: 96:38:f4:eb:e4:6b:72:b0:b7:67:ea:5f:ea:6d:78:f6: ca:94:7c:74:78:30:8f:32:dc:7c:28:1c:73:cf:f9:1d: 50:65:47:e8:1e:33:b0:ad:89:6c:ec:35:ff:66:34:20: 96:e7:9e:19:ac:ff:80:7e:1b:99:d1:88:86:f9:3c:1a: 21:4e:10:ff:16:23:1c:e0:1e:03:ae:ba:62:ef:42:0f: 79:37:ae:5f:27:3d:25:92:82:7d:7c:31:84:b3:8d:0f: 84:9e:3e:e0:6b:84:7a:63:d3:44:fe:03:25:d7:82:ed: ee:3d:38:ca:0b:d4:82:60:01:c5:04:0d:08:9f:a5:23: 04:3c:b3:e3:85:8f:5f:f0:8c:48:a6:9f:a5:6f:3f:80: 40:b8:fe:1c:cd:c7:2e:29:ba:85:b6:73:e4:06:3a:e2: 51:28:ce:48:6e:1f:12:7e:6f:91:ae:f0:3f:b4:97:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 90:d7:d4:c1:f5:54:c2:ca:7b:3e:95:22:09:8b:b7:d1: fa:3a:d8:7d:3e:3e:e1:a4:eb:84:36:b7:a2:18:ea:7e: e9:5c:c9:ed:9c:1d:c4:5c:10:2d:b0:42:d4:3b:53:18: 5f:d7:3c:20:da:f8:aa:4b:36:94:6f:80:b8:c8:c7:22: 35:1b:4e:4c:b3:06:66:4d:43:35:3a:8f:4a:de:06:8f: 93:5a:3c:5e:3e:ea:68:4c:12:11:c0:51:78:a6:c9:6f: 77:a1:04:32:95:c7:86:4c:08:dd:e5:47:16:f6:f2:ea: 2b:a3:63:56:45:68:58:93:8b:30:76:07:2e:44:3a:79: 2a:17:38:ca:79:06:8f:4c:7c:b2:d3:6c:ef:b9:4e:aa: b9:bb:10:44:b4:b6:4f:af:3b:be:49:a1:06:78:c1:b7: c0:d9:9d:8d:61:bb:c1:f3:3f:61:b1:39:a1:95:87:9e: 3a:35:e2:75:c5:6c:2f:d9:b0:3b:f9:11:b7:a0:18:ef: 3f:36:9d:f9:cd:99:ab:f1:59:ef:23:16:07:f9:49:ae: 1d:5c:d4:f5:c1:bc:b7:9f:81:dd:27:fb:8e:1b:6f:2c: c0:eb:cd:c5:03:5a:d2:7f:23:f3:46:c7:ca:de:fb:fd: 4e:23:2f:a1:81:c2:b1:ec:4b:e3:c7:33:4c:2f:f0:cd Fingerprint (SHA-256): EE:3F:0B:94:DC:D3:E1:A8:54:90:CC:24:7A:49:B8:91:4B:4F:DF:27:4A:AF:21:17:5B:39:AD:A3:2D:5D:06:12 Fingerprint (SHA1): FD:88:86:F5:70:39:88:98:DA:7C:B2:24:2B:C4:B9:E4:38:3F:72:05 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15027: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15028: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15029: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182049 (0x672ba21) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Sat Jan 09 00:11:14 2016 Not After : Sat Jan 09 00:11:14 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:61:a5:f1:17:44:52:e5:84:f0:3f:00:03:b0:74:8e: 21:57:ff:04:5d:4f:e3:b1:27:a9:91:1e:f4:54:7d:02: aa:85:0f:bd:d4:95:74:68:99:29:ab:61:13:4e:d9:c0: b1:99:79:2a:9e:e7:dd:f3:a3:40:a1:dd:3b:32:0c:e9: 98:f2:51:36:68:0a:a4:48:b3:f6:5c:83:92:0e:cd:d3: 91:ba:8f:ee:c6:5c:af:c9:7c:8a:3b:ae:b6:1d:2e:69: fb:91:a4:48:f4:3e:07:a4:e6:e9:87:bd:5d:e5:8f:70: 71:c3:7d:ec:1a:51:7c:2a:48:e0:70:c5:14:97:f0:df: 35:02:4f:59:03:ef:63:06:5d:21:b1:72:cb:f0:d4:17: f2:82:6f:bf:74:e9:ee:4f:a8:f3:f1:fe:07:bb:4f:69: 8d:a0:21:ac:21:ba:25:4a:73:e4:40:98:54:fb:1e:e5: d5:24:64:6b:42:9c:c9:06:3a:eb:1f:1c:1d:4c:07:01: ff:8f:cb:b8:40:2b:2a:91:5b:6a:1e:56:db:6d:7a:49: 56:82:33:99:03:f4:78:5c:be:32:f5:66:f5:a5:94:db: 16:4c:05:c7:ab:eb:ec:c8:f9:2f:5b:ec:3c:86:8e:94: f6:5a:2c:f7:e9:2d:79:9f:67:9a:69:cc:ee:d7:51:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:d0:db:dd:40:72:ae:5c:86:8a:47:35:0e:80:a0:b0: 49:37:c3:a8:c3:90:f7:ae:48:19:be:6b:08:d3:99:f4: 55:67:bd:41:46:fe:d4:ed:a2:a3:27:8a:50:bf:fe:ff: 6a:6d:f2:88:84:ef:2a:8c:a5:d0:4b:f8:09:2b:2d:b2: 8f:0e:45:29:54:0f:66:45:30:46:ba:af:92:ed:d6:cb: 51:9e:3e:43:fc:70:56:46:5d:bd:65:ba:68:79:56:70: a6:e5:99:59:15:08:91:cf:09:77:df:07:29:45:a4:8e: ba:da:3b:f1:b0:22:35:5c:5c:6c:89:bd:14:2a:14:e2: 00:50:de:cd:3d:54:39:9e:aa:1d:ab:e1:d7:d9:99:f5: 26:61:e2:f9:1a:a2:9f:58:ec:06:47:85:58:95:4b:99: e4:a1:b1:ec:51:bc:2c:94:a9:76:38:91:3f:3a:55:04: c3:46:ea:16:c3:80:dc:ed:91:bb:bd:97:34:50:f4:43: e6:08:9b:63:81:b6:1e:9b:f4:1b:0c:9f:46:e8:3d:0d: 82:77:a9:c0:76:e6:0a:94:f5:61:e8:c9:3b:b4:d1:3f: 4a:1b:d4:2a:a5:cc:7d:47:b8:0c:1b:84:90:96:06:a5: 8a:fd:82:54:2f:18:bd:fc:c6:f6:c1:da:2f:74:7a:69 Fingerprint (SHA-256): 9F:33:AB:17:5B:7E:41:21:10:83:FC:F4:13:06:FD:92:22:51:E4:AB:B8:AF:B3:2E:C2:57:85:6B:13:F9:E3:05 Fingerprint (SHA1): 2A:A2:0C:D5:D3:2E:FE:DF:E6:1F:6E:20:BE:CA:47:52:F7:2D:4F:39 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #15030: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15031: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182050 (0x672ba22) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Sat Jan 09 00:11:20 2016 Not After : Sat Jan 09 00:11:20 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ed:1d:9a:3e:ab:f1:17:f4:d9:f6:44:5a:b4:5e:34:9b: 66:f4:34:4b:16:7f:4c:e7:f2:84:70:cd:c6:0e:cd:55: d8:8b:04:58:6d:04:7b:97:aa:43:6a:2f:d7:e8:71:c0: 43:f7:e9:0e:06:5a:e7:4f:b4:40:77:5a:c4:4e:15:6f: 6e:b2:82:47:d0:f3:64:e1:27:7a:47:8a:71:53:30:47: 3b:b9:30:3c:f2:64:c9:3b:2b:a1:55:d8:2a:77:ab:32: 47:fe:27:5f:90:e9:cc:f3:c7:f2:d0:23:f9:ef:b3:48: 24:16:99:bf:d9:44:a0:f1:90:1e:14:95:ae:05:56:b7: 60:69:7c:61:8c:1b:f1:48:b1:35:0f:34:5e:94:92:0c: 2f:53:bd:3b:aa:f7:e7:0b:bc:df:54:58:24:a9:29:2f: 74:77:d3:f9:81:33:82:6d:79:05:c2:cd:5d:99:83:96: 29:e9:61:5a:69:29:fb:5b:33:ea:c3:e7:7c:e4:68:44: a4:20:12:7c:5c:6b:95:bf:5b:c6:a8:6d:14:3e:80:3a: df:06:10:e4:50:a4:e0:f8:0b:cc:e0:42:fa:68:2a:cc: 73:24:8a:d0:28:e9:46:90:02:5e:c4:a2:3f:ad:2b:fc: fa:af:60:99:5e:49:6c:d1:b7:86:4c:a9:3a:88:34:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:e7:b0:a4:49:fa:fa:13:55:7f:d2:7e:71:73:4b:d1: 1a:9b:f1:12:5d:71:88:c9:20:76:32:ea:82:49:06:47: 04:66:15:7e:07:52:cb:42:9c:5a:07:c2:0f:5a:40:75: 5c:5f:0c:2d:f4:29:f3:40:17:c8:58:f4:ec:b4:53:81: dc:7b:48:71:79:25:31:81:a9:e4:ea:05:7a:62:67:ff: c7:22:2b:14:ca:55:bd:85:f9:56:60:0f:a1:c6:1d:33: 68:8e:f2:7e:cb:cf:bb:ca:ab:56:56:06:ce:53:1a:e0: 4f:fe:72:cb:37:ad:c3:db:14:45:02:fd:8e:99:68:73: da:57:7b:6f:c7:86:b7:f8:00:ee:89:62:c4:9b:be:ce: 6a:fc:71:98:2f:73:32:3d:f5:6a:00:d8:b0:94:81:8a: 45:f1:ed:50:9f:6a:72:29:c5:e0:ed:0e:ea:50:e1:03: b3:84:71:f8:53:52:38:33:f1:2a:31:0b:26:f7:cc:e9: 6b:ae:8a:ce:fb:d7:e9:8e:35:48:31:a3:c6:9d:e8:b3: 81:a5:fc:34:47:35:7c:81:3d:4f:36:a9:58:2a:fa:45: 35:88:ee:d4:74:1b:dc:dc:20:8a:af:72:e5:33:e3:0d: 2e:71:64:4b:47:39:ae:4a:71:e2:e0:17:bd:6d:61:07 Fingerprint (SHA-256): C6:C8:44:CB:7C:38:38:56:04:B0:BF:AB:3A:6E:72:36:F4:45:0F:4A:9A:90:3D:46:39:0A:81:3C:EA:97:87:EB Fingerprint (SHA1): 74:F8:29:5A:85:AB:F8:DB:FE:5B:41:AF:72:4B:BE:7E:6A:9D:C4:B6 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #15032: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #15033: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108182052 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15034: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #15035: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #15036: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15037: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108182053 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15038: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15039: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #15040: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15041: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108182054 --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #15042: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15043: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #15044: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15045: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 108182055 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15046: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15047: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #15048: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15049: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 108182056 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15050: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15051: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #15052: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #15053: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #15054: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #15055: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #15056: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182052 (0x672ba24) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Sat Jan 09 00:11:47 2016 Not After : Sat Jan 09 00:11:47 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:74:a8:aa:44:43:d4:f0:70:08:72:6b:b0:07:a1:d4: f7:f6:e0:a4:f2:22:aa:89:77:cf:cf:5c:b8:5c:b6:2f: b0:ec:23:f7:17:80:9e:a2:49:a2:34:df:e4:21:7c:e2: 79:db:0d:6a:d2:28:d0:68:75:e1:db:15:49:cf:2e:66: 81:6c:a3:82:0a:98:03:dd:52:c0:80:97:91:39:af:1e: 0d:74:4a:3a:1c:e3:e8:7a:9a:4b:a4:f5:f0:0d:d2:78: f1:7f:9b:87:46:fb:a6:6b:c0:98:0d:dd:0e:c6:c7:91: d3:01:db:a6:39:ff:19:97:f8:a8:e2:f1:26:80:6f:4b: df:75:7e:ce:ab:4b:52:ff:b8:9a:1f:ff:b0:0c:80:71: f1:3b:d0:d1:c1:57:78:c2:4c:3d:cb:35:01:af:cd:d5: f7:f9:c7:e0:06:34:d0:4b:db:b7:57:f3:b2:b0:cf:c5: 49:e4:0f:bf:54:1c:5c:1c:14:a5:e6:f6:b2:7e:94:a8: d7:a3:73:37:72:59:5e:de:91:d1:8d:fa:67:f6:19:d1: 5a:7a:6e:fc:b6:79:ad:73:f6:10:54:5c:7e:32:ce:66: dc:09:8e:f8:c3:78:17:f0:d1:fb:87:3d:24:ce:5f:b8: 27:0c:34:37:f2:c4:c0:b5:ab:f3:a2:49:c3:d5:62:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:8a:d8:f3:21:f5:10:ed:9a:2a:7f:aa:38:26:e1:01: e7:12:2a:89:26:bb:a1:32:e7:9e:e4:83:0f:f8:7e:89: 0a:fc:54:2d:47:03:13:ef:62:fe:17:bb:fa:0e:ae:3c: b3:05:f9:aa:24:98:e5:4c:bf:35:b9:37:7f:fb:17:ac: 94:34:8d:67:4a:c0:95:64:8a:b2:35:b6:b3:16:2b:cb: ff:3b:48:ea:66:29:d2:c8:7a:9a:fd:82:d1:1d:06:9c: e1:e6:cf:12:1c:9e:24:f5:9c:1d:19:d5:78:75:0a:46: f1:c3:c9:18:e6:b2:ac:fa:de:13:ab:bc:eb:a3:8c:97: d9:cc:44:9c:c6:68:e5:e2:03:23:c8:d8:3f:93:b5:c0: 33:7f:75:a0:f1:ce:54:f5:6c:79:94:7e:21:dd:5c:34: 56:8e:33:54:f0:0e:1c:96:3c:a5:89:8e:11:19:d8:f3: 89:81:d6:fa:83:5d:c1:9c:09:8e:57:4d:57:6e:cc:a4: 38:e2:59:5c:e0:81:57:bc:a8:09:98:70:de:f7:d6:41: f8:0d:ba:19:38:ba:59:50:52:8b:dc:c1:9c:e6:cf:85: 9f:72:55:2d:c8:b3:92:ce:e4:cd:dd:b3:40:d3:df:08: 06:63:4c:3e:7c:5f:13:19:5f:d1:e2:6c:17:c0:29:e6 Fingerprint (SHA-256): 11:80:1C:BC:69:8A:78:E7:AC:AD:87:C2:7A:53:8A:2F:32:63:73:A3:03:FB:68:C6:A4:AC:F4:4C:27:99:6B:41 Fingerprint (SHA1): D5:B0:DC:C4:AA:80:41:41:F9:EF:11:24:71:27:D0:B4:65:BE:28:F9 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15057: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15058: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182053 (0x672ba25) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Sat Jan 09 00:11:56 2016 Not After : Sat Jan 09 00:11:56 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:3b:2f:2d:e8:c3:a6:f4:f1:da:d0:fc:8a:36:b7:e5: 6e:ab:25:78:8c:f3:bd:09:17:16:3e:b1:9d:09:5e:1a: b3:7f:2d:ba:c5:5b:6f:73:ec:5d:9b:2f:28:7a:dc:8f: 70:f4:ff:d1:d8:c7:44:e6:e0:f7:47:82:16:55:09:5e: 75:75:96:4f:c0:e1:62:ab:81:bd:b9:10:fa:fb:83:35: 4c:83:19:59:31:18:82:b8:24:52:35:9a:b8:d9:17:fa: 13:18:38:5f:db:93:48:7e:08:5b:e1:8e:33:74:15:0b: a7:5c:ba:0e:3a:af:3d:fd:04:fe:9f:82:82:e7:bd:de: 65:a0:c3:aa:30:1b:14:9f:5a:38:94:c7:2a:35:d3:50: 0c:70:db:c7:0a:3b:cb:8a:29:91:c0:f7:cc:df:54:ae: 27:ce:80:f0:bd:7b:ab:16:5f:a9:6e:c5:e7:34:1a:d6: 6e:b0:a9:3f:62:16:3d:48:db:96:2f:71:30:e5:ec:b0: c5:f4:1d:a5:3f:79:5a:6b:84:1c:b5:c4:bb:5e:bf:48: cc:56:d7:85:0c:0b:6f:49:d3:12:16:dd:6f:a2:ad:be: d3:ce:98:d2:08:4f:3a:8e:d1:f1:94:0d:32:c3:e4:05: 07:4f:a0:c6:ca:d9:71:92:7f:6c:8a:85:ee:27:32:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:b9:3d:b5:3d:e6:59:bb:f5:da:17:6c:10:cf:fa:3d: 8e:60:28:a4:07:29:f3:49:f9:71:ab:31:6b:7e:0d:26: 4e:04:34:c1:a0:2b:d0:6c:e0:98:82:f8:f6:0f:0e:e5: 14:5a:4d:61:13:53:17:a4:ea:b8:87:fb:81:73:15:cf: 9c:45:74:96:c4:87:e1:99:5d:20:e0:97:31:96:51:73: 9e:38:7e:ff:63:a2:be:54:ac:98:22:ff:07:b9:64:ac: 8a:64:96:77:5e:5e:eb:21:96:67:be:47:aa:c6:24:5f: aa:e0:3c:4e:40:45:d0:06:dd:53:c9:b2:6a:ac:29:24: f5:80:83:cd:1c:77:f1:51:2a:ec:5c:10:df:94:88:30: 01:c7:6a:f8:e7:6d:b3:f2:02:90:37:ed:9d:8e:c0:39: 03:13:cb:bf:d2:80:20:d7:1f:c9:87:31:ee:74:c3:b1: 0e:65:bc:d9:d9:f2:88:a4:a1:08:c4:af:6b:a2:61:51: e7:b9:e4:5d:84:0b:9e:a4:32:eb:d1:33:1e:1f:7d:af: ca:d0:86:82:18:e1:9a:80:0c:3a:79:a0:03:a1:37:8e: fb:64:6e:fd:c6:f6:f4:c2:6e:ff:d8:c3:ca:22:80:05: e8:c9:02:94:39:79:5f:cf:5a:8e:b6:af:0e:f8:03:a8 Fingerprint (SHA-256): 3C:36:7A:7C:31:41:0D:0C:B6:02:26:47:1A:94:36:F2:29:8C:9B:67:F9:77:EF:20:2B:2F:89:FA:45:64:35:29 Fingerprint (SHA1): 4E:19:F5:AF:CC:9F:23:4F:9F:15:CA:4A:21:A1:E2:B2:AD:21:4E:31 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #15059: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15060: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15061: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182054 (0x672ba26) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Sat Jan 09 00:12:19 2016 Not After : Sat Jan 09 00:12:19 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:87:c0:9f:5a:2b:10:e0:28:56:b8:a6:df:d4:b8:e3: 58:88:20:00:7a:02:4b:00:ca:a6:79:23:10:8b:f4:22: f3:07:79:5b:89:4b:07:4f:11:f6:60:1f:9b:d6:07:88: dd:7f:70:c0:06:6a:69:a0:a4:b5:b0:a2:69:29:83:b6: d4:d4:9b:c6:8a:f4:7d:09:c2:27:e5:c8:50:07:42:75: 16:18:60:7c:c5:5a:cf:68:8f:7b:dc:94:e3:31:cf:62: 5c:b8:08:bf:4c:52:b4:35:c2:5a:51:92:90:27:5d:a1: 1d:ae:dc:3f:25:34:77:98:a7:6f:3c:47:1f:63:81:7e: a7:8b:3a:73:0c:d7:6e:c3:bd:45:92:31:c3:d7:ef:7f: 27:12:1f:e1:c9:fe:f1:c0:c1:0c:f9:2d:45:0a:ca:84: a0:e2:bd:9e:53:59:cb:cd:48:27:2e:c9:f7:65:4b:92: 3a:c0:29:df:10:ae:d8:30:bd:b8:59:d1:db:c1:f5:3d: 94:e6:e2:cf:1b:ca:37:c6:1a:99:dd:0a:3c:6f:8e:76: d9:f2:61:9c:07:c3:24:aa:d1:b2:66:0c:6f:24:b8:89: 96:bc:e0:9e:a9:d0:bd:f0:3b:85:94:95:63:cb:30:39: d9:67:ce:64:ff:bb:23:f8:72:81:86:ff:da:38:fb:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:c0:e2:49:35:4b:7f:2a:a7:7b:0c:8f:4e:b8:a9:b6: 3e:24:73:0c:5f:d8:c6:f3:85:74:2a:60:fd:c0:db:ab: 3a:fa:0e:c1:ad:00:25:c4:eb:02:6b:6c:37:e9:90:5f: 6a:eb:8c:31:1e:3b:be:aa:46:08:72:04:d8:37:9f:0f: 27:07:4b:62:8c:da:c2:02:cf:81:42:68:5d:df:a9:1a: 44:b6:df:af:1c:1d:7a:c9:dd:04:ec:94:1e:d5:2b:83: f3:bd:d7:49:43:cd:6d:c9:48:4e:ae:20:f9:69:6c:fa: 6d:8f:17:ce:68:d1:a1:f7:8d:07:02:ca:cd:bc:e4:33: 67:61:f3:c7:39:5e:91:74:48:46:c5:ff:44:24:32:1d: 1a:f1:c7:bb:34:b5:c1:d2:06:c1:fa:09:8c:48:e6:dd: d3:6c:5d:72:c4:dc:7d:d9:a2:34:f9:a2:c4:a3:eb:9d: 65:1c:ab:d1:9c:c5:73:b1:b4:98:ba:39:65:cb:33:79: 15:8d:40:4c:fd:d0:23:c3:cd:23:1a:84:b4:0a:c0:fe: 5a:ae:38:57:12:46:f7:18:cf:2b:46:95:02:d9:37:68: 2d:2b:2a:84:5b:fd:6d:da:8f:67:6e:65:4d:c8:cc:41: f6:03:23:1d:f9:b7:d2:d3:cc:bd:3c:35:83:d7:b1:de Fingerprint (SHA-256): 5A:28:C7:53:9A:B2:58:5B:90:2B:E2:8E:D6:8E:1A:1D:B2:DD:D2:F7:84:21:CB:C5:FA:4D:EE:3E:11:6C:24:04 Fingerprint (SHA1): 7C:A3:05:D3:2A:91:40:95:83:D1:A6:89:01:B0:94:4F:81:A8:15:16 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #15062: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #15063: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108182057 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15064: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #15065: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #15066: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15067: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108182058 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15068: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15069: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #15070: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15071: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108182059 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA1Root-108181836.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #15072: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15073: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #15074: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15075: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 108182060 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15076: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15077: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #15078: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182057 (0x672ba29) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Sat Jan 09 00:13:02 2016 Not After : Sat Jan 09 00:13:02 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:c3:86:51:b3:d6:23:09:7b:32:15:6b:71:c0:54:9f: e6:1d:5b:47:53:d2:c1:8f:76:43:af:23:4a:0d:96:c1: f7:73:e2:6f:94:89:7c:22:41:c4:03:21:a1:95:fa:44: b9:64:e3:d2:79:e9:35:6e:eb:5e:83:79:0e:22:64:9f: 42:2c:27:56:f5:2d:68:61:e8:71:d8:ab:d2:cc:9a:3c: a7:98:e0:eb:a2:85:46:ae:24:52:c6:e2:69:73:da:8b: 3a:2b:a1:38:42:d2:82:4d:95:c2:c7:b7:ec:c6:d8:4e: f3:9d:d3:59:13:28:dd:0b:85:27:6e:80:11:39:b2:e8: 17:89:b3:d6:84:85:7a:f2:c0:49:87:b2:e1:f3:c9:db: 72:c4:28:41:9d:ba:b9:16:76:5a:40:3a:c5:b3:48:65: f0:1e:db:bc:66:03:8d:c3:ff:fc:f0:06:1d:36:6d:14: 6b:5c:e8:3a:76:5b:c9:2e:75:b7:cb:3f:43:d0:cb:ea: 3c:4a:f4:52:be:66:01:ca:2d:01:9b:4b:ce:8f:4f:69: f6:65:cd:25:ba:e4:da:4d:35:23:78:06:5d:85:bf:82: 70:be:63:a3:49:68:5a:aa:cb:3f:d2:68:cb:81:6c:01: 14:b8:d5:1c:d1:2a:76:9d:10:5b:f7:f3:20:6a:19:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:ff:7b:90:b6:45:6e:6f:76:73:00:93:11:84:19:8e: f5:bc:a4:20:98:4a:d5:aa:15:ad:b5:d2:29:a2:60:60: 67:e0:dd:bc:b4:88:72:8d:9b:97:50:e1:63:aa:cc:4e: 9b:6a:6a:c9:e0:7d:21:86:72:ce:b8:8d:2a:c9:ec:32: 2f:26:7b:05:7d:d0:15:fb:39:a2:76:f6:eb:b6:9a:a6: b2:46:a6:d7:0f:b8:e5:dc:93:ca:08:68:bb:1f:b6:af: 10:20:78:8b:7d:ab:6a:89:56:94:44:ce:a3:cf:98:a1: 01:73:46:75:08:59:de:d7:bc:33:28:6e:1f:c2:6c:66: 39:c4:04:47:70:aa:5e:b8:5f:c0:5b:95:0f:be:88:55: 86:0d:0a:7d:20:0e:94:df:17:ed:b3:6c:1b:50:ff:d9: 1e:ac:d4:07:70:05:35:58:52:a9:83:2f:94:63:b6:15: c3:75:13:ee:0f:2d:53:9f:2b:55:21:bd:91:fc:3a:80: 68:98:0f:73:87:d9:91:59:25:99:0e:29:65:2d:fa:31: 01:19:e5:84:52:6e:78:51:76:67:ef:26:f1:35:e3:e7: 5f:b1:4a:13:62:8d:7a:f0:24:66:39:13:ab:6d:61:c9: e5:a0:c4:bd:79:03:1d:f8:1c:39:d7:61:39:76:96:f6 Fingerprint (SHA-256): 00:36:0A:41:7B:8A:E3:3B:3A:90:42:9B:79:A6:3A:CC:EA:BD:2B:0C:83:6C:F6:77:AF:83:9D:DE:7B:35:D5:AC Fingerprint (SHA1): 9B:D6:6F:54:AB:B2:64:07:B1:86:08:37:D3:B6:64:E4:63:12:EA:F5 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15079: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #15080: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108182061 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15081: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #15082: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #15083: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108182062 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15084: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #15085: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #15086: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15087: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108182063 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15088: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15089: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108182064 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15090: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15091: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #15092: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #15093: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15094: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108182065 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-Bridge-108181837.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #15095: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15096: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #15097: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15098: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108182066 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15099: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15100: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #15101: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182061 (0x672ba2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Sat Jan 09 00:13:53 2016 Not After : Sat Jan 09 00:13:53 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:fe:6e:f5:40:31:7b:83:d6:99:17:19:43:7b:eb:1b: c1:04:31:a0:8e:68:f2:e0:2e:a0:c7:a9:ad:86:92:4b: c6:e5:71:0c:a2:71:f6:4f:e3:e2:0b:47:2b:96:3c:eb: 07:c7:6b:ad:f9:9d:c1:33:17:ea:13:99:6d:88:f5:53: 0c:3c:0c:fc:ac:74:79:a0:aa:2e:c0:b0:39:0c:06:0c: b2:4e:36:b0:c0:1c:ed:ed:da:c8:bd:bf:76:a8:4c:92: 52:a0:4f:23:ee:af:5d:b7:29:a0:4d:fe:47:c7:8e:51: 2e:69:27:03:5e:d9:cc:44:2e:ba:0d:9a:bc:ae:89:2f: 50:1c:67:80:81:96:1c:72:53:bd:f2:b2:02:82:f0:5f: 50:8f:b6:ec:f9:7c:28:05:a6:ec:3e:4b:ce:90:47:72: 2d:b1:e3:91:e3:21:b3:b2:42:91:18:19:8b:8a:0f:de: 9d:04:ee:bc:d2:09:fc:fb:7f:02:7c:e5:ff:af:b8:25: e9:69:1d:29:b3:4f:16:42:9f:89:04:81:53:c7:b2:43: 1a:06:3b:b7:d3:a1:80:e9:5e:6a:8c:6a:cb:c1:1e:ea: b5:dc:e0:70:4b:6d:e8:c2:77:10:8f:f1:24:09:eb:83: 16:85:af:76:62:90:ad:cd:7f:81:a9:5e:b3:0a:50:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 02:d8:49:9b:d4:a8:fa:ff:91:f6:e1:ed:ad:3d:58:ff: a9:d6:e6:f3:9f:e8:4f:8e:a2:c4:c7:1c:66:52:de:83: 1e:9b:93:55:d6:eb:91:6e:0c:23:98:fa:79:5d:8d:df: 29:dc:09:cd:ab:01:fb:90:17:30:2b:42:3c:8d:84:22: ff:1b:b9:0f:42:e6:b8:cb:f5:0d:cf:2f:f9:27:9f:29: 97:d3:cc:66:05:4d:d1:61:cf:41:2e:4e:81:32:56:68: 1f:a9:79:6e:01:53:7f:5b:f0:11:de:6d:7f:85:ad:d6: cb:ad:cc:f5:1e:0e:53:0f:7c:34:b1:49:4d:49:03:b7: 12:59:9c:cb:19:52:ee:c5:88:0c:e0:6b:bc:85:c1:a5: 44:bf:47:16:aa:fd:fc:63:f8:d3:c5:d5:ef:ad:7b:fc: 5d:94:2e:5d:71:4f:7c:7a:22:59:63:04:f0:6a:09:df: c7:ce:86:c0:91:da:77:5d:9b:1f:40:4d:45:f2:b5:00: 1f:c1:8a:f6:13:f3:81:79:75:87:c1:e7:59:e5:4f:6e: 17:85:6f:15:6f:fd:69:aa:5c:98:a9:7d:9b:21:ba:ca: a8:7a:e6:d9:3b:c7:36:94:2d:c3:10:63:68:63:4a:8a: e7:e9:43:f6:ac:b3:8a:db:ec:85:f0:51:a1:27:9a:10 Fingerprint (SHA-256): 7F:70:55:80:E4:F6:E2:68:6E:37:AF:7B:08:B0:23:D3:1A:00:E7:D5:3E:3A:D0:D8:05:DC:21:BC:98:AE:1D:58 Fingerprint (SHA1): C6:25:C6:50:25:27:6A:F6:85:5A:2C:69:08:1B:9E:93:DD:5E:70:CF Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #15102: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182062 (0x672ba2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Sat Jan 09 00:14:05 2016 Not After : Sat Jan 09 00:14:05 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:6c:1e:f0:9a:73:38:08:88:3b:cd:df:7d:be:4d:37: b4:65:78:46:bd:c9:81:25:07:7e:5a:33:44:7f:d9:c0: de:b0:82:2d:13:c6:cd:34:7d:89:d8:a9:6b:e0:19:18: 1c:56:8c:72:f8:ad:3a:3f:39:92:eb:cb:10:e0:87:e3: 5d:07:59:18:02:93:91:a1:1f:14:da:ef:1d:6d:c2:5a: fc:dc:58:b7:31:09:92:f5:e6:f6:90:09:4d:d3:05:4f: d5:8f:06:00:ed:86:07:3c:d7:f3:5b:60:91:d1:48:46: 1e:29:47:da:a8:86:6f:37:25:47:80:14:c9:71:18:3a: b6:40:1c:0c:64:81:74:8f:13:8e:d0:e7:39:b0:ed:36: e4:d7:29:c2:44:7e:3d:cc:de:70:26:db:cf:88:c4:ea: 62:e7:ba:14:b1:11:10:a2:45:1a:01:64:cb:85:f5:da: 6d:e1:3e:c3:92:83:b2:5d:89:d8:68:de:e0:4b:e4:c5: e9:e0:19:98:0d:cd:6d:e0:ac:6d:d4:34:3a:cf:63:6a: b9:fc:d4:3d:4a:b1:da:c0:55:b4:9a:44:a7:d9:30:da: aa:8e:71:db:90:95:9b:79:9f:fa:83:07:aa:48:73:5d: 83:3b:37:35:91:39:db:7d:35:57:39:1b:25:ba:3a:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:b8:73:b1:ab:af:3a:3d:08:1d:ef:78:da:0f:11:db: 19:fd:47:9b:cc:f5:e3:ad:93:6b:3a:6d:15:5f:24:99: 46:77:2e:3b:50:fd:da:b2:ab:27:38:45:04:62:89:ac: ee:7e:82:ba:86:52:68:27:44:b2:ec:60:1b:ad:1c:55: a3:a4:d3:d3:2e:44:db:98:3f:d1:e7:b6:c3:45:0a:e1: 85:cf:0e:75:97:0c:b7:93:77:94:ef:f5:5c:5f:87:cc: 71:46:b0:d5:53:a7:e2:b8:5c:7a:22:32:3e:ac:3d:b5: 16:1c:15:21:a1:9c:d6:3b:0d:66:cf:ac:5e:47:bd:2d: a0:0a:44:bb:ce:17:6d:fb:2d:63:05:19:4d:d8:06:d0: 7f:9f:72:ba:a0:c9:33:e6:0a:99:5c:a3:6f:b8:22:f0: 3d:80:51:2a:52:79:91:97:a0:49:74:45:bb:95:6e:72: 65:0b:9e:7c:42:68:60:18:f3:67:9d:0a:ee:16:f9:13: c7:8e:86:1a:cc:6c:f7:b6:d7:b3:79:59:75:8f:e9:96: a8:cd:f0:fc:06:4b:2b:4a:94:81:c4:e8:6e:51:eb:12: 61:aa:69:34:71:7e:7c:c5:98:13:9d:f5:ac:13:b3:40: 4d:1d:9a:e8:99:56:3f:65:fb:2f:28:5d:bf:10:9c:df Fingerprint (SHA-256): 48:BE:DA:79:2B:11:04:10:72:C7:F7:4A:46:50:05:5B:49:BC:3F:F6:F4:D5:A9:B0:AD:05:50:E8:EC:28:5E:D6 Fingerprint (SHA1): 48:BE:91:27:0D:55:F3:EA:BA:94:9A:AD:03:21:F1:26:D5:91:D9:6C Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #15103: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182062 (0x672ba2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Sat Jan 09 00:14:05 2016 Not After : Sat Jan 09 00:14:05 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:6c:1e:f0:9a:73:38:08:88:3b:cd:df:7d:be:4d:37: b4:65:78:46:bd:c9:81:25:07:7e:5a:33:44:7f:d9:c0: de:b0:82:2d:13:c6:cd:34:7d:89:d8:a9:6b:e0:19:18: 1c:56:8c:72:f8:ad:3a:3f:39:92:eb:cb:10:e0:87:e3: 5d:07:59:18:02:93:91:a1:1f:14:da:ef:1d:6d:c2:5a: fc:dc:58:b7:31:09:92:f5:e6:f6:90:09:4d:d3:05:4f: d5:8f:06:00:ed:86:07:3c:d7:f3:5b:60:91:d1:48:46: 1e:29:47:da:a8:86:6f:37:25:47:80:14:c9:71:18:3a: b6:40:1c:0c:64:81:74:8f:13:8e:d0:e7:39:b0:ed:36: e4:d7:29:c2:44:7e:3d:cc:de:70:26:db:cf:88:c4:ea: 62:e7:ba:14:b1:11:10:a2:45:1a:01:64:cb:85:f5:da: 6d:e1:3e:c3:92:83:b2:5d:89:d8:68:de:e0:4b:e4:c5: e9:e0:19:98:0d:cd:6d:e0:ac:6d:d4:34:3a:cf:63:6a: b9:fc:d4:3d:4a:b1:da:c0:55:b4:9a:44:a7:d9:30:da: aa:8e:71:db:90:95:9b:79:9f:fa:83:07:aa:48:73:5d: 83:3b:37:35:91:39:db:7d:35:57:39:1b:25:ba:3a:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:b8:73:b1:ab:af:3a:3d:08:1d:ef:78:da:0f:11:db: 19:fd:47:9b:cc:f5:e3:ad:93:6b:3a:6d:15:5f:24:99: 46:77:2e:3b:50:fd:da:b2:ab:27:38:45:04:62:89:ac: ee:7e:82:ba:86:52:68:27:44:b2:ec:60:1b:ad:1c:55: a3:a4:d3:d3:2e:44:db:98:3f:d1:e7:b6:c3:45:0a:e1: 85:cf:0e:75:97:0c:b7:93:77:94:ef:f5:5c:5f:87:cc: 71:46:b0:d5:53:a7:e2:b8:5c:7a:22:32:3e:ac:3d:b5: 16:1c:15:21:a1:9c:d6:3b:0d:66:cf:ac:5e:47:bd:2d: a0:0a:44:bb:ce:17:6d:fb:2d:63:05:19:4d:d8:06:d0: 7f:9f:72:ba:a0:c9:33:e6:0a:99:5c:a3:6f:b8:22:f0: 3d:80:51:2a:52:79:91:97:a0:49:74:45:bb:95:6e:72: 65:0b:9e:7c:42:68:60:18:f3:67:9d:0a:ee:16:f9:13: c7:8e:86:1a:cc:6c:f7:b6:d7:b3:79:59:75:8f:e9:96: a8:cd:f0:fc:06:4b:2b:4a:94:81:c4:e8:6e:51:eb:12: 61:aa:69:34:71:7e:7c:c5:98:13:9d:f5:ac:13:b3:40: 4d:1d:9a:e8:99:56:3f:65:fb:2f:28:5d:bf:10:9c:df Fingerprint (SHA-256): 48:BE:DA:79:2B:11:04:10:72:C7:F7:4A:46:50:05:5B:49:BC:3F:F6:F4:D5:A9:B0:AD:05:50:E8:EC:28:5E:D6 Fingerprint (SHA1): 48:BE:91:27:0D:55:F3:EA:BA:94:9A:AD:03:21:F1:26:D5:91:D9:6C Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #15104: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #15105: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108182067 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15106: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #15107: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #15108: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108182068 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15109: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #15110: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #15111: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15112: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 108182069 -7 Bridge@Army < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15113: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15114: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 108182070 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15115: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15116: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #15117: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #15118: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15119: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108182071 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-Bridge-108181838.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #15120: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15121: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #15122: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15123: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108182072 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15124: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15125: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #15126: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15127: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 108182073 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-BridgeNavy-108181839.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #15128: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15129: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #15130: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15131: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108182074 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15132: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15133: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #15134: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182067 (0x672ba33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Sat Jan 09 00:14:53 2016 Not After : Sat Jan 09 00:14:53 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:83:e6:d5:b3:cf:8e:cf:75:5b:61:23:17:51:a6:e9: e8:1b:ac:8d:13:22:0d:1f:93:55:4b:74:48:fc:3a:57: d2:4d:3e:43:22:af:0b:35:db:46:e3:62:68:23:7c:00: d1:6e:86:c6:13:c7:3b:27:c2:eb:47:f9:58:d4:aa:f0: 33:a7:ac:02:29:ba:31:53:18:8b:5d:2f:a3:5e:b8:ce: 4e:e1:77:b8:74:0a:ad:62:17:d7:33:41:4c:7b:68:72: e1:07:f1:df:1e:cb:3a:d8:4d:68:ad:6c:73:a4:1d:58: 54:47:b2:82:67:34:42:29:76:34:cb:dd:82:2c:a7:0c: 22:df:a9:a8:0e:69:b1:5f:5a:6e:52:bb:98:41:23:4d: d1:75:26:1e:aa:b2:7c:77:fd:94:f8:4e:ad:99:b7:a6: 63:8f:dd:43:2b:ae:6d:6c:05:14:c2:c2:38:d1:df:6b: 9f:2f:13:22:56:d1:c1:4b:f8:10:3e:9e:b2:69:d6:9d: ab:5c:1b:fc:5c:79:2c:df:eb:b8:3f:6d:76:1e:ef:36: 5e:ad:ea:27:41:ed:c2:0d:c4:a7:88:ff:43:5a:76:ee: 77:cd:18:66:74:f8:20:fd:84:01:3a:1c:d0:8d:4b:b3: 3c:61:a9:fd:e5:6a:c3:a2:4d:d0:b7:8c:e0:6c:10:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:30:48:c3:ea:82:8a:15:d9:30:ad:33:f0:67:c3:ce: 6c:33:1c:2e:1d:20:26:5b:d7:ea:3a:94:02:c4:5c:17: 49:4c:c3:b7:2e:b8:bf:fa:a4:54:c0:dc:4e:82:6a:a0: 05:ca:9c:ce:79:bb:52:8c:de:88:9e:97:18:68:03:27: 25:d5:bb:55:5a:a2:2c:e7:0e:10:1d:bf:0f:91:25:f5: c5:40:89:17:a4:60:97:02:c6:cf:b7:0f:bd:68:79:ee: ea:fb:c0:b0:89:72:b5:4d:67:b4:bb:22:16:73:9a:7c: cd:ac:cc:7c:f7:cb:e4:b2:4f:04:77:d6:02:38:ab:35: 14:c2:bf:df:c6:8f:9f:24:e9:d7:14:26:60:d6:e4:58: 1a:2a:c8:0f:9a:8d:59:97:0d:f8:ad:a9:3c:f4:78:34: ea:5d:fc:45:9b:63:ab:31:14:fa:99:3a:ca:ac:05:d2: 21:3f:19:f3:ec:71:12:f3:4e:84:d3:00:ef:97:66:bf: 9f:ba:7a:cb:77:12:69:18:6b:89:7d:5f:3c:b3:a3:23: 2e:79:9f:14:b4:ef:36:97:44:04:ed:12:52:e0:bc:15: a2:9a:94:ab:c1:25:ca:64:9b:a3:52:48:5a:c1:24:de: 94:88:66:56:e7:6d:7f:c6:b5:ba:f8:c7:81:b3:a2:a0 Fingerprint (SHA-256): 33:B1:A3:B1:4C:52:65:E0:64:86:AC:4C:57:93:4B:8D:75:9E:4B:9F:D5:38:37:FE:C7:21:A8:16:9C:0E:1A:BE Fingerprint (SHA1): 94:37:41:5B:8B:CA:A3:9B:90:B0:25:CD:4E:44:8D:74:27:CD:16:20 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #15135: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182068 (0x672ba34) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Sat Jan 09 00:15:07 2016 Not After : Sat Jan 09 00:15:07 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:31:ee:23:af:77:f2:83:d8:2e:e1:cd:ca:c9:f5:5f: 9c:75:c1:9a:12:3b:37:3d:11:df:0b:3d:29:6e:98:34: a4:b6:f9:3e:1e:07:42:c6:e0:1e:41:13:f1:8e:b1:9a: 95:99:17:f6:c5:3b:01:45:b5:65:a1:f0:1e:6a:36:64: 79:41:ed:ed:36:c8:d3:87:c8:2c:c1:fb:e3:3f:a7:70: cf:16:f4:d0:5b:ec:eb:6f:f7:44:1f:e5:e3:5f:c6:4b: de:e9:f2:f9:f6:eb:55:2a:77:01:31:cf:36:94:e3:13: e5:96:dd:28:a6:e5:87:75:43:bf:88:f3:34:d4:af:27: 2f:0f:fa:29:20:4a:75:c4:38:9e:88:0b:a4:81:36:c3: 1d:1c:bf:02:ff:f4:14:dd:c7:b8:7f:4a:aa:50:8e:9b: 48:b4:7f:f1:07:39:a9:6d:ab:81:54:4c:0c:3d:89:39: c7:d1:70:5c:44:d5:5b:2a:a2:6d:e0:5f:4b:54:10:9d: 8b:58:88:b0:f3:fb:5b:ca:56:43:07:fd:e2:ef:67:5c: 49:7c:f5:9f:50:b6:ac:f5:df:2d:e3:53:b2:5e:7f:b6: d6:32:5c:67:55:97:a1:47:6b:f1:46:9f:03:bf:c1:32: ee:a9:cc:c3:44:50:38:1a:59:ab:f4:ef:ee:49:e8:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:51:dd:b9:37:f7:62:0b:53:e5:1c:17:7f:6a:65:23: 73:2d:a3:4d:5e:db:fd:48:ec:e4:9d:e8:8e:17:2c:c6: 75:7b:b0:34:1a:37:18:4a:ff:df:9f:33:04:82:e8:71: 3c:b8:1c:f2:a7:8b:05:bf:53:58:38:f9:12:ad:80:d5: b9:07:79:f4:0e:22:7b:56:02:8c:74:d3:c0:9c:d3:f3: 21:66:79:78:ad:02:38:09:68:ab:81:92:40:a7:b7:79: 37:df:73:e9:c9:d7:c7:2a:95:0c:ab:da:c1:1b:c9:63: a7:5a:32:c4:df:8a:4b:e4:b9:d3:02:13:c8:73:00:7c: fd:07:e5:a6:49:65:9a:8a:74:89:e9:ed:67:7e:d0:ce: 29:48:d1:94:50:0d:75:20:92:ff:99:5f:92:63:6e:a4: bb:7a:5e:13:83:03:75:b9:0d:25:78:12:83:f8:2e:87: 2b:b4:68:ad:e2:26:7d:82:26:e8:d3:18:de:49:1b:10: 35:b8:9e:a0:cc:3b:23:c4:5b:ff:45:64:bb:8e:40:df: 42:6e:c9:ca:53:89:ec:2a:a4:f0:ab:e4:59:c3:c9:f0: 90:5c:38:6c:4e:d3:d5:53:aa:28:32:4b:f7:a6:c2:5a: 29:ea:ea:56:9d:22:08:bc:af:fb:7e:cf:eb:7a:f4:30 Fingerprint (SHA-256): EE:D0:E4:CF:A3:BB:35:07:F9:E9:1E:31:97:0D:79:C6:60:3A:F7:5B:51:7E:89:2A:6B:19:E6:67:8F:DA:1B:F5 Fingerprint (SHA1): B5:08:DD:60:1E:A7:C6:E3:79:43:5C:26:86:65:53:67:37:A3:AD:19 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #15136: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182068 (0x672ba34) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Sat Jan 09 00:15:07 2016 Not After : Sat Jan 09 00:15:07 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:31:ee:23:af:77:f2:83:d8:2e:e1:cd:ca:c9:f5:5f: 9c:75:c1:9a:12:3b:37:3d:11:df:0b:3d:29:6e:98:34: a4:b6:f9:3e:1e:07:42:c6:e0:1e:41:13:f1:8e:b1:9a: 95:99:17:f6:c5:3b:01:45:b5:65:a1:f0:1e:6a:36:64: 79:41:ed:ed:36:c8:d3:87:c8:2c:c1:fb:e3:3f:a7:70: cf:16:f4:d0:5b:ec:eb:6f:f7:44:1f:e5:e3:5f:c6:4b: de:e9:f2:f9:f6:eb:55:2a:77:01:31:cf:36:94:e3:13: e5:96:dd:28:a6:e5:87:75:43:bf:88:f3:34:d4:af:27: 2f:0f:fa:29:20:4a:75:c4:38:9e:88:0b:a4:81:36:c3: 1d:1c:bf:02:ff:f4:14:dd:c7:b8:7f:4a:aa:50:8e:9b: 48:b4:7f:f1:07:39:a9:6d:ab:81:54:4c:0c:3d:89:39: c7:d1:70:5c:44:d5:5b:2a:a2:6d:e0:5f:4b:54:10:9d: 8b:58:88:b0:f3:fb:5b:ca:56:43:07:fd:e2:ef:67:5c: 49:7c:f5:9f:50:b6:ac:f5:df:2d:e3:53:b2:5e:7f:b6: d6:32:5c:67:55:97:a1:47:6b:f1:46:9f:03:bf:c1:32: ee:a9:cc:c3:44:50:38:1a:59:ab:f4:ef:ee:49:e8:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:51:dd:b9:37:f7:62:0b:53:e5:1c:17:7f:6a:65:23: 73:2d:a3:4d:5e:db:fd:48:ec:e4:9d:e8:8e:17:2c:c6: 75:7b:b0:34:1a:37:18:4a:ff:df:9f:33:04:82:e8:71: 3c:b8:1c:f2:a7:8b:05:bf:53:58:38:f9:12:ad:80:d5: b9:07:79:f4:0e:22:7b:56:02:8c:74:d3:c0:9c:d3:f3: 21:66:79:78:ad:02:38:09:68:ab:81:92:40:a7:b7:79: 37:df:73:e9:c9:d7:c7:2a:95:0c:ab:da:c1:1b:c9:63: a7:5a:32:c4:df:8a:4b:e4:b9:d3:02:13:c8:73:00:7c: fd:07:e5:a6:49:65:9a:8a:74:89:e9:ed:67:7e:d0:ce: 29:48:d1:94:50:0d:75:20:92:ff:99:5f:92:63:6e:a4: bb:7a:5e:13:83:03:75:b9:0d:25:78:12:83:f8:2e:87: 2b:b4:68:ad:e2:26:7d:82:26:e8:d3:18:de:49:1b:10: 35:b8:9e:a0:cc:3b:23:c4:5b:ff:45:64:bb:8e:40:df: 42:6e:c9:ca:53:89:ec:2a:a4:f0:ab:e4:59:c3:c9:f0: 90:5c:38:6c:4e:d3:d5:53:aa:28:32:4b:f7:a6:c2:5a: 29:ea:ea:56:9d:22:08:bc:af:fb:7e:cf:eb:7a:f4:30 Fingerprint (SHA-256): EE:D0:E4:CF:A3:BB:35:07:F9:E9:1E:31:97:0D:79:C6:60:3A:F7:5B:51:7E:89:2A:6B:19:E6:67:8F:DA:1B:F5 Fingerprint (SHA1): B5:08:DD:60:1E:A7:C6:E3:79:43:5C:26:86:65:53:67:37:A3:AD:19 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #15137: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #15138: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182067 (0x672ba33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Sat Jan 09 00:14:53 2016 Not After : Sat Jan 09 00:14:53 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:83:e6:d5:b3:cf:8e:cf:75:5b:61:23:17:51:a6:e9: e8:1b:ac:8d:13:22:0d:1f:93:55:4b:74:48:fc:3a:57: d2:4d:3e:43:22:af:0b:35:db:46:e3:62:68:23:7c:00: d1:6e:86:c6:13:c7:3b:27:c2:eb:47:f9:58:d4:aa:f0: 33:a7:ac:02:29:ba:31:53:18:8b:5d:2f:a3:5e:b8:ce: 4e:e1:77:b8:74:0a:ad:62:17:d7:33:41:4c:7b:68:72: e1:07:f1:df:1e:cb:3a:d8:4d:68:ad:6c:73:a4:1d:58: 54:47:b2:82:67:34:42:29:76:34:cb:dd:82:2c:a7:0c: 22:df:a9:a8:0e:69:b1:5f:5a:6e:52:bb:98:41:23:4d: d1:75:26:1e:aa:b2:7c:77:fd:94:f8:4e:ad:99:b7:a6: 63:8f:dd:43:2b:ae:6d:6c:05:14:c2:c2:38:d1:df:6b: 9f:2f:13:22:56:d1:c1:4b:f8:10:3e:9e:b2:69:d6:9d: ab:5c:1b:fc:5c:79:2c:df:eb:b8:3f:6d:76:1e:ef:36: 5e:ad:ea:27:41:ed:c2:0d:c4:a7:88:ff:43:5a:76:ee: 77:cd:18:66:74:f8:20:fd:84:01:3a:1c:d0:8d:4b:b3: 3c:61:a9:fd:e5:6a:c3:a2:4d:d0:b7:8c:e0:6c:10:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:30:48:c3:ea:82:8a:15:d9:30:ad:33:f0:67:c3:ce: 6c:33:1c:2e:1d:20:26:5b:d7:ea:3a:94:02:c4:5c:17: 49:4c:c3:b7:2e:b8:bf:fa:a4:54:c0:dc:4e:82:6a:a0: 05:ca:9c:ce:79:bb:52:8c:de:88:9e:97:18:68:03:27: 25:d5:bb:55:5a:a2:2c:e7:0e:10:1d:bf:0f:91:25:f5: c5:40:89:17:a4:60:97:02:c6:cf:b7:0f:bd:68:79:ee: ea:fb:c0:b0:89:72:b5:4d:67:b4:bb:22:16:73:9a:7c: cd:ac:cc:7c:f7:cb:e4:b2:4f:04:77:d6:02:38:ab:35: 14:c2:bf:df:c6:8f:9f:24:e9:d7:14:26:60:d6:e4:58: 1a:2a:c8:0f:9a:8d:59:97:0d:f8:ad:a9:3c:f4:78:34: ea:5d:fc:45:9b:63:ab:31:14:fa:99:3a:ca:ac:05:d2: 21:3f:19:f3:ec:71:12:f3:4e:84:d3:00:ef:97:66:bf: 9f:ba:7a:cb:77:12:69:18:6b:89:7d:5f:3c:b3:a3:23: 2e:79:9f:14:b4:ef:36:97:44:04:ed:12:52:e0:bc:15: a2:9a:94:ab:c1:25:ca:64:9b:a3:52:48:5a:c1:24:de: 94:88:66:56:e7:6d:7f:c6:b5:ba:f8:c7:81:b3:a2:a0 Fingerprint (SHA-256): 33:B1:A3:B1:4C:52:65:E0:64:86:AC:4C:57:93:4B:8D:75:9E:4B:9F:D5:38:37:FE:C7:21:A8:16:9C:0E:1A:BE Fingerprint (SHA1): 94:37:41:5B:8B:CA:A3:9B:90:B0:25:CD:4E:44:8D:74:27:CD:16:20 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #15139: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182068 (0x672ba34) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Sat Jan 09 00:15:07 2016 Not After : Sat Jan 09 00:15:07 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:31:ee:23:af:77:f2:83:d8:2e:e1:cd:ca:c9:f5:5f: 9c:75:c1:9a:12:3b:37:3d:11:df:0b:3d:29:6e:98:34: a4:b6:f9:3e:1e:07:42:c6:e0:1e:41:13:f1:8e:b1:9a: 95:99:17:f6:c5:3b:01:45:b5:65:a1:f0:1e:6a:36:64: 79:41:ed:ed:36:c8:d3:87:c8:2c:c1:fb:e3:3f:a7:70: cf:16:f4:d0:5b:ec:eb:6f:f7:44:1f:e5:e3:5f:c6:4b: de:e9:f2:f9:f6:eb:55:2a:77:01:31:cf:36:94:e3:13: e5:96:dd:28:a6:e5:87:75:43:bf:88:f3:34:d4:af:27: 2f:0f:fa:29:20:4a:75:c4:38:9e:88:0b:a4:81:36:c3: 1d:1c:bf:02:ff:f4:14:dd:c7:b8:7f:4a:aa:50:8e:9b: 48:b4:7f:f1:07:39:a9:6d:ab:81:54:4c:0c:3d:89:39: c7:d1:70:5c:44:d5:5b:2a:a2:6d:e0:5f:4b:54:10:9d: 8b:58:88:b0:f3:fb:5b:ca:56:43:07:fd:e2:ef:67:5c: 49:7c:f5:9f:50:b6:ac:f5:df:2d:e3:53:b2:5e:7f:b6: d6:32:5c:67:55:97:a1:47:6b:f1:46:9f:03:bf:c1:32: ee:a9:cc:c3:44:50:38:1a:59:ab:f4:ef:ee:49:e8:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:51:dd:b9:37:f7:62:0b:53:e5:1c:17:7f:6a:65:23: 73:2d:a3:4d:5e:db:fd:48:ec:e4:9d:e8:8e:17:2c:c6: 75:7b:b0:34:1a:37:18:4a:ff:df:9f:33:04:82:e8:71: 3c:b8:1c:f2:a7:8b:05:bf:53:58:38:f9:12:ad:80:d5: b9:07:79:f4:0e:22:7b:56:02:8c:74:d3:c0:9c:d3:f3: 21:66:79:78:ad:02:38:09:68:ab:81:92:40:a7:b7:79: 37:df:73:e9:c9:d7:c7:2a:95:0c:ab:da:c1:1b:c9:63: a7:5a:32:c4:df:8a:4b:e4:b9:d3:02:13:c8:73:00:7c: fd:07:e5:a6:49:65:9a:8a:74:89:e9:ed:67:7e:d0:ce: 29:48:d1:94:50:0d:75:20:92:ff:99:5f:92:63:6e:a4: bb:7a:5e:13:83:03:75:b9:0d:25:78:12:83:f8:2e:87: 2b:b4:68:ad:e2:26:7d:82:26:e8:d3:18:de:49:1b:10: 35:b8:9e:a0:cc:3b:23:c4:5b:ff:45:64:bb:8e:40:df: 42:6e:c9:ca:53:89:ec:2a:a4:f0:ab:e4:59:c3:c9:f0: 90:5c:38:6c:4e:d3:d5:53:aa:28:32:4b:f7:a6:c2:5a: 29:ea:ea:56:9d:22:08:bc:af:fb:7e:cf:eb:7a:f4:30 Fingerprint (SHA-256): EE:D0:E4:CF:A3:BB:35:07:F9:E9:1E:31:97:0D:79:C6:60:3A:F7:5B:51:7E:89:2A:6B:19:E6:67:8F:DA:1B:F5 Fingerprint (SHA1): B5:08:DD:60:1E:A7:C6:E3:79:43:5C:26:86:65:53:67:37:A3:AD:19 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #15140: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182068 (0x672ba34) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Sat Jan 09 00:15:07 2016 Not After : Sat Jan 09 00:15:07 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:31:ee:23:af:77:f2:83:d8:2e:e1:cd:ca:c9:f5:5f: 9c:75:c1:9a:12:3b:37:3d:11:df:0b:3d:29:6e:98:34: a4:b6:f9:3e:1e:07:42:c6:e0:1e:41:13:f1:8e:b1:9a: 95:99:17:f6:c5:3b:01:45:b5:65:a1:f0:1e:6a:36:64: 79:41:ed:ed:36:c8:d3:87:c8:2c:c1:fb:e3:3f:a7:70: cf:16:f4:d0:5b:ec:eb:6f:f7:44:1f:e5:e3:5f:c6:4b: de:e9:f2:f9:f6:eb:55:2a:77:01:31:cf:36:94:e3:13: e5:96:dd:28:a6:e5:87:75:43:bf:88:f3:34:d4:af:27: 2f:0f:fa:29:20:4a:75:c4:38:9e:88:0b:a4:81:36:c3: 1d:1c:bf:02:ff:f4:14:dd:c7:b8:7f:4a:aa:50:8e:9b: 48:b4:7f:f1:07:39:a9:6d:ab:81:54:4c:0c:3d:89:39: c7:d1:70:5c:44:d5:5b:2a:a2:6d:e0:5f:4b:54:10:9d: 8b:58:88:b0:f3:fb:5b:ca:56:43:07:fd:e2:ef:67:5c: 49:7c:f5:9f:50:b6:ac:f5:df:2d:e3:53:b2:5e:7f:b6: d6:32:5c:67:55:97:a1:47:6b:f1:46:9f:03:bf:c1:32: ee:a9:cc:c3:44:50:38:1a:59:ab:f4:ef:ee:49:e8:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:51:dd:b9:37:f7:62:0b:53:e5:1c:17:7f:6a:65:23: 73:2d:a3:4d:5e:db:fd:48:ec:e4:9d:e8:8e:17:2c:c6: 75:7b:b0:34:1a:37:18:4a:ff:df:9f:33:04:82:e8:71: 3c:b8:1c:f2:a7:8b:05:bf:53:58:38:f9:12:ad:80:d5: b9:07:79:f4:0e:22:7b:56:02:8c:74:d3:c0:9c:d3:f3: 21:66:79:78:ad:02:38:09:68:ab:81:92:40:a7:b7:79: 37:df:73:e9:c9:d7:c7:2a:95:0c:ab:da:c1:1b:c9:63: a7:5a:32:c4:df:8a:4b:e4:b9:d3:02:13:c8:73:00:7c: fd:07:e5:a6:49:65:9a:8a:74:89:e9:ed:67:7e:d0:ce: 29:48:d1:94:50:0d:75:20:92:ff:99:5f:92:63:6e:a4: bb:7a:5e:13:83:03:75:b9:0d:25:78:12:83:f8:2e:87: 2b:b4:68:ad:e2:26:7d:82:26:e8:d3:18:de:49:1b:10: 35:b8:9e:a0:cc:3b:23:c4:5b:ff:45:64:bb:8e:40:df: 42:6e:c9:ca:53:89:ec:2a:a4:f0:ab:e4:59:c3:c9:f0: 90:5c:38:6c:4e:d3:d5:53:aa:28:32:4b:f7:a6:c2:5a: 29:ea:ea:56:9d:22:08:bc:af:fb:7e:cf:eb:7a:f4:30 Fingerprint (SHA-256): EE:D0:E4:CF:A3:BB:35:07:F9:E9:1E:31:97:0D:79:C6:60:3A:F7:5B:51:7E:89:2A:6B:19:E6:67:8F:DA:1B:F5 Fingerprint (SHA1): B5:08:DD:60:1E:A7:C6:E3:79:43:5C:26:86:65:53:67:37:A3:AD:19 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #15141: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #15142: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108182075 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15143: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #15144: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #15145: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108182076 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15146: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #15147: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #15148: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15149: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 108182077 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15150: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15151: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #15152: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15153: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 108182078 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15154: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15155: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #15156: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15157: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 108182079 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #15158: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15159: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 108182080 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #15160: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15161: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #15162: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #15163: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15164: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 108182081 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15165: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15166: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #15167: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15168: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 108182082 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15169: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15170: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #15171: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15172: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108182083 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15173: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15174: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #15175: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15176: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108182084 --extCP < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15177: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15178: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15179: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182075 (0x672ba3b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Sat Jan 09 00:16:08 2016 Not After : Sat Jan 09 00:16:08 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:45:bd:c3:77:5d:c4:5c:3e:f0:53:16:bf:58:63:59: 75:4b:48:0e:26:a2:83:2a:94:cc:c4:94:24:44:29:fa: d8:d9:76:c6:9a:fc:aa:06:0e:b7:d9:88:f4:a3:21:b7: 3f:1e:38:88:97:48:a0:de:b5:2f:a1:fc:ed:2c:a5:bf: 99:8b:38:af:f6:7e:42:53:31:57:54:56:3d:e5:91:86: 72:92:05:3a:5a:f0:64:3f:ce:32:a7:4c:90:3d:b3:66: ff:9b:51:cb:b3:a7:84:66:a3:9a:b5:57:72:ce:98:8a: f8:7f:14:b0:88:5c:fa:34:eb:a0:ce:62:40:22:fa:33: 0f:2e:3b:c6:48:31:6e:fe:90:6a:7d:a5:3c:24:3a:25: 70:b9:70:ad:bc:c0:7a:4e:41:66:90:10:6e:bb:e5:1c: 9e:28:32:3d:dc:24:e9:aa:78:05:ef:79:55:b5:0a:b9: 84:2c:6e:ab:e5:8a:4e:06:f7:1a:9d:50:a2:42:9e:61: 18:c8:4f:dc:4f:e0:95:c8:c6:a4:ca:c4:30:0a:9f:bb: 93:c0:34:58:29:46:e8:d3:f2:d6:9f:7d:3c:f7:57:fa: 2f:2b:da:a1:e3:9f:95:81:c6:d8:85:65:b3:ab:52:1f: 5c:20:90:d3:44:3e:ff:d3:90:08:e8:74:71:8f:2d:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:ed:0e:a0:c6:1d:27:19:64:2b:da:2d:73:21:49:6e: 0f:ff:35:05:1d:81:40:48:cd:01:4e:cb:6a:1c:a4:7a: c2:66:37:26:c3:ec:af:ed:e2:71:2b:eb:9b:55:84:93: 7a:86:c6:4d:12:98:d8:40:ec:c2:f2:75:ed:4f:cd:a1: da:3b:d5:f7:10:51:da:fc:d4:e9:5e:36:23:e4:e1:d6: f5:95:ba:91:8f:50:82:1d:c5:f4:19:a4:d9:e6:01:cc: d8:70:eb:9a:d6:2b:6b:1e:22:23:74:41:99:0d:93:f6: 19:2b:3c:b2:86:2e:68:a1:04:27:eb:de:21:43:9e:33: 00:1a:44:78:dc:a7:af:f8:b4:ca:c3:9c:78:15:c6:d6: 1f:9a:c8:ef:74:1a:55:9f:ed:a8:50:9d:a7:e9:bd:f2: a7:b0:e4:9d:46:d7:8f:d6:05:e2:da:bd:96:42:43:87: be:5a:33:0f:30:a6:67:b4:a5:6e:b7:8b:59:b9:53:b7: 87:06:70:98:4c:6e:9f:a5:04:1f:09:b8:57:bb:03:7d: 74:a1:4b:e9:62:b4:49:e6:01:d9:76:5d:ea:75:ac:28: 42:25:92:29:31:4f:ef:b1:90:19:71:d2:36:2c:f0:53: dd:98:1f:1e:64:53:34:56:12:7a:e9:93:15:1c:d5:ff Fingerprint (SHA-256): 89:FA:BB:24:66:09:C2:25:1F:07:C2:B3:77:36:22:62:FF:1C:E3:1B:7B:5D:3A:4D:E8:2A:35:7B:EF:4F:0E:78 Fingerprint (SHA1): B9:E6:F4:54:7F:28:C4:1F:0C:34:74:0A:4C:D8:20:A3:B6:F1:6C:E9 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #15180: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15181: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15182: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15183: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15184: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15185: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15186: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15187: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15188: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182076 (0x672ba3c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Sat Jan 09 00:16:19 2016 Not After : Sat Jan 09 00:16:19 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ed:60:48:94:fa:2c:1d:2b:01:ac:72:d3:64:ac:af:76: 4a:a5:32:f4:5e:fb:91:ec:ad:7a:56:80:d0:04:39:64: 9c:c0:f6:ba:68:c6:78:b8:3d:e1:77:a1:a8:77:a5:bf: c5:2f:45:a6:fa:aa:db:39:52:36:14:90:fa:9e:9b:fd: 48:1e:da:99:36:9a:ab:92:83:8d:3b:0d:cd:0f:57:b7: 7b:5f:6d:95:63:78:ac:77:ae:db:71:72:9d:f5:55:35: 76:83:ca:14:d7:6f:49:c7:e1:49:6d:e1:0e:28:92:3e: 29:1c:e1:a8:6e:b3:3d:ca:03:b8:26:73:f7:7d:3d:7d: 51:23:0e:12:87:70:05:8c:ca:68:eb:b5:27:11:90:c7: 00:f9:c6:1b:3c:4d:f9:0b:10:ab:c5:94:bc:2d:e5:e2: 6a:0f:f4:b7:d5:3b:ad:8a:4e:2a:16:9b:84:da:69:7b: 02:82:08:49:c7:32:cb:5c:28:ad:b3:93:ae:7e:3e:89: 1a:a6:4e:37:03:75:46:fd:4a:aa:41:31:80:2a:ef:c0: 74:bb:24:84:06:9b:c9:70:14:19:5c:c1:09:ad:c7:3d: 72:6e:cf:2f:0a:d3:4a:b6:59:d4:82:ed:78:be:be:6a: 55:7f:ab:2f:28:22:97:ee:3e:33:18:c7:3e:e1:d2:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 86:2b:67:e0:29:c2:1a:87:79:f9:ea:4b:89:28:2c:72: 30:7e:a1:3e:3c:cb:68:af:5a:49:c2:ba:ac:ba:3b:5e: 9e:1f:82:6f:94:0a:96:70:bb:71:4a:2d:40:ca:0e:0f: d6:4c:a6:9a:aa:64:32:94:7e:1d:8f:98:ec:f7:a3:5e: dd:47:38:de:28:a8:f8:e1:66:88:6d:94:a8:d0:91:2c: 58:d6:60:88:f6:be:fc:83:45:01:32:32:e6:28:60:01: 33:27:26:16:88:60:ff:8d:76:53:90:3c:14:f6:d0:8c: 23:4d:48:45:1c:5d:ab:db:a6:cd:72:3d:59:5e:4c:bf: 36:07:98:e0:29:6b:25:fa:53:8b:18:ba:d8:e5:31:a5: 33:33:4c:2f:8f:a4:98:2a:d8:2c:a9:a5:04:97:de:19: 49:95:42:2b:64:23:33:3d:e3:d1:e5:e3:a7:ec:e5:43: 4b:3d:a4:36:d5:1d:ed:ab:21:27:99:04:e0:d1:ab:6f: ea:09:97:6c:2e:5e:d0:0e:39:8e:a7:ce:02:8d:c8:02: e4:ec:6f:8b:b4:ef:f0:91:50:b3:ee:6f:cc:9e:49:74: 2c:dc:ff:47:0e:24:5b:40:f8:c7:95:18:36:a7:68:b6: cd:cd:d2:96:69:7d:42:bf:43:88:f3:5c:fa:ec:0e:fe Fingerprint (SHA-256): 08:66:E0:9B:D5:AF:6A:03:4F:7C:5A:DE:14:2A:1F:CC:4C:19:B3:10:27:7A:CA:64:B2:77:0A:B8:8F:7B:90:D9 Fingerprint (SHA1): 05:37:69:82:39:42:5D:4C:17:C0:1A:2C:6F:7E:8C:85:98:C8:1F:60 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #15189: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15190: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15191: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15192: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15193: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15194: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #15195: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #15196: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #15197: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #15198: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #15199: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #15200: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #15201: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #15202: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #15203: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #15204: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.114412.1.1 /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=paypal.com,OU=PayPal Production,O="PayPal, Inc.",L =San Jose,ST=California,C=US" Certificate 2 Subject: "CN=DigiCert SHA2 High Assurance Server CA,OU=www.digi cert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #15205: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #15206: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #15207: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108182085 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15208: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #15209: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #15210: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15211: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 108182086 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15212: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15213: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #15214: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15215: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 108182087 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15216: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15217: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #15218: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15219: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 108182088 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15220: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15221: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #15222: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15223: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 108182089 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15224: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15225: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #15226: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15227: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 108182090 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15228: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15229: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #15230: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15231: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 108182091 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15232: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15233: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #15234: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15235: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 108182092 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15236: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15237: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #15238: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15239: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 108182093 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15240: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15241: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #15242: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182085 (0x672ba45) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Sat Jan 09 00:18:13 2016 Not After : Sat Jan 09 00:18:13 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 0b:8a:63:0c:5d:b9:d7:e4:bd:a4:bb:a7:4c:80:dc:6f: bc:a7:5a:ae:a8:76:3c:77:23:ab:0a:0a:14:8f:85:e8: e8:31:15:93:f1:02:53:ca:ee:35:a6:31:32:3c:98:bc: 03:dc:68:23:f6:00:30:5a:d6:55:0a:e0:08:74:8d:7b: 1b:a0:fe:97:52:1e:76:04:be:ec:f3:03:ed:cb:0d:24: 19:df:a3:e4:ce:58:7c:f2:c3:9c:c9:ec:9c:25:ae:2f: 41:4f:f0:3c:eb:51:ae:d0:72:da:e7:83:1e:53:51:f5: eb:74:ec:e3:f6:63:c9:da:28:cd:62:9a:85:4e:68:84: 79:5d:99:0a:f8:a2:42:11:5f:a2:7c:aa:76:3c:59:a8: c9:98:3c:36:1f:4a:93:b4:4f:2d:e2:b9:4d:a8:6a:14: 88:d2:42:79:83:b5:35:ec:20:eb:dd:49:e9:7b:cc:a6: 18:80:a5:d8:bb:a7:73:1f:97:2a:fc:a3:44:7d:ad:af: 2f:33:6c:69:b2:3d:de:c4:70:1c:57:57:96:ec:8d:64: 1a:14:ea:f2:e7:f3:c1:67:a5:b8:79:22:f8:15:58:14: 49:15:41:37:0d:b7:f9:88:ca:8a:e7:64:62:39:d7:0b: f5:39:86:e5:10:1b:5e:a2:12:32:60:12:13:ff:f7:35 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:53:b8:e0:73:54:28:4c:6f:5e:74:37:69: 72:d8:9e:85:31:29:b7:c1:c6:01:83:af:f4:0b:f4:13: 02:1d:00:ca:49:a1:6f:9c:8f:cb:16:57:ae:06:f9:ff: 35:9b:fb:4a:1b:05:e3:16:c6:bd:34:a2:b3:d9:bb Fingerprint (SHA-256): 20:7E:E2:93:6E:71:6C:9C:28:2F:26:75:74:83:1A:20:FF:EE:9C:F2:F9:1B:C9:BF:3B:C5:B0:F2:53:4C:8E:6F Fingerprint (SHA1): 66:20:4D:8C:91:8E:60:54:FF:1F:07:02:AF:C0:C3:D2:5C:8F:3A:43 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15243: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182085 (0x672ba45) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Sat Jan 09 00:18:13 2016 Not After : Sat Jan 09 00:18:13 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 0b:8a:63:0c:5d:b9:d7:e4:bd:a4:bb:a7:4c:80:dc:6f: bc:a7:5a:ae:a8:76:3c:77:23:ab:0a:0a:14:8f:85:e8: e8:31:15:93:f1:02:53:ca:ee:35:a6:31:32:3c:98:bc: 03:dc:68:23:f6:00:30:5a:d6:55:0a:e0:08:74:8d:7b: 1b:a0:fe:97:52:1e:76:04:be:ec:f3:03:ed:cb:0d:24: 19:df:a3:e4:ce:58:7c:f2:c3:9c:c9:ec:9c:25:ae:2f: 41:4f:f0:3c:eb:51:ae:d0:72:da:e7:83:1e:53:51:f5: eb:74:ec:e3:f6:63:c9:da:28:cd:62:9a:85:4e:68:84: 79:5d:99:0a:f8:a2:42:11:5f:a2:7c:aa:76:3c:59:a8: c9:98:3c:36:1f:4a:93:b4:4f:2d:e2:b9:4d:a8:6a:14: 88:d2:42:79:83:b5:35:ec:20:eb:dd:49:e9:7b:cc:a6: 18:80:a5:d8:bb:a7:73:1f:97:2a:fc:a3:44:7d:ad:af: 2f:33:6c:69:b2:3d:de:c4:70:1c:57:57:96:ec:8d:64: 1a:14:ea:f2:e7:f3:c1:67:a5:b8:79:22:f8:15:58:14: 49:15:41:37:0d:b7:f9:88:ca:8a:e7:64:62:39:d7:0b: f5:39:86:e5:10:1b:5e:a2:12:32:60:12:13:ff:f7:35 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:53:b8:e0:73:54:28:4c:6f:5e:74:37:69: 72:d8:9e:85:31:29:b7:c1:c6:01:83:af:f4:0b:f4:13: 02:1d:00:ca:49:a1:6f:9c:8f:cb:16:57:ae:06:f9:ff: 35:9b:fb:4a:1b:05:e3:16:c6:bd:34:a2:b3:d9:bb Fingerprint (SHA-256): 20:7E:E2:93:6E:71:6C:9C:28:2F:26:75:74:83:1A:20:FF:EE:9C:F2:F9:1B:C9:BF:3B:C5:B0:F2:53:4C:8E:6F Fingerprint (SHA1): 66:20:4D:8C:91:8E:60:54:FF:1F:07:02:AF:C0:C3:D2:5C:8F:3A:43 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #15244: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182085 (0x672ba45) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Sat Jan 09 00:18:13 2016 Not After : Sat Jan 09 00:18:13 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 0b:8a:63:0c:5d:b9:d7:e4:bd:a4:bb:a7:4c:80:dc:6f: bc:a7:5a:ae:a8:76:3c:77:23:ab:0a:0a:14:8f:85:e8: e8:31:15:93:f1:02:53:ca:ee:35:a6:31:32:3c:98:bc: 03:dc:68:23:f6:00:30:5a:d6:55:0a:e0:08:74:8d:7b: 1b:a0:fe:97:52:1e:76:04:be:ec:f3:03:ed:cb:0d:24: 19:df:a3:e4:ce:58:7c:f2:c3:9c:c9:ec:9c:25:ae:2f: 41:4f:f0:3c:eb:51:ae:d0:72:da:e7:83:1e:53:51:f5: eb:74:ec:e3:f6:63:c9:da:28:cd:62:9a:85:4e:68:84: 79:5d:99:0a:f8:a2:42:11:5f:a2:7c:aa:76:3c:59:a8: c9:98:3c:36:1f:4a:93:b4:4f:2d:e2:b9:4d:a8:6a:14: 88:d2:42:79:83:b5:35:ec:20:eb:dd:49:e9:7b:cc:a6: 18:80:a5:d8:bb:a7:73:1f:97:2a:fc:a3:44:7d:ad:af: 2f:33:6c:69:b2:3d:de:c4:70:1c:57:57:96:ec:8d:64: 1a:14:ea:f2:e7:f3:c1:67:a5:b8:79:22:f8:15:58:14: 49:15:41:37:0d:b7:f9:88:ca:8a:e7:64:62:39:d7:0b: f5:39:86:e5:10:1b:5e:a2:12:32:60:12:13:ff:f7:35 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:53:b8:e0:73:54:28:4c:6f:5e:74:37:69: 72:d8:9e:85:31:29:b7:c1:c6:01:83:af:f4:0b:f4:13: 02:1d:00:ca:49:a1:6f:9c:8f:cb:16:57:ae:06:f9:ff: 35:9b:fb:4a:1b:05:e3:16:c6:bd:34:a2:b3:d9:bb Fingerprint (SHA-256): 20:7E:E2:93:6E:71:6C:9C:28:2F:26:75:74:83:1A:20:FF:EE:9C:F2:F9:1B:C9:BF:3B:C5:B0:F2:53:4C:8E:6F Fingerprint (SHA1): 66:20:4D:8C:91:8E:60:54:FF:1F:07:02:AF:C0:C3:D2:5C:8F:3A:43 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #15245: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182085 (0x672ba45) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Sat Jan 09 00:18:13 2016 Not After : Sat Jan 09 00:18:13 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 0b:8a:63:0c:5d:b9:d7:e4:bd:a4:bb:a7:4c:80:dc:6f: bc:a7:5a:ae:a8:76:3c:77:23:ab:0a:0a:14:8f:85:e8: e8:31:15:93:f1:02:53:ca:ee:35:a6:31:32:3c:98:bc: 03:dc:68:23:f6:00:30:5a:d6:55:0a:e0:08:74:8d:7b: 1b:a0:fe:97:52:1e:76:04:be:ec:f3:03:ed:cb:0d:24: 19:df:a3:e4:ce:58:7c:f2:c3:9c:c9:ec:9c:25:ae:2f: 41:4f:f0:3c:eb:51:ae:d0:72:da:e7:83:1e:53:51:f5: eb:74:ec:e3:f6:63:c9:da:28:cd:62:9a:85:4e:68:84: 79:5d:99:0a:f8:a2:42:11:5f:a2:7c:aa:76:3c:59:a8: c9:98:3c:36:1f:4a:93:b4:4f:2d:e2:b9:4d:a8:6a:14: 88:d2:42:79:83:b5:35:ec:20:eb:dd:49:e9:7b:cc:a6: 18:80:a5:d8:bb:a7:73:1f:97:2a:fc:a3:44:7d:ad:af: 2f:33:6c:69:b2:3d:de:c4:70:1c:57:57:96:ec:8d:64: 1a:14:ea:f2:e7:f3:c1:67:a5:b8:79:22:f8:15:58:14: 49:15:41:37:0d:b7:f9:88:ca:8a:e7:64:62:39:d7:0b: f5:39:86:e5:10:1b:5e:a2:12:32:60:12:13:ff:f7:35 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:53:b8:e0:73:54:28:4c:6f:5e:74:37:69: 72:d8:9e:85:31:29:b7:c1:c6:01:83:af:f4:0b:f4:13: 02:1d:00:ca:49:a1:6f:9c:8f:cb:16:57:ae:06:f9:ff: 35:9b:fb:4a:1b:05:e3:16:c6:bd:34:a2:b3:d9:bb Fingerprint (SHA-256): 20:7E:E2:93:6E:71:6C:9C:28:2F:26:75:74:83:1A:20:FF:EE:9C:F2:F9:1B:C9:BF:3B:C5:B0:F2:53:4C:8E:6F Fingerprint (SHA1): 66:20:4D:8C:91:8E:60:54:FF:1F:07:02:AF:C0:C3:D2:5C:8F:3A:43 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #15246: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #15247: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 10 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15248: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #15249: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #15250: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15251: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15252: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15253: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #15254: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15255: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15256: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15257: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #15258: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15259: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15260: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15261: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #15262: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15263: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15264: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15265: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #15266: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15267: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15268: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15269: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #15270: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15271: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15272: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15273: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160109002029Z nextupdate=20170109002029Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Sat Jan 09 00:20:29 2016 Next Update: Mon Jan 09 00:20:29 2017 CRL Extensions: chains.sh: #15274: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160109002030Z nextupdate=20170109002030Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Sat Jan 09 00:20:30 2016 Next Update: Mon Jan 09 00:20:30 2017 CRL Extensions: chains.sh: #15275: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160109002031Z nextupdate=20170109002031Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Sat Jan 09 00:20:31 2016 Next Update: Mon Jan 09 00:20:31 2017 CRL Extensions: chains.sh: #15276: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160109002031Z nextupdate=20170109002031Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Sat Jan 09 00:20:31 2016 Next Update: Mon Jan 09 00:20:31 2017 CRL Extensions: chains.sh: #15277: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160109002032Z addcert 14 20160109002032Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Sat Jan 09 00:20:32 2016 Next Update: Mon Jan 09 00:20:31 2017 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Sat Jan 09 00:20:32 2016 CRL Extensions: chains.sh: #15278: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160109002033Z addcert 15 20160109002033Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Sat Jan 09 00:20:33 2016 Next Update: Mon Jan 09 00:20:30 2017 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Sat Jan 09 00:20:33 2016 CRL Extensions: chains.sh: #15279: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #15280: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15281: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #15282: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #15283: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #15284: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #15285: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #15286: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #15287: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #15288: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Sat Jan 09 00:19:23 2016 Not After : Sat Jan 09 00:19:23 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:ae:37:dc:3b:92:86:27:a8:f9:0e:bb:82:3a:4a:2a: de:48:d0:ac:b9:61:4e:05:eb:f6:04:e5:ed:a0:71:4f: 98:c3:57:2e:73:27:4a:73:18:60:81:60:b6:d0:37:21: 75:00:0a:60:82:11:ad:a9:63:44:72:0c:f3:c7:df:a7: d1:dd:0f:6b:c0:4a:02:0f:8a:91:30:7e:7a:5a:f0:22: 90:d2:3d:24:1f:38:32:8b:ad:14:95:bb:12:39:d0:d7: 77:31:41:aa:0c:7c:d3:9a:c5:eb:0e:06:12:e3:d3:29: b6:6b:37:e9:82:6c:76:a9:4f:82:34:b2:41:6b:28:ee: 42:87:b6:46:3a:03:3d:e8:85:d0:f0:0f:29:c7:62:9b: 53:a9:3e:44:cb:c7:f7:02:b2:fa:99:3d:ff:87:04:e2: 95:3c:1e:9f:03:c4:98:4a:43:1a:46:73:06:42:d2:20: 11:dd:e4:d8:94:65:85:2f:15:5e:ab:59:90:a7:72:2f: 2e:ca:b0:5a:35:05:4c:fe:f3:15:d3:6c:4a:75:95:cd: 66:30:45:84:09:32:2c:8c:f8:e8:d0:40:83:32:e5:b8: d7:ac:c3:5c:93:64:49:2d:2b:da:9c:61:da:33:37:e9: 69:4f:5e:a9:d0:82:3a:09:08:3e:60:fc:80:bb:8d:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:26:6e:fd:3f:3b:bf:4f:1e:1b:a5:53:d1:06:60:01: 6b:80:aa:f5:28:37:a2:18:c1:2d:e1:e8:6c:d3:78:ea: 3e:76:e9:89:1d:ca:6f:19:01:49:82:69:b0:a6:e2:a0: 02:1e:34:56:0d:53:48:23:99:91:67:58:b0:85:d6:19: 64:8a:3c:81:30:74:4e:5a:dd:b2:75:fb:80:13:9d:41: c0:bb:6a:68:f3:86:c7:b0:32:d5:fa:c5:c4:15:d6:69: ff:ea:1c:f2:70:08:63:f4:b3:56:79:25:f5:9f:d9:39: 7c:6f:14:59:41:c3:4d:4f:06:6d:0d:10:cb:ce:8d:db: d6:cf:98:12:5a:51:b3:58:95:71:61:aa:51:62:4b:8e: f9:d6:21:93:3b:8b:ac:d9:a3:19:66:df:3d:14:ec:37: ee:cb:cd:d8:38:45:9f:a0:9c:99:31:20:92:31:35:dd: 3a:7d:6a:73:3b:ad:e4:08:40:09:61:20:fb:66:68:ae: 54:7c:a9:15:f9:2a:8b:80:9f:c0:5f:e2:19:26:f8:c2: 02:3c:1f:c7:46:1f:9b:31:98:93:91:4f:26:3a:01:88: 44:3c:80:44:58:b2:34:c1:f1:fa:45:e6:a4:d7:a5:04: ba:5a:dd:1d:e4:04:61:61:c5:ad:28:89:c9:ce:6d:31 Fingerprint (SHA-256): 75:13:F4:95:3E:F0:CA:87:4F:80:1A:DF:C6:F2:2A:61:BD:8F:B8:51:5B:00:4F:3F:C5:DD:05:F8:8E:DE:03:D9 Fingerprint (SHA1): 3C:29:1D:50:9C:51:C7:EC:CB:5E:F0:77:1C:70:55:30:DC:A5:8C:B9 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #15289: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #15290: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Sat Jan 09 00:19:23 2016 Not After : Sat Jan 09 00:19:23 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:ae:37:dc:3b:92:86:27:a8:f9:0e:bb:82:3a:4a:2a: de:48:d0:ac:b9:61:4e:05:eb:f6:04:e5:ed:a0:71:4f: 98:c3:57:2e:73:27:4a:73:18:60:81:60:b6:d0:37:21: 75:00:0a:60:82:11:ad:a9:63:44:72:0c:f3:c7:df:a7: d1:dd:0f:6b:c0:4a:02:0f:8a:91:30:7e:7a:5a:f0:22: 90:d2:3d:24:1f:38:32:8b:ad:14:95:bb:12:39:d0:d7: 77:31:41:aa:0c:7c:d3:9a:c5:eb:0e:06:12:e3:d3:29: b6:6b:37:e9:82:6c:76:a9:4f:82:34:b2:41:6b:28:ee: 42:87:b6:46:3a:03:3d:e8:85:d0:f0:0f:29:c7:62:9b: 53:a9:3e:44:cb:c7:f7:02:b2:fa:99:3d:ff:87:04:e2: 95:3c:1e:9f:03:c4:98:4a:43:1a:46:73:06:42:d2:20: 11:dd:e4:d8:94:65:85:2f:15:5e:ab:59:90:a7:72:2f: 2e:ca:b0:5a:35:05:4c:fe:f3:15:d3:6c:4a:75:95:cd: 66:30:45:84:09:32:2c:8c:f8:e8:d0:40:83:32:e5:b8: d7:ac:c3:5c:93:64:49:2d:2b:da:9c:61:da:33:37:e9: 69:4f:5e:a9:d0:82:3a:09:08:3e:60:fc:80:bb:8d:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:26:6e:fd:3f:3b:bf:4f:1e:1b:a5:53:d1:06:60:01: 6b:80:aa:f5:28:37:a2:18:c1:2d:e1:e8:6c:d3:78:ea: 3e:76:e9:89:1d:ca:6f:19:01:49:82:69:b0:a6:e2:a0: 02:1e:34:56:0d:53:48:23:99:91:67:58:b0:85:d6:19: 64:8a:3c:81:30:74:4e:5a:dd:b2:75:fb:80:13:9d:41: c0:bb:6a:68:f3:86:c7:b0:32:d5:fa:c5:c4:15:d6:69: ff:ea:1c:f2:70:08:63:f4:b3:56:79:25:f5:9f:d9:39: 7c:6f:14:59:41:c3:4d:4f:06:6d:0d:10:cb:ce:8d:db: d6:cf:98:12:5a:51:b3:58:95:71:61:aa:51:62:4b:8e: f9:d6:21:93:3b:8b:ac:d9:a3:19:66:df:3d:14:ec:37: ee:cb:cd:d8:38:45:9f:a0:9c:99:31:20:92:31:35:dd: 3a:7d:6a:73:3b:ad:e4:08:40:09:61:20:fb:66:68:ae: 54:7c:a9:15:f9:2a:8b:80:9f:c0:5f:e2:19:26:f8:c2: 02:3c:1f:c7:46:1f:9b:31:98:93:91:4f:26:3a:01:88: 44:3c:80:44:58:b2:34:c1:f1:fa:45:e6:a4:d7:a5:04: ba:5a:dd:1d:e4:04:61:61:c5:ad:28:89:c9:ce:6d:31 Fingerprint (SHA-256): 75:13:F4:95:3E:F0:CA:87:4F:80:1A:DF:C6:F2:2A:61:BD:8F:B8:51:5B:00:4F:3F:C5:DD:05:F8:8E:DE:03:D9 Fingerprint (SHA1): 3C:29:1D:50:9C:51:C7:EC:CB:5E:F0:77:1C:70:55:30:DC:A5:8C:B9 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #15291: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #15292: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #15293: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108182094 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15294: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #15295: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #15296: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15297: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 108182095 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15298: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15299: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #15300: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9169/localhost-27064-CA0-108181866.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #15301: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0Root-108181840.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #15302: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15303: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #15304: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0-108181866.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #15305: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 108182096 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15306: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15307: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #15308: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9169/localhost-27064-CA0-108181866.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #15309: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0Root-108181841.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #15310: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15311: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #15312: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15313: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 108182097 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15314: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15315: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #15316: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0-108181866.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #15317: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0Root-108181842.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #15318: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15319: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #15320: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0-108181866.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #15321: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9169/localhost-27064-CA0Root-108181843.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #15322: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15323: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160109002228Z nextupdate=20170109002228Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Sat Jan 09 00:22:28 2016 Next Update: Mon Jan 09 00:22:28 2017 CRL Extensions: chains.sh: #15324: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160109002228Z nextupdate=20170109002228Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Sat Jan 09 00:22:28 2016 Next Update: Mon Jan 09 00:22:28 2017 CRL Extensions: chains.sh: #15325: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160109002229Z nextupdate=20170109002229Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Sat Jan 09 00:22:29 2016 Next Update: Mon Jan 09 00:22:29 2017 CRL Extensions: chains.sh: #15326: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160109002230Z nextupdate=20170109002230Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Sat Jan 09 00:22:30 2016 Next Update: Mon Jan 09 00:22:30 2017 CRL Extensions: chains.sh: #15327: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160109002231Z addcert 20 20160109002231Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Sat Jan 09 00:22:31 2016 Next Update: Mon Jan 09 00:22:28 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Sat Jan 09 00:22:31 2016 CRL Extensions: chains.sh: #15328: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160109002232Z addcert 40 20160109002232Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Sat Jan 09 00:22:32 2016 Next Update: Mon Jan 09 00:22:28 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Sat Jan 09 00:22:31 2016 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Sat Jan 09 00:22:32 2016 CRL Extensions: chains.sh: #15329: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #15330: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15331: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #15332: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182094 (0x672ba4e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Sat Jan 09 00:21:02 2016 Not After : Sat Jan 09 00:21:02 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f5:3a:31:8c:d6:b0:15:a4:1d:93:59:6b:c7:61:45:8d: 9b:c2:b7:cd:09:67:cf:73:e6:3c:43:c2:5b:76:40:bd: c9:06:aa:fc:67:c3:57:73:78:0d:20:2b:ef:a8:54:c8: 30:fd:03:3c:58:49:70:f9:47:ec:77:49:5b:a8:ff:2c: 2d:7a:ed:61:79:18:75:96:ee:53:d1:52:d2:13:f8:98: 72:29:b2:60:68:63:0a:68:f7:34:73:81:da:78:d9:85: a1:d6:ad:41:55:5f:87:d1:c2:b4:c7:27:16:5f:15:ad: 9b:c4:f0:f5:11:36:04:f7:a3:64:c0:f9:6f:e4:d8:79: e9:a6:5c:8e:e9:b0:00:39:c8:c7:ad:c0:89:75:95:8b: 00:32:f9:26:ba:3a:2c:d6:38:f8:3e:41:8c:cc:03:eb: 14:7b:21:0f:c1:93:fa:8d:02:0d:6a:19:d4:83:24:3d: 68:41:02:a1:4a:4e:52:c3:87:f8:7c:cb:48:9f:a0:bb: 10:f0:b8:24:6b:4a:5d:f1:35:66:6d:75:aa:53:07:00: 2e:17:22:b4:07:be:49:b7:31:eb:50:ef:b8:20:8e:b2: 6b:c9:88:6c:dd:8a:16:d6:1e:13:7e:9d:f4:f3:b4:be: 0b:a4:36:64:ba:7b:d8:39:46:40:2a:64:fe:98:68:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:c0:88:6a:e5:fb:a3:82:81:c1:df:9d:5a:9e:c8:44: 20:e5:21:22:62:39:af:3a:34:5f:6a:45:ec:9b:06:c5: fd:a4:46:3f:0d:68:48:a5:b4:06:53:56:d9:a4:1d:dc: 33:c1:af:3c:eb:8d:f7:5d:1c:3f:8e:bc:5c:fa:bb:ab: 71:a1:1b:7e:da:b5:2d:48:ad:1c:87:36:bd:16:ad:61: 6d:e5:98:a9:ee:ad:ae:e3:1f:f9:56:ec:79:93:f0:9d: e6:4f:a3:a1:da:81:86:76:c9:37:21:53:7e:c5:d5:a6: f9:ce:d5:86:a4:df:8a:8a:f3:35:6f:53:c9:59:05:48: f9:ca:1b:e2:1b:78:81:f7:37:ce:f7:ee:6a:6c:73:47: c8:75:6b:09:c9:7a:0b:95:6a:3d:d3:6e:5f:d7:a1:2c: 26:08:1b:8b:7d:ba:4b:0e:fb:32:23:0b:d7:f6:fe:20: e3:4d:64:2f:1c:7b:d0:b7:bf:c7:8b:0f:60:d9:16:ce: 3a:5b:83:84:4c:92:d4:05:08:14:81:1a:c0:e4:fd:f4: 43:0c:e5:89:91:65:45:b2:1a:2b:05:86:44:2c:1e:28: 9c:20:30:78:1b:71:ee:42:f7:b8:05:48:1b:25:e8:d8: e8:98:15:5e:d5:30:5e:a4:8a:cd:8e:56:ed:a1:00:81 Fingerprint (SHA-256): CB:86:55:E6:BA:39:AF:D2:97:0F:17:23:CA:95:92:AF:31:45:3C:78:9C:C5:C2:62:9F:D3:65:05:D5:FF:E5:F6 Fingerprint (SHA1): 9A:FB:FA:81:68:BE:E8:86:09:80:C2:86:F2:B1:DA:AD:A3:B5:64:44 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #15333: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #15334: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182094 (0x672ba4e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Sat Jan 09 00:21:02 2016 Not After : Sat Jan 09 00:21:02 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f5:3a:31:8c:d6:b0:15:a4:1d:93:59:6b:c7:61:45:8d: 9b:c2:b7:cd:09:67:cf:73:e6:3c:43:c2:5b:76:40:bd: c9:06:aa:fc:67:c3:57:73:78:0d:20:2b:ef:a8:54:c8: 30:fd:03:3c:58:49:70:f9:47:ec:77:49:5b:a8:ff:2c: 2d:7a:ed:61:79:18:75:96:ee:53:d1:52:d2:13:f8:98: 72:29:b2:60:68:63:0a:68:f7:34:73:81:da:78:d9:85: a1:d6:ad:41:55:5f:87:d1:c2:b4:c7:27:16:5f:15:ad: 9b:c4:f0:f5:11:36:04:f7:a3:64:c0:f9:6f:e4:d8:79: e9:a6:5c:8e:e9:b0:00:39:c8:c7:ad:c0:89:75:95:8b: 00:32:f9:26:ba:3a:2c:d6:38:f8:3e:41:8c:cc:03:eb: 14:7b:21:0f:c1:93:fa:8d:02:0d:6a:19:d4:83:24:3d: 68:41:02:a1:4a:4e:52:c3:87:f8:7c:cb:48:9f:a0:bb: 10:f0:b8:24:6b:4a:5d:f1:35:66:6d:75:aa:53:07:00: 2e:17:22:b4:07:be:49:b7:31:eb:50:ef:b8:20:8e:b2: 6b:c9:88:6c:dd:8a:16:d6:1e:13:7e:9d:f4:f3:b4:be: 0b:a4:36:64:ba:7b:d8:39:46:40:2a:64:fe:98:68:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:c0:88:6a:e5:fb:a3:82:81:c1:df:9d:5a:9e:c8:44: 20:e5:21:22:62:39:af:3a:34:5f:6a:45:ec:9b:06:c5: fd:a4:46:3f:0d:68:48:a5:b4:06:53:56:d9:a4:1d:dc: 33:c1:af:3c:eb:8d:f7:5d:1c:3f:8e:bc:5c:fa:bb:ab: 71:a1:1b:7e:da:b5:2d:48:ad:1c:87:36:bd:16:ad:61: 6d:e5:98:a9:ee:ad:ae:e3:1f:f9:56:ec:79:93:f0:9d: e6:4f:a3:a1:da:81:86:76:c9:37:21:53:7e:c5:d5:a6: f9:ce:d5:86:a4:df:8a:8a:f3:35:6f:53:c9:59:05:48: f9:ca:1b:e2:1b:78:81:f7:37:ce:f7:ee:6a:6c:73:47: c8:75:6b:09:c9:7a:0b:95:6a:3d:d3:6e:5f:d7:a1:2c: 26:08:1b:8b:7d:ba:4b:0e:fb:32:23:0b:d7:f6:fe:20: e3:4d:64:2f:1c:7b:d0:b7:bf:c7:8b:0f:60:d9:16:ce: 3a:5b:83:84:4c:92:d4:05:08:14:81:1a:c0:e4:fd:f4: 43:0c:e5:89:91:65:45:b2:1a:2b:05:86:44:2c:1e:28: 9c:20:30:78:1b:71:ee:42:f7:b8:05:48:1b:25:e8:d8: e8:98:15:5e:d5:30:5e:a4:8a:cd:8e:56:ed:a1:00:81 Fingerprint (SHA-256): CB:86:55:E6:BA:39:AF:D2:97:0F:17:23:CA:95:92:AF:31:45:3C:78:9C:C5:C2:62:9F:D3:65:05:D5:FF:E5:F6 Fingerprint (SHA1): 9A:FB:FA:81:68:BE:E8:86:09:80:C2:86:F2:B1:DA:AD:A3:B5:64:44 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #15335: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #15336: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #15337: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108182098 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15338: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #15339: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #15340: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15341: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 108182099 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15342: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15343: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #15344: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15345: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 108182100 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15346: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15347: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #15348: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15349: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 108182101 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15350: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15351: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #15352: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -m 108182102 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15353: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #15354: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #15355: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15356: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 108182103 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15357: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15358: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #15359: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15360: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 108182104 < /builddir/build/BUILD/nss-3.19.1/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15361: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15362: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #15363: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #15364: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #15365: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182098 (0x672ba52) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Sat Jan 09 00:23:06 2016 Not After : Sat Jan 09 00:23:06 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:2f:ac:92:46:86:6d:d7:cc:d0:7d:d6:72:38:2f:bc: 7c:9b:50:e4:4a:cf:59:20:da:2c:d8:40:5b:02:d4:e8: d9:a0:47:52:53:04:a3:e0:66:17:24:ac:30:12:aa:b1: c0:1d:67:ef:d3:c2:82:86:80:fd:a6:ba:65:25:8d:ee: 45:8f:e7:5b:d8:6f:98:c4:59:a3:53:11:e0:8c:eb:b5: 9a:f7:78:f6:c8:bd:34:6b:28:ab:00:34:0a:5f:e7:88: 1c:c6:0f:5d:1f:9c:f2:f4:64:60:0e:c0:0e:d5:85:0a: c7:a0:e1:09:93:d2:be:53:68:51:68:d0:db:43:4e:e0: 84:6a:8f:ee:78:61:dc:7c:86:32:ce:d8:33:03:28:0b: 4a:fd:76:4e:08:0f:31:11:d9:1d:cf:9f:97:64:66:e6: e9:01:35:6a:e6:ab:36:3c:57:0e:4d:59:50:82:74:1f: b7:03:dd:50:09:8f:99:f3:74:74:0a:09:34:e4:e4:3c: ca:0e:d4:c6:02:14:71:9e:30:ae:75:12:49:d6:e8:3f: 56:ae:56:9f:b5:fd:1c:96:d1:2b:08:7b:a2:cf:00:13: 1c:27:e1:65:f0:08:1a:8e:f9:fa:a1:bb:c1:08:76:85: d2:5c:3c:e5:ab:5c:3e:d2:f9:39:ba:a7:87:0f:70:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:b5:df:ab:78:7f:1f:71:78:d1:72:c2:c5:e4:8f:e1: 78:19:8a:10:04:49:48:ab:5c:69:71:71:4d:15:bf:e9: a3:0d:fd:65:1e:7a:14:c0:bf:e1:03:a0:f6:6b:1c:40: 4d:c1:f1:dc:af:5d:3d:1d:aa:93:47:48:2a:f3:00:3e: ba:33:30:36:22:61:64:af:ec:42:f2:13:1d:cf:89:c4: 15:20:f1:31:a0:da:e0:7b:ad:69:16:45:ed:50:0d:a6: 49:89:6a:92:0d:44:4a:11:1f:72:5e:9a:c6:a8:20:7f: 4a:b9:f7:61:b4:c1:1c:fa:23:e6:56:4f:18:b2:4e:af: 8c:0e:15:b9:32:cf:d2:2d:15:ef:13:3b:0a:3c:e2:87: b5:2a:86:cd:b5:f9:7c:85:ee:c6:cc:b0:3a:8a:63:e0: 9f:3a:3c:57:f5:5a:78:44:75:de:15:61:63:89:b9:e5: 90:ba:33:0e:3e:b0:58:32:63:83:7f:77:9b:d4:39:f0: b9:29:c5:97:07:09:dd:dc:01:66:4d:63:5b:d2:a6:13: ad:57:19:b3:29:f1:3c:b0:15:0a:2f:e0:4c:6f:a9:1f: 2e:68:4e:24:b5:13:ae:42:e4:52:76:3f:9f:2d:9a:e3: 31:c4:fa:8d:ec:85:5d:e9:81:77:31:bd:8e:11:fb:10 Fingerprint (SHA-256): 03:5D:9B:8E:11:C2:A0:4A:E4:71:F8:D9:54:C2:0E:7D:47:E4:92:99:F8:2A:09:0A:46:2C:DC:6F:9D:07:FA:AE Fingerprint (SHA1): 2C:E8:85:2A:43:2D:CF:C9:64:08:66:9B:DE:1B:79:5B:F9:51:A0:7C Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15366: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182100 (0x672ba54) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Sat Jan 09 00:23:31 2016 Not After : Sat Jan 09 00:23:31 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:b3:6a:66:b5:97:8a:70:52:d6:58:45:cd:f5:43:82: 69:f3:08:87:e1:a9:b6:b2:f2:1a:57:f8:4e:3f:82:ef: 65:58:45:6d:cf:83:5c:b9:89:a2:47:dc:50:29:02:4b: f2:34:6d:a2:61:fb:14:7b:a3:8a:00:3b:8d:ba:48:33: d2:18:75:84:e2:d0:f1:3c:15:e8:4a:9c:d6:73:bc:61: 72:3c:a5:45:7f:95:7e:21:d1:c8:6d:05:a5:c7:a2:5e: b6:83:8a:d0:2b:4f:59:70:aa:44:1b:f0:36:9c:5f:dc: 37:58:57:4c:b3:21:95:c8:e7:fc:94:33:e5:76:9a:ab: 73:a5:e0:d3:2d:c5:bc:42:fb:b4:88:a9:a0:1a:26:75: a9:f7:32:1e:00:1b:68:c5:98:2b:2e:db:8d:a1:91:06: 32:0c:4b:cd:39:82:74:f1:8f:db:41:79:9c:53:b1:93: 2b:0a:d8:8b:1f:57:e0:6b:1a:ce:bb:d0:f0:4e:ee:e9: 71:5e:87:e6:76:e4:9c:03:99:a6:8a:63:84:6a:a6:b5: 45:b1:68:57:47:cc:f8:b6:27:d9:d3:6f:cb:8a:df:1c: 8c:c1:d2:93:1b:73:3b:d2:8e:77:fb:ba:f7:25:b2:88: 22:49:df:3c:d1:fe:33:ac:26:69:8b:1a:c7:e1:57:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:e9:16:d9:d7:5e:0d:3d:01:bb:bf:ca:ce:bd:59:22: 91:10:99:e1:f8:dd:77:ba:16:59:93:2a:8d:19:de:a7: 4f:57:46:ea:e5:fb:86:ca:6f:ae:ec:ba:07:57:76:40: 63:74:63:14:de:12:95:44:0f:e2:c1:70:ea:86:ad:04: 66:91:be:20:67:71:d4:0a:e3:8f:08:d6:e2:81:45:93: 4e:53:4e:32:58:ee:01:52:55:d0:3e:be:62:8f:c5:db: 2a:a5:c6:8c:d7:fa:e4:fe:c4:17:b3:09:a1:0f:f5:3a: 31:e9:d8:61:55:67:cc:90:c0:06:99:29:10:57:4a:8e: 7e:8a:04:56:e4:05:51:c3:08:73:c5:70:f3:13:9f:a4: d3:fc:77:42:26:e9:08:a6:21:9f:ac:f4:cb:91:53:71: 25:68:8f:f3:88:5e:34:2e:0a:a2:8e:b8:ad:90:18:42: ae:1d:4a:e3:58:98:f4:92:51:cf:db:f3:49:66:2a:37: 56:fe:85:06:a7:90:3f:e9:5c:ec:7f:0e:d9:8f:27:12: c7:53:af:5c:5c:c5:78:be:18:ce:48:fa:09:89:23:10: fc:17:8f:53:57:7f:22:18:6a:4e:3c:15:f9:39:1f:03: 47:b1:d6:cd:5f:4e:6b:a0:0a:59:66:17:4a:17:66:0b Fingerprint (SHA-256): A9:37:77:59:AD:72:DA:FF:C6:F0:1E:AB:26:B6:65:7D:3B:D5:BC:82:BF:8F:A7:E3:3B:8D:49:34:6C:B2:71:C1 Fingerprint (SHA1): 62:59:A0:0D:A9:35:57:20:72:7E:F1:DD:3F:F8:93:C4:66:75:F8:6F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #15367: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182098 (0x672ba52) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Sat Jan 09 00:23:06 2016 Not After : Sat Jan 09 00:23:06 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:2f:ac:92:46:86:6d:d7:cc:d0:7d:d6:72:38:2f:bc: 7c:9b:50:e4:4a:cf:59:20:da:2c:d8:40:5b:02:d4:e8: d9:a0:47:52:53:04:a3:e0:66:17:24:ac:30:12:aa:b1: c0:1d:67:ef:d3:c2:82:86:80:fd:a6:ba:65:25:8d:ee: 45:8f:e7:5b:d8:6f:98:c4:59:a3:53:11:e0:8c:eb:b5: 9a:f7:78:f6:c8:bd:34:6b:28:ab:00:34:0a:5f:e7:88: 1c:c6:0f:5d:1f:9c:f2:f4:64:60:0e:c0:0e:d5:85:0a: c7:a0:e1:09:93:d2:be:53:68:51:68:d0:db:43:4e:e0: 84:6a:8f:ee:78:61:dc:7c:86:32:ce:d8:33:03:28:0b: 4a:fd:76:4e:08:0f:31:11:d9:1d:cf:9f:97:64:66:e6: e9:01:35:6a:e6:ab:36:3c:57:0e:4d:59:50:82:74:1f: b7:03:dd:50:09:8f:99:f3:74:74:0a:09:34:e4:e4:3c: ca:0e:d4:c6:02:14:71:9e:30:ae:75:12:49:d6:e8:3f: 56:ae:56:9f:b5:fd:1c:96:d1:2b:08:7b:a2:cf:00:13: 1c:27:e1:65:f0:08:1a:8e:f9:fa:a1:bb:c1:08:76:85: d2:5c:3c:e5:ab:5c:3e:d2:f9:39:ba:a7:87:0f:70:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:b5:df:ab:78:7f:1f:71:78:d1:72:c2:c5:e4:8f:e1: 78:19:8a:10:04:49:48:ab:5c:69:71:71:4d:15:bf:e9: a3:0d:fd:65:1e:7a:14:c0:bf:e1:03:a0:f6:6b:1c:40: 4d:c1:f1:dc:af:5d:3d:1d:aa:93:47:48:2a:f3:00:3e: ba:33:30:36:22:61:64:af:ec:42:f2:13:1d:cf:89:c4: 15:20:f1:31:a0:da:e0:7b:ad:69:16:45:ed:50:0d:a6: 49:89:6a:92:0d:44:4a:11:1f:72:5e:9a:c6:a8:20:7f: 4a:b9:f7:61:b4:c1:1c:fa:23:e6:56:4f:18:b2:4e:af: 8c:0e:15:b9:32:cf:d2:2d:15:ef:13:3b:0a:3c:e2:87: b5:2a:86:cd:b5:f9:7c:85:ee:c6:cc:b0:3a:8a:63:e0: 9f:3a:3c:57:f5:5a:78:44:75:de:15:61:63:89:b9:e5: 90:ba:33:0e:3e:b0:58:32:63:83:7f:77:9b:d4:39:f0: b9:29:c5:97:07:09:dd:dc:01:66:4d:63:5b:d2:a6:13: ad:57:19:b3:29:f1:3c:b0:15:0a:2f:e0:4c:6f:a9:1f: 2e:68:4e:24:b5:13:ae:42:e4:52:76:3f:9f:2d:9a:e3: 31:c4:fa:8d:ec:85:5d:e9:81:77:31:bd:8e:11:fb:10 Fingerprint (SHA-256): 03:5D:9B:8E:11:C2:A0:4A:E4:71:F8:D9:54:C2:0E:7D:47:E4:92:99:F8:2A:09:0A:46:2C:DC:6F:9D:07:FA:AE Fingerprint (SHA1): 2C:E8:85:2A:43:2D:CF:C9:64:08:66:9B:DE:1B:79:5B:F9:51:A0:7C Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15368: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #15369: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182098 (0x672ba52) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Sat Jan 09 00:23:06 2016 Not After : Sat Jan 09 00:23:06 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:2f:ac:92:46:86:6d:d7:cc:d0:7d:d6:72:38:2f:bc: 7c:9b:50:e4:4a:cf:59:20:da:2c:d8:40:5b:02:d4:e8: d9:a0:47:52:53:04:a3:e0:66:17:24:ac:30:12:aa:b1: c0:1d:67:ef:d3:c2:82:86:80:fd:a6:ba:65:25:8d:ee: 45:8f:e7:5b:d8:6f:98:c4:59:a3:53:11:e0:8c:eb:b5: 9a:f7:78:f6:c8:bd:34:6b:28:ab:00:34:0a:5f:e7:88: 1c:c6:0f:5d:1f:9c:f2:f4:64:60:0e:c0:0e:d5:85:0a: c7:a0:e1:09:93:d2:be:53:68:51:68:d0:db:43:4e:e0: 84:6a:8f:ee:78:61:dc:7c:86:32:ce:d8:33:03:28:0b: 4a:fd:76:4e:08:0f:31:11:d9:1d:cf:9f:97:64:66:e6: e9:01:35:6a:e6:ab:36:3c:57:0e:4d:59:50:82:74:1f: b7:03:dd:50:09:8f:99:f3:74:74:0a:09:34:e4:e4:3c: ca:0e:d4:c6:02:14:71:9e:30:ae:75:12:49:d6:e8:3f: 56:ae:56:9f:b5:fd:1c:96:d1:2b:08:7b:a2:cf:00:13: 1c:27:e1:65:f0:08:1a:8e:f9:fa:a1:bb:c1:08:76:85: d2:5c:3c:e5:ab:5c:3e:d2:f9:39:ba:a7:87:0f:70:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:b5:df:ab:78:7f:1f:71:78:d1:72:c2:c5:e4:8f:e1: 78:19:8a:10:04:49:48:ab:5c:69:71:71:4d:15:bf:e9: a3:0d:fd:65:1e:7a:14:c0:bf:e1:03:a0:f6:6b:1c:40: 4d:c1:f1:dc:af:5d:3d:1d:aa:93:47:48:2a:f3:00:3e: ba:33:30:36:22:61:64:af:ec:42:f2:13:1d:cf:89:c4: 15:20:f1:31:a0:da:e0:7b:ad:69:16:45:ed:50:0d:a6: 49:89:6a:92:0d:44:4a:11:1f:72:5e:9a:c6:a8:20:7f: 4a:b9:f7:61:b4:c1:1c:fa:23:e6:56:4f:18:b2:4e:af: 8c:0e:15:b9:32:cf:d2:2d:15:ef:13:3b:0a:3c:e2:87: b5:2a:86:cd:b5:f9:7c:85:ee:c6:cc:b0:3a:8a:63:e0: 9f:3a:3c:57:f5:5a:78:44:75:de:15:61:63:89:b9:e5: 90:ba:33:0e:3e:b0:58:32:63:83:7f:77:9b:d4:39:f0: b9:29:c5:97:07:09:dd:dc:01:66:4d:63:5b:d2:a6:13: ad:57:19:b3:29:f1:3c:b0:15:0a:2f:e0:4c:6f:a9:1f: 2e:68:4e:24:b5:13:ae:42:e4:52:76:3f:9f:2d:9a:e3: 31:c4:fa:8d:ec:85:5d:e9:81:77:31:bd:8e:11:fb:10 Fingerprint (SHA-256): 03:5D:9B:8E:11:C2:A0:4A:E4:71:F8:D9:54:C2:0E:7D:47:E4:92:99:F8:2A:09:0A:46:2C:DC:6F:9D:07:FA:AE Fingerprint (SHA1): 2C:E8:85:2A:43:2D:CF:C9:64:08:66:9B:DE:1B:79:5B:F9:51:A0:7C Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15370: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182100 (0x672ba54) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Sat Jan 09 00:23:31 2016 Not After : Sat Jan 09 00:23:31 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:b3:6a:66:b5:97:8a:70:52:d6:58:45:cd:f5:43:82: 69:f3:08:87:e1:a9:b6:b2:f2:1a:57:f8:4e:3f:82:ef: 65:58:45:6d:cf:83:5c:b9:89:a2:47:dc:50:29:02:4b: f2:34:6d:a2:61:fb:14:7b:a3:8a:00:3b:8d:ba:48:33: d2:18:75:84:e2:d0:f1:3c:15:e8:4a:9c:d6:73:bc:61: 72:3c:a5:45:7f:95:7e:21:d1:c8:6d:05:a5:c7:a2:5e: b6:83:8a:d0:2b:4f:59:70:aa:44:1b:f0:36:9c:5f:dc: 37:58:57:4c:b3:21:95:c8:e7:fc:94:33:e5:76:9a:ab: 73:a5:e0:d3:2d:c5:bc:42:fb:b4:88:a9:a0:1a:26:75: a9:f7:32:1e:00:1b:68:c5:98:2b:2e:db:8d:a1:91:06: 32:0c:4b:cd:39:82:74:f1:8f:db:41:79:9c:53:b1:93: 2b:0a:d8:8b:1f:57:e0:6b:1a:ce:bb:d0:f0:4e:ee:e9: 71:5e:87:e6:76:e4:9c:03:99:a6:8a:63:84:6a:a6:b5: 45:b1:68:57:47:cc:f8:b6:27:d9:d3:6f:cb:8a:df:1c: 8c:c1:d2:93:1b:73:3b:d2:8e:77:fb:ba:f7:25:b2:88: 22:49:df:3c:d1:fe:33:ac:26:69:8b:1a:c7:e1:57:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:e9:16:d9:d7:5e:0d:3d:01:bb:bf:ca:ce:bd:59:22: 91:10:99:e1:f8:dd:77:ba:16:59:93:2a:8d:19:de:a7: 4f:57:46:ea:e5:fb:86:ca:6f:ae:ec:ba:07:57:76:40: 63:74:63:14:de:12:95:44:0f:e2:c1:70:ea:86:ad:04: 66:91:be:20:67:71:d4:0a:e3:8f:08:d6:e2:81:45:93: 4e:53:4e:32:58:ee:01:52:55:d0:3e:be:62:8f:c5:db: 2a:a5:c6:8c:d7:fa:e4:fe:c4:17:b3:09:a1:0f:f5:3a: 31:e9:d8:61:55:67:cc:90:c0:06:99:29:10:57:4a:8e: 7e:8a:04:56:e4:05:51:c3:08:73:c5:70:f3:13:9f:a4: d3:fc:77:42:26:e9:08:a6:21:9f:ac:f4:cb:91:53:71: 25:68:8f:f3:88:5e:34:2e:0a:a2:8e:b8:ad:90:18:42: ae:1d:4a:e3:58:98:f4:92:51:cf:db:f3:49:66:2a:37: 56:fe:85:06:a7:90:3f:e9:5c:ec:7f:0e:d9:8f:27:12: c7:53:af:5c:5c:c5:78:be:18:ce:48:fa:09:89:23:10: fc:17:8f:53:57:7f:22:18:6a:4e:3c:15:f9:39:1f:03: 47:b1:d6:cd:5f:4e:6b:a0:0a:59:66:17:4a:17:66:0b Fingerprint (SHA-256): A9:37:77:59:AD:72:DA:FF:C6:F0:1E:AB:26:B6:65:7D:3B:D5:BC:82:BF:8F:A7:E3:3B:8D:49:34:6C:B2:71:C1 Fingerprint (SHA1): 62:59:A0:0D:A9:35:57:20:72:7E:F1:DD:3F:F8:93:C4:66:75:F8:6F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #15371: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #15372: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #15373: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #15374: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182098 (0x672ba52) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Sat Jan 09 00:23:06 2016 Not After : Sat Jan 09 00:23:06 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:2f:ac:92:46:86:6d:d7:cc:d0:7d:d6:72:38:2f:bc: 7c:9b:50:e4:4a:cf:59:20:da:2c:d8:40:5b:02:d4:e8: d9:a0:47:52:53:04:a3:e0:66:17:24:ac:30:12:aa:b1: c0:1d:67:ef:d3:c2:82:86:80:fd:a6:ba:65:25:8d:ee: 45:8f:e7:5b:d8:6f:98:c4:59:a3:53:11:e0:8c:eb:b5: 9a:f7:78:f6:c8:bd:34:6b:28:ab:00:34:0a:5f:e7:88: 1c:c6:0f:5d:1f:9c:f2:f4:64:60:0e:c0:0e:d5:85:0a: c7:a0:e1:09:93:d2:be:53:68:51:68:d0:db:43:4e:e0: 84:6a:8f:ee:78:61:dc:7c:86:32:ce:d8:33:03:28:0b: 4a:fd:76:4e:08:0f:31:11:d9:1d:cf:9f:97:64:66:e6: e9:01:35:6a:e6:ab:36:3c:57:0e:4d:59:50:82:74:1f: b7:03:dd:50:09:8f:99:f3:74:74:0a:09:34:e4:e4:3c: ca:0e:d4:c6:02:14:71:9e:30:ae:75:12:49:d6:e8:3f: 56:ae:56:9f:b5:fd:1c:96:d1:2b:08:7b:a2:cf:00:13: 1c:27:e1:65:f0:08:1a:8e:f9:fa:a1:bb:c1:08:76:85: d2:5c:3c:e5:ab:5c:3e:d2:f9:39:ba:a7:87:0f:70:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:b5:df:ab:78:7f:1f:71:78:d1:72:c2:c5:e4:8f:e1: 78:19:8a:10:04:49:48:ab:5c:69:71:71:4d:15:bf:e9: a3:0d:fd:65:1e:7a:14:c0:bf:e1:03:a0:f6:6b:1c:40: 4d:c1:f1:dc:af:5d:3d:1d:aa:93:47:48:2a:f3:00:3e: ba:33:30:36:22:61:64:af:ec:42:f2:13:1d:cf:89:c4: 15:20:f1:31:a0:da:e0:7b:ad:69:16:45:ed:50:0d:a6: 49:89:6a:92:0d:44:4a:11:1f:72:5e:9a:c6:a8:20:7f: 4a:b9:f7:61:b4:c1:1c:fa:23:e6:56:4f:18:b2:4e:af: 8c:0e:15:b9:32:cf:d2:2d:15:ef:13:3b:0a:3c:e2:87: b5:2a:86:cd:b5:f9:7c:85:ee:c6:cc:b0:3a:8a:63:e0: 9f:3a:3c:57:f5:5a:78:44:75:de:15:61:63:89:b9:e5: 90:ba:33:0e:3e:b0:58:32:63:83:7f:77:9b:d4:39:f0: b9:29:c5:97:07:09:dd:dc:01:66:4d:63:5b:d2:a6:13: ad:57:19:b3:29:f1:3c:b0:15:0a:2f:e0:4c:6f:a9:1f: 2e:68:4e:24:b5:13:ae:42:e4:52:76:3f:9f:2d:9a:e3: 31:c4:fa:8d:ec:85:5d:e9:81:77:31:bd:8e:11:fb:10 Fingerprint (SHA-256): 03:5D:9B:8E:11:C2:A0:4A:E4:71:F8:D9:54:C2:0E:7D:47:E4:92:99:F8:2A:09:0A:46:2C:DC:6F:9D:07:FA:AE Fingerprint (SHA1): 2C:E8:85:2A:43:2D:CF:C9:64:08:66:9B:DE:1B:79:5B:F9:51:A0:7C Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15375: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182102 (0x672ba56) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Sat Jan 09 00:23:45 2016 Not After : Sat Jan 09 00:23:45 2066 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:ca:66:2f:4b:a2:76:a1:24:29:03:d7:5b:3e:3e:ce: b7:7f:07:db:fd:f3:aa:16:a0:fa:b2:d2:ea:64:1e:76: 44:13:91:9b:df:85:e3:04:0c:73:3a:bf:41:92:00:b7: 4f:56:ff:16:a0:73:78:dd:1e:e8:e3:7f:3b:e6:86:a1: 41:7d:9d:20:cd:22:af:f1:82:0f:e6:ac:92:86:62:27: 29:79:9f:d0:cf:4b:96:fa:b7:07:b9:29:ff:16:f0:5c: 64:68:9b:50:a3:da:77:a8:04:9d:72:c6:d0:13:bc:e4: ff:49:7a:c7:7a:06:24:bd:bd:5e:a2:39:86:61:39:82: ef:84:1c:ed:59:79:71:0b:99:75:e7:fe:38:d7:5b:78: 6b:1e:86:bc:eb:3f:26:c4:d9:93:45:96:12:03:00:3c: 2d:f3:63:b5:4e:4f:c4:19:77:69:33:35:30:8f:7a:c2: e6:09:2c:85:4e:bb:bb:9b:1f:2c:fa:53:82:6b:63:ab: 7f:27:24:ee:b8:8f:5e:fb:8f:52:f1:96:0a:7d:fb:72: d7:9c:e8:49:eb:24:58:45:d1:73:1c:74:18:61:4a:fc: 6e:77:29:f5:ee:c9:f6:2a:28:22:f3:9f:fe:0e:36:29: 79:c1:e1:d0:04:6a:d3:6b:fb:4a:49:44:df:75:5d:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:59:02:81:60:c9:96:83:3f:65:d0:7f:d9:09:ef:33: 4f:75:76:1b:d2:0e:83:94:95:89:ac:8f:4e:1c:3e:d9: df:a9:b8:ca:f0:31:1b:c8:78:9b:6f:e7:44:57:d5:13: d3:a5:c6:b4:d7:c8:73:bc:53:65:1c:9f:2b:b5:65:ce: ae:34:61:01:ec:6c:8a:ca:fd:3d:15:44:35:54:83:9d: c9:35:be:21:66:6b:bb:33:d2:b7:0d:c7:fe:66:c3:b3: 42:1e:e2:cc:f9:bd:a6:66:ef:ed:18:b8:9d:8e:a3:9b: fc:90:d7:fb:c6:00:53:ac:5f:a2:0c:06:43:73:8e:83: ce:f8:49:1a:d9:a6:ac:9e:14:b7:d4:ac:a3:18:30:f6: 4a:4d:6f:e7:45:d9:53:ea:a4:97:0d:6a:fd:2f:f1:de: bf:cf:d9:d4:39:36:0a:ae:33:8a:1f:a3:79:1a:69:a6: ec:ce:a6:f6:99:ea:de:70:b5:d0:91:20:f6:27:e4:bf: a5:95:19:a9:7f:9a:fa:a6:dd:88:d1:c5:f8:9f:c9:3d: 56:70:0d:68:ed:cf:64:dd:0d:a9:9d:66:29:49:3c:00: af:bd:f7:29:9b:b7:be:f3:62:82:19:c2:3d:39:83:9d: 95:9c:b1:a1:ee:06:c1:08:36:4c:2a:04:2a:e4:b5:87 Fingerprint (SHA-256): 62:DB:42:36:72:FB:1E:9C:21:AB:09:CC:C7:09:02:79:C4:C7:72:44:82:03:E2:81:9A:ED:53:D3:87:BB:4C:CD Fingerprint (SHA1): A4:F6:09:78:BF:88:CC:B9:68:25:4A:C1:E8:1B:06:26:07:A4:8B:52 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #15376: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182098 (0x672ba52) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Sat Jan 09 00:23:06 2016 Not After : Sat Jan 09 00:23:06 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:2f:ac:92:46:86:6d:d7:cc:d0:7d:d6:72:38:2f:bc: 7c:9b:50:e4:4a:cf:59:20:da:2c:d8:40:5b:02:d4:e8: d9:a0:47:52:53:04:a3:e0:66:17:24:ac:30:12:aa:b1: c0:1d:67:ef:d3:c2:82:86:80:fd:a6:ba:65:25:8d:ee: 45:8f:e7:5b:d8:6f:98:c4:59:a3:53:11:e0:8c:eb:b5: 9a:f7:78:f6:c8:bd:34:6b:28:ab:00:34:0a:5f:e7:88: 1c:c6:0f:5d:1f:9c:f2:f4:64:60:0e:c0:0e:d5:85:0a: c7:a0:e1:09:93:d2:be:53:68:51:68:d0:db:43:4e:e0: 84:6a:8f:ee:78:61:dc:7c:86:32:ce:d8:33:03:28:0b: 4a:fd:76:4e:08:0f:31:11:d9:1d:cf:9f:97:64:66:e6: e9:01:35:6a:e6:ab:36:3c:57:0e:4d:59:50:82:74:1f: b7:03:dd:50:09:8f:99:f3:74:74:0a:09:34:e4:e4:3c: ca:0e:d4:c6:02:14:71:9e:30:ae:75:12:49:d6:e8:3f: 56:ae:56:9f:b5:fd:1c:96:d1:2b:08:7b:a2:cf:00:13: 1c:27:e1:65:f0:08:1a:8e:f9:fa:a1:bb:c1:08:76:85: d2:5c:3c:e5:ab:5c:3e:d2:f9:39:ba:a7:87:0f:70:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:b5:df:ab:78:7f:1f:71:78:d1:72:c2:c5:e4:8f:e1: 78:19:8a:10:04:49:48:ab:5c:69:71:71:4d:15:bf:e9: a3:0d:fd:65:1e:7a:14:c0:bf:e1:03:a0:f6:6b:1c:40: 4d:c1:f1:dc:af:5d:3d:1d:aa:93:47:48:2a:f3:00:3e: ba:33:30:36:22:61:64:af:ec:42:f2:13:1d:cf:89:c4: 15:20:f1:31:a0:da:e0:7b:ad:69:16:45:ed:50:0d:a6: 49:89:6a:92:0d:44:4a:11:1f:72:5e:9a:c6:a8:20:7f: 4a:b9:f7:61:b4:c1:1c:fa:23:e6:56:4f:18:b2:4e:af: 8c:0e:15:b9:32:cf:d2:2d:15:ef:13:3b:0a:3c:e2:87: b5:2a:86:cd:b5:f9:7c:85:ee:c6:cc:b0:3a:8a:63:e0: 9f:3a:3c:57:f5:5a:78:44:75:de:15:61:63:89:b9:e5: 90:ba:33:0e:3e:b0:58:32:63:83:7f:77:9b:d4:39:f0: b9:29:c5:97:07:09:dd:dc:01:66:4d:63:5b:d2:a6:13: ad:57:19:b3:29:f1:3c:b0:15:0a:2f:e0:4c:6f:a9:1f: 2e:68:4e:24:b5:13:ae:42:e4:52:76:3f:9f:2d:9a:e3: 31:c4:fa:8d:ec:85:5d:e9:81:77:31:bd:8e:11:fb:10 Fingerprint (SHA-256): 03:5D:9B:8E:11:C2:A0:4A:E4:71:F8:D9:54:C2:0E:7D:47:E4:92:99:F8:2A:09:0A:46:2C:DC:6F:9D:07:FA:AE Fingerprint (SHA1): 2C:E8:85:2A:43:2D:CF:C9:64:08:66:9B:DE:1B:79:5B:F9:51:A0:7C Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15377: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #15378: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #15379: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #15380: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #15381: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #15382: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 108182103 (0x672ba57) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Sat Jan 09 00:23:52 2016 Not After : Sat Jan 09 00:23:52 2021 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:2e:15:09:92:ec:5e:5c:85:84:d5:45:4f:28:58:08: 8d:f8:9d:2d:f8:50:b7:6d:d4:45:32:05:3d:92:f7:d7: 90:d3:ef:63:d0:d6:f0:4d:02:1b:b9:3f:ce:19:29:f8: 00:1d:6c:2a:cf:96:98:c4:a0:8d:1b:f6:4d:5a:b3:36: 29:fc:bd:e4:fa:ab:f0:a9:25:fe:c7:eb:03:83:4d:20: 34:6d:80:36:00:27:85:68:75:af:cf:31:96:6a:2a:42: a5:c9:a2:41:c8:4e:86:87:c7:49:a0:f3:86:93:16:a6: 5a:fc:d5:89:6d:8e:3a:3d:ba:c8:7e:32:28:e7:9a:c0: d0:15:00:5c:ec:35:c0:40:e1:ca:dc:81:4a:4b:26:79: 32:b1:87:58:29:c1:77:8a:a3:b3:cc:ab:ea:50:5e:24: ed:8e:9b:23:27:65:83:e5:49:cd:00:d9:c5:d2:9c:3c: fa:c6:10:93:76:44:19:8e:01:3b:d7:cb:d3:be:cc:5c: 01:8d:87:f6:98:8a:8d:81:92:8a:e2:2e:10:89:01:37: f1:8c:f1:0b:ae:c5:62:17:f7:d6:da:71:a4:73:c9:b8: 1e:10:98:b7:35:d8:25:56:74:91:14:51:7e:39:94:57: 30:c9:97:60:1f:fe:c8:e7:53:10:ef:cb:b0:12:59:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:c6:19:bc:9f:b2:3d:65:42:01:4d:77:18:51:08:26: 25:1a:e8:0b:75:a4:25:6e:7c:70:72:8a:99:71:53:69: 41:68:dc:54:c7:6a:d6:a9:21:57:a6:db:6d:d4:19:40: d8:af:25:b9:05:51:23:88:73:0e:c4:7b:ac:aa:92:49: 7c:bf:d8:ab:9f:99:c2:0e:93:80:17:9e:12:36:84:4a: 49:f0:93:43:6c:19:2c:7d:15:cc:63:9d:23:3f:e9:af: 19:ac:6f:3d:bf:e4:96:5b:b3:34:b2:a3:02:87:26:f5: 89:0f:86:a0:c1:9b:eb:a8:03:e5:f8:23:10:52:9d:b3: df:76:dd:ac:fe:b6:8e:66:49:84:b2:ac:7e:00:9c:11: 31:7c:1c:85:61:5c:50:49:2b:61:df:22:13:31:2d:62: 71:d3:46:97:82:90:0f:6a:39:0d:8e:11:3a:d4:44:2b: 51:e0:99:0d:c3:41:c2:d1:63:bb:27:d4:18:06:14:2a: 0d:69:e5:28:f9:1a:e9:7b:17:d0:e7:21:0c:84:fe:cb: d6:f1:a2:69:26:4c:f1:e2:3a:20:ba:eb:8a:9f:14:7a: c8:1e:24:17:46:44:b8:3b:c8:7e:ce:fc:1a:d3:50:3d: 32:49:c3:0e:29:52:54:9b:88:ed:10:18:1b:0c:5f:76 Fingerprint (SHA-256): 7A:8A:AF:13:EE:01:A9:7D:2D:80:2A:89:21:5A:02:46:AC:84:21:E4:02:3A:DA:52:7D:45:3F:E9:A7:06:D3:F8 Fingerprint (SHA1): F6:15:0D:21:60:7A:8A:59:AC:B9:91:55:37:AA:26:BB:F4:4E:6A:CA Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #15383: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #15384: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #15385: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #15386: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #15387: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #15388: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #15389: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #15390: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #15391: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #15392: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #15393: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #15394: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #15395: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #15396: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #15397: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #15398: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #15399: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #15400: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #15401: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #15402: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #15403: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #15404: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #15405: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.19.1/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #15406: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED trying to kill httpserv with PID 11816 at Fri Jan 8 19:24:32 EST 2016 kill -USR1 11816 httpserv: normal termination httpserv -b -p 9169 2>/dev/null; httpserv with PID 11816 killed at Fri Jan 8 19:24:32 EST 2016 TIMESTAMP chains END: Fri Jan 8 19:24:32 EST 2016 SUMMARY: ======== NSS variables: -------------- HOST=localhost DOMSUF=localdomain BUILD_OPT=1 USE_X32= USE_64= NSS_CYCLES="" NSS_TESTS="libpkix cert dbtests tools fips sdr crmf smime ssl ocsp merge pkits chains" NSS_SSL_TESTS="crl bypass_normal normal_bypass fips_normal normal_fips iopr" NSS_SSL_RUN="cov auth stapling stress" NSS_AIA_PATH= NSS_AIA_HTTP= NSS_AIA_OCSP= IOPR_HOSTADDR_LIST= PKITS_DATA= Tests summary: -------------- Passed: 9575 Failed: 5831 Failed with core: 0 Unknown status: 0 ~/build/BUILD/nss-3.19.1 + popd + killall selfserv_9159 selfserv_9159: no process found + : ++ grep -c FAILED ./tests_results/security/localhost.1/output.log + TEST_FAILURES=5831 + '[' 0 -eq 1 ']' + sleep 1 test suite completed + echo 'test suite completed' + exit 0 Processing files: nss-3.19.1-19.el7.armv7hl Provides: config(nss) = 3.19.1-19.el7 libnss3.so libnss3.so(NSS_3.10) libnss3.so(NSS_3.10.2) libnss3.so(NSS_3.11) libnss3.so(NSS_3.11.1) libnss3.so(NSS_3.11.2) libnss3.so(NSS_3.11.7) libnss3.so(NSS_3.11.9) libnss3.so(NSS_3.12) libnss3.so(NSS_3.12.1) libnss3.so(NSS_3.12.10) libnss3.so(NSS_3.12.3) libnss3.so(NSS_3.12.4) libnss3.so(NSS_3.12.5) libnss3.so(NSS_3.12.6) libnss3.so(NSS_3.12.7) libnss3.so(NSS_3.12.9) libnss3.so(NSS_3.13) libnss3.so(NSS_3.13.2) libnss3.so(NSS_3.14) libnss3.so(NSS_3.14.1) libnss3.so(NSS_3.14.3) libnss3.so(NSS_3.15) libnss3.so(NSS_3.15.4) libnss3.so(NSS_3.16.1) libnss3.so(NSS_3.16.2) libnss3.so(NSS_3.18) libnss3.so(NSS_3.19) libnss3.so(NSS_3.19.1) libnss3.so(NSS_3.2) libnss3.so(NSS_3.2.1) libnss3.so(NSS_3.3) libnss3.so(NSS_3.3.1) libnss3.so(NSS_3.4) libnss3.so(NSS_3.5) libnss3.so(NSS_3.6) libnss3.so(NSS_3.7) libnss3.so(NSS_3.7.1) libnss3.so(NSS_3.8) libnss3.so(NSS_3.9) libnss3.so(NSS_3.9.2) libnss3.so(NSS_3.9.3) libnssckbi.so libnssckbi.so(NSS_3.1) libnsspem.so libnsspem.so(NSS_3.1) libsmime3.so libsmime3.so(NSS_3.10) libsmime3.so(NSS_3.12.10) libsmime3.so(NSS_3.12.2) libsmime3.so(NSS_3.13) libsmime3.so(NSS_3.15) libsmime3.so(NSS_3.16) libsmime3.so(NSS_3.18) libsmime3.so(NSS_3.2) libsmime3.so(NSS_3.2.1) libsmime3.so(NSS_3.3) libsmime3.so(NSS_3.4) libsmime3.so(NSS_3.4.1) libsmime3.so(NSS_3.6) libsmime3.so(NSS_3.7) libsmime3.so(NSS_3.7.2) libsmime3.so(NSS_3.8) libsmime3.so(NSS_3.9) libsmime3.so(NSS_3.9.3) libssl3.so libssl3.so(NSS_3.11.4) libssl3.so(NSS_3.11.8) libssl3.so(NSS_3.12.10) libssl3.so(NSS_3.12.6) libssl3.so(NSS_3.13) libssl3.so(NSS_3.13.2) libssl3.so(NSS_3.14) libssl3.so(NSS_3.15) libssl3.so(NSS_3.15.4) libssl3.so(NSS_3.2) libssl3.so(NSS_3.2.1) libssl3.so(NSS_3.20) libssl3.so(NSS_3.4) libssl3.so(NSS_3.7.4) nss = 3.19.1-19.el7 nss(armv7hl-32) = 3.19.1-19.el7 Requires(interp): /bin/sh /bin/sh /bin/sh Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires(post): /bin/sh /usr/sbin/update-alternatives Requires(postun): /bin/sh /usr/sbin/update-alternatives Requires(posttrans): /bin/sh Requires: ld-linux-armhf.so.3 ld-linux-armhf.so.3(GLIBC_2.4) libc.so.6 libc.so.6(GLIBC_2.4) libdl.so.2 libfreebl3.so libgcc_s.so.1 libgcc_s.so.1(GCC_3.5) libnspr4.so libnss3.so libnss3.so(NSS_3.10) libnss3.so(NSS_3.11) libnss3.so(NSS_3.11.1) libnss3.so(NSS_3.11.2) libnss3.so(NSS_3.12) libnss3.so(NSS_3.12.6) libnss3.so(NSS_3.14) libnss3.so(NSS_3.14.3) libnss3.so(NSS_3.15) libnss3.so(NSS_3.19.1) libnss3.so(NSS_3.2) libnss3.so(NSS_3.3) libnss3.so(NSS_3.3.1) libnss3.so(NSS_3.4) libnss3.so(NSS_3.6) libnss3.so(NSS_3.7) libnss3.so(NSS_3.8) libnss3.so(NSS_3.9) libnssdbm3.so libnssutil3.so libnssutil3.so(NSSUTIL_3.12) libnssutil3.so(NSSUTIL_3.12.3) libnssutil3.so(NSSUTIL_3.12.5) libnssutil3.so(NSSUTIL_3.13) libnssutil3.so(NSSUTIL_3.14) libnssutil3.so(NSSUTIL_3.15) libnssutil3.so(NSSUTIL_3.17.1) libplc4.so libplds4.so libpthread.so.0 libpthread.so.0(GLIBC_2.4) libsoftokn3.so libz.so.1 rtld(GNU_HASH) Processing files: nss-tools-3.19.1-19.el7.armv7hl Provides: nss-tools = 3.19.1-19.el7 nss-tools(armv7hl-32) = 3.19.1-19.el7 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires: ld-linux-armhf.so.3 ld-linux-armhf.so.3(GLIBC_2.4) libc.so.6 libc.so.6(GLIBC_2.4) libdl.so.2 libgcc_s.so.1 libgcc_s.so.1(GCC_3.5) libnspr4.so libnss3.so libnss3.so(NSS_3.10) libnss3.so(NSS_3.11) libnss3.so(NSS_3.11.7) libnss3.so(NSS_3.12) libnss3.so(NSS_3.12.1) libnss3.so(NSS_3.12.3) libnss3.so(NSS_3.12.6) libnss3.so(NSS_3.12.9) libnss3.so(NSS_3.13) libnss3.so(NSS_3.14) libnss3.so(NSS_3.14.1) libnss3.so(NSS_3.15) libnss3.so(NSS_3.16.1) libnss3.so(NSS_3.16.2) libnss3.so(NSS_3.2) libnss3.so(NSS_3.3) libnss3.so(NSS_3.4) libnss3.so(NSS_3.5) libnss3.so(NSS_3.6) libnss3.so(NSS_3.7) libnss3.so(NSS_3.8) libnss3.so(NSS_3.9) libnss3.so(NSS_3.9.2) libnss3.so(NSS_3.9.3) libnssutil3.so libnssutil3.so(NSSUTIL_3.12) libnssutil3.so(NSSUTIL_3.12.7) libnssutil3.so(NSSUTIL_3.15) libplc4.so libplds4.so libpthread.so.0 libpthread.so.0(GLIBC_2.4) libsmime3.so libsmime3.so(NSS_3.10) libsmime3.so(NSS_3.2) libsmime3.so(NSS_3.3) libsmime3.so(NSS_3.4) libsmime3.so(NSS_3.6) libsmime3.so(NSS_3.9.3) libsoftokn3.so libssl3.so libssl3.so(NSS_3.11.8) libssl3.so(NSS_3.12.6) libssl3.so(NSS_3.13.2) libssl3.so(NSS_3.14) libssl3.so(NSS_3.15) libssl3.so(NSS_3.15.4) libssl3.so(NSS_3.2) libssl3.so(NSS_3.20) libssl3.so(NSS_3.4) libssl3.so(NSS_3.7.4) libz.so.1 rtld(GNU_HASH) Processing files: nss-sysinit-3.19.1-19.el7.armv7hl Provides: libnsssysinit.so nss-sysinit = 3.19.1-19.el7 nss-sysinit(armv7hl-32) = 3.19.1-19.el7 nss-system-init Requires(interp): /bin/sh Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires(post): coreutils sed Requires: /bin/sh ld-linux-armhf.so.3 ld-linux-armhf.so.3(GLIBC_2.4) libc.so.6 libc.so.6(GLIBC_2.4) libdl.so.2 libgcc_s.so.1 libgcc_s.so.1(GCC_3.5) libnspr4.so libnssutil3.so libnssutil3.so(NSSUTIL_3.12) libnssutil3.so(NSSUTIL_3.14) libplc4.so libplds4.so libpthread.so.0 rtld(GNU_HASH) Processing files: nss-devel-3.19.1-19.el7.armv7hl Provides: nss-devel = 3.19.1-19.el7 nss-devel(armv7hl-32) = 3.19.1-19.el7 nss-static = 3.19.1-19.el7 pkgconfig(nss) = 3.19.1 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires: /bin/sh /usr/bin/pkg-config pkgconfig(nspr) >= 4.10.8 pkgconfig(nss-util) >= 3.19.1 Processing files: nss-pkcs11-devel-3.19.1-19.el7.armv7hl Provides: nss-pkcs11-devel = 3.19.1-19.el7 nss-pkcs11-devel(armv7hl-32) = 3.19.1-19.el7 nss-pkcs11-devel-static = 3.19.1-19.el7 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Processing files: nss-debuginfo-3.19.1-19.el7.armv7hl Provides: nss-debuginfo = 3.19.1-19.el7 nss-debuginfo(armv7hl-32) = 3.19.1-19.el7 Requires(rpmlib): rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 rpmlib(CompressedFileNames) <= 3.0.4-1 Checking for unpackaged file(s): /usr/lib/rpm/check-files /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm Wrote: /builddir/build/RPMS/nss-3.19.1-19.el7.armv7hl.rpm Wrote: /builddir/build/RPMS/nss-tools-3.19.1-19.el7.armv7hl.rpm Wrote: /builddir/build/RPMS/nss-sysinit-3.19.1-19.el7.armv7hl.rpm Wrote: /builddir/build/RPMS/nss-devel-3.19.1-19.el7.armv7hl.rpm Wrote: /builddir/build/RPMS/nss-pkcs11-devel-3.19.1-19.el7.armv7hl.rpm Wrote: /builddir/build/RPMS/nss-debuginfo-3.19.1-19.el7.armv7hl.rpm Executing(%clean): /bin/sh -e /var/tmp/rpm-tmp.23IwZD + umask 022 + cd /builddir/build/BUILD + cd nss-3.19.1 + /usr/bin/rm -rf /builddir/build/BUILDROOT/nss-3.19.1-19.el7.arm + exit 0 Child return code was: 0 LEAVE do -->